INTRA-APPLICATION PERMISSIONS ON AN ELECTRONIC DEVICE
First Claim
1. A method comprising:
- receiving, by a first application that is installed on a device, a request from a second application for permission to access data associated with the first application;
accessing a permissions record for the second application, wherein the permissions record comprises an identification of the first application from which a permission is needed; and
verifying that the second application has permission to access the data associated with the first application based, at least in part, on the permissions record.
2 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments are provided in which intra-application permissions may be granted on an electronic device. An application may access data from another application if the application has the proper permission signed by a permissions server. In one embodiment, a request is received by a first application that is installed on a device. The request is from a second application for permission to access data associated with the first application. A permissions record for the second application may be stored in an application package of the second application. The first application may access the permissions record to determine whether the second application has permission to access the data associated with the first application. The first application may provide the second application with access to the data associated with the first application based, at least in part, on the permissions record stored in the application package of the second application.
-
Citations
25 Claims
-
1. A method comprising:
-
receiving, by a first application that is installed on a device, a request from a second application for permission to access data associated with the first application; accessing a permissions record for the second application, wherein the permissions record comprises an identification of the first application from which a permission is needed; and verifying that the second application has permission to access the data associated with the first application based, at least in part, on the permissions record. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus comprising:
-
a processor; and a first application installed on the apparatus and executable on the processor, the first application configured to; receive a request from a second application for permission to access data associated with the first application; access a permissions record for the second application, wherein the permissions record comprises an identification of the first application from which a permission is needed; and verify that the second application has permission to access the data associated with the first application based, at least in part, on the permissions record. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer readable storage medium having computer usable program code embodied therewith, the computer usable program code comprising a computer usable program code that is part of a first application installed on a device, the computer usable program code configured to:
-
receive a request from a second application for a permission to access data associated with the first application; access a permissions record for the second application, wherein the permissions record comprises an identification of the first application from which the permission is needed; and verify that the second application has permission to access the data associated with the first application based, at least in part, on the permissions record. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification