SYSTEMS AND METHODS FOR DEPLOYING RICH INTERNET APPLICATIONS IN A SECURE COMPUTING ENVIRONMENT
First Claim
1. A distributed computer system comprising:
- a first computer system comprising a run-time environment executing one or more rich internet applications;
a second computer system communicatively coupled to the first computer system, the second computer system executing an administration server;
wherein the run-time environment is configured to query the administration server to perform at least one of;
authenticating a user of the first computer system, determining whether an application is allowed to be executed within the run-time environment, or determining whether an application being executed by the run-time environment is allowed to access a certain function exposed by an application-programming interface (API) of the run-time environment.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for deploying rich internet applications in a secure computing environment. An example distributed computer system may comprise: a first computer system comprising a run-time environment executing one or more rich internet applications; a second computer system communicatively coupled to the first computer system, the second computer system executing an administration server; wherein the run-time environment is configured to query the administration server to perform at least one of: authenticating a user of the first computer system, determining whether an application is allowed to be executed within the run-time environment, or determining whether an application being executed by the run-time environment is allowed to access a certain function exposed by an application-programming interface (API) of the run-time environment.
-
Citations
20 Claims
-
1. A distributed computer system comprising:
-
a first computer system comprising a run-time environment executing one or more rich internet applications; a second computer system communicatively coupled to the first computer system, the second computer system executing an administration server; wherein the run-time environment is configured to query the administration server to perform at least one of;
authenticating a user of the first computer system, determining whether an application is allowed to be executed within the run-time environment, or determining whether an application being executed by the run-time environment is allowed to access a certain function exposed by an application-programming interface (API) of the run-time environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, comprising:
-
providing, by a first computer system, a run-time environment for executing rich internet applications; responsive to receiving an input by a user selecting a first application residing on a second computer system, querying an administration server to determine whether the first application is allowed to be executed within the run-time environment; and responsive to determining that the first application is allowed to be executed, downloading the application from the second computer system; and executing the first application within a first process associated with the run-time environment. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification