Token-based scheme for granting permissions
First Claim
Patent Images
1. An electronic device comprising:
- a memory; and
at least one processor configured to;
install an application by using an installation file associated with the application;
detect whether the installation file includes a permission setting token;
verify a validity of the permission setting token, wherein the verification is performed based on authentication information that is embedded in the permission setting token;
grant at least one permission to the application based on verifying that the permission setting token is valid;
store, in a database, an indication that the application is granted the permission;
when the application is executed, search the database for the indication;
if the indication of the permission is present in the database, execute one or more functions of the application permitted by the permission; and
if the indication of the permission is absent from the database, execute one or more functions of the application permitted by a signature of the installation file,wherein the permission setting token is signed with a key uniquely identifying a manufacturer of the electronic device.
1 Assignment
0 Petitions
Accused Products
Abstract
An electronic device comprising: a memory; and at least one processor configured to: install an application by using an installation file associated with the application; grant at least one permission to the application based on a permission setting token that is included in the installation file; and store, in a database, an indication that the application is granted the permission.
66 Citations
13 Claims
-
1. An electronic device comprising:
-
a memory; and at least one processor configured to; install an application by using an installation file associated with the application; detect whether the installation file includes a permission setting token; verify a validity of the permission setting token, wherein the verification is performed based on authentication information that is embedded in the permission setting token; grant at least one permission to the application based on verifying that the permission setting token is valid; store, in a database, an indication that the application is granted the permission; when the application is executed, search the database for the indication; if the indication of the permission is present in the database, execute one or more functions of the application permitted by the permission; and if the indication of the permission is absent from the database, execute one or more functions of the application permitted by a signature of the installation file, wherein the permission setting token is signed with a key uniquely identifying a manufacturer of the electronic device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
installing, by an electronic device, an application by using an installation file associated with the application; detecting whether the installation file includes a permission setting token; verifying a validity of the permission setting token, wherein the verification is performed based on authentication information that is embedded in the permission setting token; granting at least one permission to the application based on verifying that the permission setting token is valid; storing, in a database, an indication that the application is granted the permission; when the application is executed, searching the database for the indication; if the indication is present in the database, executing one or more functions of the application permitted by the permission; and if the indication is absent from the database, executing one or more functions of the application permitted by a signature of the installation file, wherein the permission setting token is signed with a key uniquely identifying a manufacturer of the electronic device. - View Dependent Claims (11, 12)
-
-
13. An electronic device comprising:
-
a memory; and at least one processor configured to; install an application by using an installation file associated with the application; detect whether the installation file includes a permission setting token; verify a validity of the permission setting token, wherein the verification is performed based on authentication information that is embedded in the permission setting token; grant at least one permission to the application based on the permission setting token and a signature of the installation file when the permission setting token is verified; store, in a database, an indication that the application is granted the permission; when the application is executed, search the database for the indication; if the indication of the permission is present in the database, execute one or more functions of the application permitted by the permission; and if the indication of the permission is absent from the database, execute one or more functions of the application permitted by the signature of the installation file.
-
Specification