Permission token managemnet system, permission token management method, program and recording medium
First Claim
Patent Images
1. A permission token management system comprising:
- a token table for storing tokens which correspond respectively to a plurality of permissions installed in a terminal and are calculated by a predetermined conversion process performed to permission character strings indicating the permissions;
conversion means for, when a permission character string indicating a specific permission is input, performing the predetermined conversion process to the permission character string; and
searching means for searching the token table using a token which is a conversion result of the conversion means, and determining whether the token exists in the token table or not.
1 Assignment
0 Petitions
Accused Products
Abstract
A token table stores tokens corresponding respectively to permissions installed in a terminal. Prior to downloading an application program (AP), when a permission character string necessary for normally operating an AP intended to be downloaded is input from an installer, a hash value calculating means obtains a hash value of the permission character string, and a searching means searches the token table using the hash value. If a token matching the hash value exists, an instruction to authorize the download is output, and if it does not exist, an instruction not to authorize the download is output.
25 Citations
12 Claims
-
1. A permission token management system comprising:
-
a token table for storing tokens which correspond respectively to a plurality of permissions installed in a terminal and are calculated by a predetermined conversion process performed to permission character strings indicating the permissions;
conversion means for, when a permission character string indicating a specific permission is input, performing the predetermined conversion process to the permission character string; and
searching means for searching the token table using a token which is a conversion result of the conversion means, and determining whether the token exists in the token table or not. - View Dependent Claims (8, 9)
-
-
2. A permission token management method comprising the steps of:
-
storing tokens which correspond respectively to a plurality of permissions installed in a terminal and are calculated by a predetermined conversion process performed to permission character strings indicating the permissions;
when a permission character string indicating a specific permission is input, performing the predetermined conversion process to the permission character string; and
searching a token table using a token which is a conversion result of the conversion process, and determining whether the token exists in the token table or not. - View Dependent Claims (3, 4)
-
-
5. A permission token management system comprising:
-
a token table for storing tokens which correspond respectively to a plurality of permissions installed in a terminal and are calculated by a predetermined conversion process performed to permission character strings indicating the permissions;
search request/saving means for, when a permission character string indicating a permission necessary for normally operating an application program intended to be downloaded is input, outputting a search request including the permission character string;
conversion means for performing the predetermined conversion process to the permission character string included in the search request output from the search request/saving means, and outputting a token which is a conversion result; and
first searching means for searching the token table using the token output from the conversion means to thereby determine whether a permission necessary for normally operating the application program is installed in the terminal or not. - View Dependent Claims (6, 7)
-
-
10. A permission token management method comprising the steps of:
-
storing tokens which correspond respectively to a plurality of permissions installed in a terminal and are calculated by performing a predetermined conversion process to permission character strings indicating the permissions;
when a permission character string indicating a permission necessary for normally operating an application program intended to be downloaded is input, outputting a search request including the permission character string;
performing the predetermined conversion process to the permission character string included in the search request, and outputting a token which is a conversion result; and
by using the token, determining whether a permission necessary for normally operating the application program is installed in the terminal or not. - View Dependent Claims (11, 12)
-
Specification