Security for software in a computing system
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving, at a computer, a request to install an application associated with a developer of the application, the request to install being received from a potential user of the application;
in response to the request to install, requesting, by the computer, trust information corresponding to the application and indicating whether a trusted entity trusts the application, the trusted entity being another user who trusts the application, is trusted by the potential user and is different than the developer;
receiving the trust information at the computer, wherein the received trust information corresponding to the application and indicating whether the trusted entity trusts the application comprises a public key of the trusted entity and a digital signature relating to the application and generated by the trusted entity;
validating, by the computer, the digital signature relating to the application using the public key of the trusted entity, wherein the validating results in an indication that the trusted entity trusts the application; and
installing the application on the computer based on the indication that the trusted entity trusts the application.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and computer-program products enable a security system. Trust information is received, at a computer, where the trust information corresponds to an application and wherein the trust information comprising a digital signature from a trusted entity that is different than the developer of the application. A determination is made whether a user associated with the computer trusts the trusted entity. The digital signature is used to install the application on the computer if the user trusts the trusted entity.
-
Citations
35 Claims
-
1. A computer-implemented method comprising:
-
receiving, at a computer, a request to install an application associated with a developer of the application, the request to install being received from a potential user of the application; in response to the request to install, requesting, by the computer, trust information corresponding to the application and indicating whether a trusted entity trusts the application, the trusted entity being another user who trusts the application, is trusted by the potential user and is different than the developer; receiving the trust information at the computer, wherein the received trust information corresponding to the application and indicating whether the trusted entity trusts the application comprises a public key of the trusted entity and a digital signature relating to the application and generated by the trusted entity; validating, by the computer, the digital signature relating to the application using the public key of the trusted entity, wherein the validating results in an indication that the trusted entity trusts the application; and installing the application on the computer based on the indication that the trusted entity trusts the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method, comprising:
-
receiving, at a computer, a request to install an application associated with a developer of the application, the request to install being received from a potential user of the application; in response to the request to install, requesting, by the computer, trust information corresponding to the developer and indicating whether a trusted entity trusts the developer, the trusted entity being another user who trusts the developer, is trusted by the potential user and is different than the developer; receiving the trust information at the computer, wherein the received trust information corresponding to the developer and indicating whether the trusted entity trusts the developer comprises a public key of the trusted entity and a digital signature relating to the developer and generated by the trusted entity; validating, by the computer, the digital signature relating to the developer using the public key of the trusted entity, wherein the validating results in an indication that the trusted entity trusts the developer; querying the potential user by the computer to obtain user confirmation that the potential user trusts the trusted entity; and installing the application on the computer based on the indication that the trusted entity trusts the developer and the user confirmation that the potential user trusts the trusted entity. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computer-implemented method comprising:
-
storing, at a network-based information server system, trust information corresponding to an application associated with a developer of the application, the trust information received from a trusted entity and indicating whether the trusted entity trusts any version of the application associated with the developer, where the trusted entity is a user of the application who trusts both the application and the developer and who is different than the developer, wherein the stored trust information indicating whether the trusted entity trusts any version of the application associated with the developer comprises a public key of the trusted entity and a digital signature generated by the trusted entity and relating to the application and the developer; receiving, at the network-based information server system from a computer associated with another user who trusts the trusted entity, a request specifying a name of the application associated with the developer; identifying, based on the request, the stored trust information indicating whether the trusted entity trusts any version of the application associated with the developer; and transmitting the identified trust information to the computer associated with the other user who trusts the trusted entity for use in installing any version of the application associated with the developer and having the specified name. - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. A system comprising:
-
a user interface configured to receive input from a user associated with the system; a cache device; one or more processors communicatively coupled with the cache device; and a non-transitory storage medium storing instructions that, when executed by the one or more processors, cause the system to perform operations comprising; identifying an application associated with a developer of the application; receiving, from a network-based information server system, trust information corresponding to the developer and indicating whether a trusted entity trusts the developer, the trusted entity being another user of the application who trusts the application, is trusted by the user associated with the system and is different from the developer, wherein the received trust information corresponding to the developer and indicating whether the trusted entity trusts the developer comprises a public key of the trusted entity and digital signature relating to the developer and generated by the trusted entity; updating the cache device with the trust information received from the network-based information server system; determining that the trusted entity trusts the developer, at least in part, by validating the digital signature relating to the developer using the public key of the trusted entity; and installing either the application or any other application developed by the developer based on the determining that the trusted entity trusts the developer. - View Dependent Claims (23, 24, 25, 26, 27)
-
-
28. A non-transitory computer-readable storage medium encoding a computer program product operable to cause data processing apparatus to perform operations comprising:
-
identifying, at a computer associated with a user, an application associated with a developer of the application; receiving trust information at the computer, the trust information corresponding to the application and indicating whether a trusted entity trusts the application, the trusted entity being another user who trusts the application, is trusted by the user and is different than the developer, wherein the received trust information corresponding to the application and indicating whether the trusted entity trusts the application comprises a public key of the trusted entity and a digital signature relating to the application and generated by the trusted entity; determining that the trusted entity trusts the application at least in part by validating the digital signature relating to the application using the public key associated with the trusted entity; and installing the application based on the determining that the trusted entity trusts the application. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35)
-
Specification