×

Rule-based application access management

  • US 9,380,063 B2
  • Filed: 05/14/2015
  • Issued: 06/28/2016
  • Est. Priority Date: 10/23/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • providing a streaming software container including a plurality of resources used in executing a streaming software application at a client device, the plurality of resources including access control rules defining access to the plurality of resources;

    receiving a request for a resource used in executing the streaming software application from a requestor;

    determining if the resource is one of the plurality of resources included in the streaming software container;

    if it is determined that the resource is absent from the plurality of resources included in the streaming software container, then providing the resource to the requestor;

    if it is determined that the resource is one of the plurality of resources included in the streaming software container, then;

    determining if the requestor has rules-based access to the resource according to the access control rules;

    providing the resource from the streaming software container to the requestor for executing the streaming software application if the requestor has rules-based access to the resource;

    determining an altitude for the resource;

    determining the access control rules for the resource based on the altitude;

    determining if the access control rules for the resource specify accept;

    if it is determined that the access control rules for the resource fail to specify accept, determining if the access control rules for the resource specify pause;

    if it is determined that the access control rules for the resource fail to specify pause, determining if the access control rules for the resource specify pass through;

    if it is determined that the access control rules for the resource specify pass through;

    decrementing the altitude for the resource to a lower altitude;

    determining new access control rules for the resource using a process ID and a resource ID at the lower altitude.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×