System and method for third party creation of applications for mobile appliances
First Claim
1. A method of providing a secure environment for compilation of an authorized application, the method comprising the steps of:
- receiving, at a server, encrypted application data from a first party;
decrypting, at the server, the encrypted application data to produce decrypted application data;
receiving, at the server, encrypted authorization data from a second party, different from the first party;
decrypting, at the server, the encrypted authorization data to produce decrypted authorization data; and
providing the decrypted application data and the decrypted authorization data to a compiler adapted to compile an application authorized for an intended type of device,wherein the decrypted authorization data is indicative of authorization by a third party for the application to run on the intended type of device, andwherein the decrypted authorization data enables the application to run on a device of the intended type.
6 Assignments
0 Petitions
Accused Products
Abstract
The creation of an application for any mobile appliance, for example Apple'"'"'s iPhone, requires several elements to be present at compile time. In the Apple example of an enterprise application where an entity wishes to develop applications internally for its staff, two of these elements are the source code and a digital certificate. These must be combined in the compiler so that the application may be properly authorized to run in the appliance. Where the owner of the source code and the owner of the digital certificate are not the same, serious concerns arise because each element must be secured. An intermediating system and method are described that allows each party to cooperate securely through a third party escrow service to produce the complied application while leaving no unwanted residue of the independent parts.
45 Citations
18 Claims
-
1. A method of providing a secure environment for compilation of an authorized application, the method comprising the steps of:
-
receiving, at a server, encrypted application data from a first party; decrypting, at the server, the encrypted application data to produce decrypted application data; receiving, at the server, encrypted authorization data from a second party, different from the first party; decrypting, at the server, the encrypted authorization data to produce decrypted authorization data; and providing the decrypted application data and the decrypted authorization data to a compiler adapted to compile an application authorized for an intended type of device, wherein the decrypted authorization data is indicative of authorization by a third party for the application to run on the intended type of device, and wherein the decrypted authorization data enables the application to run on a device of the intended type. - View Dependent Claims (2, 3, 4, 5, 6, 7, 17, 18)
-
-
8. A server for providing a secure environment for compilation of an authorized application, the server being configured to:
-
receive encrypted application data from a first party; decrypt the encrypted application data to produce decrypted application data; receive encrypted authorization data from a second party, different from the first party; decrypt the encrypted authorization data to produce decrypted authorization data; and provide the decrypted application data and the decrypted authorization data to a compiler adapted to compile an application authorized for an intended type of device, wherein the decrypted authorization data is indicative of authorization by a third party for the application to run on the intended type of device, and wherein the decrypted authorization data enables the application to run on a device of the intended type. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory, computer-readable storage medium comprising computer-readable instructions stored thereon, the computer-readable instructions, when executed by a server, cause the server to perform a method of providing a secure environment for compilation of an authorized application, the method comprising the steps of:
-
receiving, at the server, encrypted application data from a first party; decrypting, at the server, the encrypted application data to produce decrypted application data; receiving, at the server, encrypted authorization data from a second party, different from the first party; decrypting, at the server, the encrypted authorization data to produce decrypted authorization data; and providing the decrypted application data and the decrypted authorization data to a compiler adapted to compile an application authorized for an intended type of device, wherein the decrypted authorization data is indicative of authorization by a third party for the application to run on the intended type of device, and wherein the decrypted authorization data enables the application to run on a device of the intended type.
-
-
16. A method of providing a secure environment for generation of authorized content, the method comprising the steps of:
-
receiving, at a server, encrypted content data from a first party; decrypting, at the server, the encrypted content data to produce decrypted content data; receiving, at the server, encrypted authorization data from a second party different from the first party; decrypting, at the server, the encrypted authorization data to produce decrypted authorization data; and providing the decrypted content data and the decrypted authorization data to a compiler adapted to compile content authorized for an intended type of device, wherein the decrypted authorization data is indicative of authorization by a third party for the content to be accessed by the intended type of device, and wherein the decrypted authorization data enables the content to be accessed by a device of the intended type.
-
Specification