Controlling computer applications' access to data
First Claim
1. One or more computer-readable media comprising computer-executable instructions for controlling an application attempting to access data, the computer-executable instructions comprising instructions for:
- associating the application with a security token comprising an application ID;
receiving a request from the application for access to the data; and
evaluating the request based in part on comparison of the security token to a listing of approved application IDs.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are described that control attempts made by an application to access data. In one embodiment, the application is associated with a security token that includes an application ID. In operation, the system receives a request, initiated by the application, for access to the data. The system is configured to evaluate the request for access based in part on comparison of the security token and a listing of approved application IDs associated with the data.
108 Citations
20 Claims
-
1. One or more computer-readable media comprising computer-executable instructions for controlling an application attempting to access data, the computer-executable instructions comprising instructions for:
-
associating the application with a security token comprising an application ID;
receiving a request from the application for access to the data; and
evaluating the request based in part on comparison of the security token to a listing of approved application IDs. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for controlling access to data, the method comprising:
-
identifying a strong application ID associated with an application;
configuring a token comprising the strong application ID; and
determining if the access to the data should be permitted by comparing the token with an access control list associated with the data. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system configured to control computer applications'"'"' access to data, the system comprising:
-
an environment within which a process may be operated;
a security token containing a strong application ID associated with the process; and
a system security function configured to make a decision to allow or prevent access to the data by the process, wherein the decision is made using the strong application ID from the security token. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification