×

Reputation-based authorization decisions

  • US 7,991,902 B2
  • Filed: 12/08/2006
  • Issued: 08/02/2011
  • Est. Priority Date: 12/08/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. One or more computer-readable storage devices having computer-readable instructions therein that, when executed by a computing device, cause the computing device to perform acts comprising:

  • allowing a software application to run on a client computing device, the software application, when running, being an executing software application;

    receiving, from the executing software application that is allowed to run on the client computing device, a request to perform a particular operation on a file on the client computing device;

    receiving an authorization input, the authorization input including a reputation value indicative of the executing software application'"'"'s reputation;

    comparing the authorization input including the reputation value to an authorization rule;

    in response to the comparing, outputting a granular authorization decision pertaining to the requested particular operation on the file on the client computing device, wherein the reputation value comprises a single reputation value aggregated from a plurality of reputation metadata from a plurality of different reputation metadata providers; and

    wherein the reputation value is based on;

    (i) input received from a group of human users indicating each human user'"'"'s experience with the executing software application, and (ii) input received from a group of computing entities indicating each computing entity'"'"'s review or analysis of the executing software application;

    wherein;

    in an event the authorization input meets or exceeds an authorization rule of a first type, in accordance with the authorization rule of the first type, the granular authorization decision allows the executing software application to perform the particular operation requested to be performed on the file on the client computing device;

    in an event the authorization input meets or exceeds an authorization rule of a second type, in accordance with the authorization rule of the second type, the granular authorization decision presents a prompt for user input acceding to the executing software application performing the particular operation requested to be performed on the file on the client computing device; and

    in an event the authorization input does not meet either the authorization rule of the first type or the authorization rule of the second type, in accordance with a third authorization rule, the granular authorization decision blocks the executing software application from performing the particular operation requested to be performed on the file on the client computing device.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×