System and method for authentication of applications in a non-trusted network environment
First Claim
1. A method for verifying an application'"'"'s authorization to receive position information, comprising:
- sending a challenge key to a device on which an application is running;
sending an application key to the application;
sending a challenge string to the application;
receiving an encrypted hash of the challenge key, application key and challenge string from the application;
verifying that the encrypted hash is an expected value; and
sending positioning server information to the application.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for verifying an application'"'"'s authorization to receive position information comprising receiving a request for position information from the application, determining that the application has not yet been approved to receive the requested position information, sending a challenge key to the device on which the application is running, sending an application key to the application, sending a challenge string to the application, receiving an encrypted hash of the challenge key, application key and challenge string from the application, verifying that the encrypted hash is an expected value, and sending positioning server information to the application.
-
Citations
30 Claims
-
1. A method for verifying an application'"'"'s authorization to receive position information, comprising:
-
sending a challenge key to a device on which an application is running;
sending an application key to the application;
sending a challenge string to the application;
receiving an encrypted hash of the challenge key, application key and challenge string from the application;
verifying that the encrypted hash is an expected value; and
sending positioning server information to the application. - View Dependent Claims (2, 3, 4)
-
-
5. A computer program product having a computer readable medium having computer program logic recorded thereon for providing services to a wireless device, comprising:
-
code for receiving a request for location information from an application adapted to provide location-aware services to the wireless device;
code for verifying that a user has given permission to the application to request the location information; and
code for authorizing the application to receive the location information. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer program product having a computer readable medium having computer program logic recorded thereon for providing services to a wireless device, comprising:
-
code for requesting user location information from a network resource;
code for prompting a user for permission to request the location information; and
code for authorizing an application, operable to provide location-aware services to the wireless device, to receive the location information. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method for approving an application'"'"'s request for position information, comprising:
-
sending an application name and an application identifier to a location services manager;
prompting a user to enter a challenge key that was sent by the location services manager;
receiving an application key from the location services manager;
receiving a challenge string from the location services manager;
creating an encrypted hash of the challenge key, application key and challenge string;
sending the encrypted hash to the location services manager; and
receiving a positioning server address from the location services manager. - View Dependent Claims (28, 29, 30)
-
Specification