METHOD FOR SECURING A GADGET ACCESS TO A LIBRARY
First Claim
1. Method for securing the operation of a gadget requiring access to features hosted in a library (44) of a gadget container (36) in order to implement these features into a primary file (35) of such gadget, the primary file (35) being sent by a Web hosting server (40) to the gadget container (36) to allow the implementation of the features with the primary file (35), wherein:
- the gadget container (36) retrieves the primary file (35) of the gadget from the Web hosting server (40) with a signature (16), based on a public key (24)/private key (14) encryption system, associated therein,the gadget container (36) controls, with a public key (24) of the public/private key encryption system, the signature (16) associated to the gadget primary file,the gadget container (36) decides to authorize or to refuse the implementation of its library (44) features depending on whether the signature (16) associated with the primary file (35) is accepted or refused.
3 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a method for securing the operation of a gadget requiring access to features hosted in a library of a gadget container (36) in order to implement these features into a primary file (35) of such gadget, the primary file (35) being sent by a Web hosting server (40) to the gadget container (36) to allow the implementation of the features with the primary file (35), wherein: —the gadget container (36) retrieves the primary file (35) of the gadget from the Web hosting server (40) with a signature (16), based on a public key/private key encryption system, associated therein,—the gadget container (36) verifies, with a public key of the public/private key encryption system, the signature (16) associated to the gadget primary file, —the gadget container (36) decides to authorize or to refuse the implementation of its library (44) features depending on whether the signature (16) associated with the primary file (35) is accepted or refused.
10 Citations
11 Claims
-
1. Method for securing the operation of a gadget requiring access to features hosted in a library (44) of a gadget container (36) in order to implement these features into a primary file (35) of such gadget, the primary file (35) being sent by a Web hosting server (40) to the gadget container (36) to allow the implementation of the features with the primary file (35), wherein:
-
the gadget container (36) retrieves the primary file (35) of the gadget from the Web hosting server (40) with a signature (16), based on a public key (24)/private key (14) encryption system, associated therein, the gadget container (36) controls, with a public key (24) of the public/private key encryption system, the signature (16) associated to the gadget primary file, the gadget container (36) decides to authorize or to refuse the implementation of its library (44) features depending on whether the signature (16) associated with the primary file (35) is accepted or refused. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 11)
-
-
10. Gadget container (36) hosting features to be implemented into a primary file (35) of a gadget, such primary file (35) being received from a Web hosting server (40) upon request by the gadget container (36), wherein the gadget container (36) comprises:
-
Means for retrieving the primary file (35) of the gadget with a signature, based on public/private key encryption system, associated therein, Means (50) for controlling, with a public key of the public/private key encryption system, the signature associated to the gadget primary file, Means for authorizing or refusing the access to the library'"'"'s (44) features depending on whether it accepts or refuses the signature associated within the primary file.
-
Specification