SYSTEMS, METHODS AND APPARATUS TO APPLY PERMISSIONS TO APPLICATIONS
First Claim
1. An apparatus to authorize an application, comprising:
- an address trust manager to obtain a first network address having a request for address authentication from a first entity, the first network address including a second network address associated with a second entity to execute the application;
an address associator to compare the first network address to a trusted address database to determine whether the first network address is trusted;
anda shadow environment communicator to generate a signed message based on the comparison of the trusted address database, the address trust manager to;
transmit the signed message to the second entity via the first network, the signed message to be transmitted with an indication of authorization in response to a match in the trusted address database;
andtransmit the signed message to the second entity via the first network, the signed message to be transmitted with an indication of non-authorization in response to a lack of a match in the trusted address database.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus are disclosed to apply permissions to applications. A disclosed example apparatus includes an address trust manager to obtain a first network address having a request for address authentication from a first entity, the first network address having a second network address associated with a second entity to execute the application, an address associator to compare the first network address to a trusted address database to determine whether the first network address is trusted, and a shadow environment communicator to generate a signed message based on the comparison of the trusted address database, the address trust manager to transmit the signed message to the second entity with an indication of authorization via the first network address in response to a match in the trusted address database, and transmit the signed message to the second entity with an indication of non-authorization via the first network address in response to a lack of a match in the trusted address database.
-
Citations
28 Claims
-
1. An apparatus to authorize an application, comprising:
-
an address trust manager to obtain a first network address having a request for address authentication from a first entity, the first network address including a second network address associated with a second entity to execute the application; an address associator to compare the first network address to a trusted address database to determine whether the first network address is trusted; and a shadow environment communicator to generate a signed message based on the comparison of the trusted address database, the address trust manager to; transmit the signed message to the second entity via the first network, the signed message to be transmitted with an indication of authorization in response to a match in the trusted address database; and transmit the signed message to the second entity via the first network, the signed message to be transmitted with an indication of non-authorization in response to a lack of a match in the trusted address database. - View Dependent Claims (2, 3, 4, 7, 8, 9, 10)
-
-
5. (canceled)
-
6. (canceled)
-
11. A method to authorize an application, comprising:
-
obtaining, with a processor, a first network address having a request for address authentication from a first entity, the first network address including a second network address associated with a second entity to execute the application; comparing the first network address to addresses in a trusted address database to determine whether the first address is trusted; generating a signed message; transmitting the signed message to the second entity with an indication of authorization via the first network address in response to a match between the first network address and an address in the trusted address database; and transmitting the signed message to the second entity with an indication of non-authorization via the first network address in response to a lack of a match between the first network address and an address in the trusted address database. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
-
12. (canceled)
-
13. (canceled)
-
14. (canceled)
-
21. A computer-readable storage device comprising instructions that, when executed, cause a machine to perform operations comprising:
-
accessing a first network address having a request for address authentication from a first entity, the first network address having a second network address associated with a second entity to execute the application; comparing the first network address to a trusted address database to determine whether the first address is trusted; generating a signed message based on the comparison of the trusted address database; transmitting the signed message to the second entity via the first network address, the signed message to be transmitted with an indication of authorization in response to a match in the trusted address database; and transmitting the signed message to the second entity via the first network address, the signed message to be transmitted with an indication of non-authorization in response to a lack of a match in the trusted address database. - View Dependent Claims (23, 24, 25, 26)
-
-
22. (canceled)
-
27. (canceled)
-
28. (canceled)
Specification