Managing application access to certificates and keys
First Claim
Patent Images
1. A method of handling attempted access to a store in a memory of a device, the method comprising:
- receiving, at a computing device, from an application, a request for access to the store;
detecting an identity attribute for the application;
detecting a class attribute for the application, wherein the class attribute for the application is associated with a mode of operation of the device;
basing a namespace of the application on the identity attribute for the application and the class attribute for the application;
determining that the application can access the store, wherein the determining that the application can access the store comprises determining that the store is in the namespace of the application; and
based on the determining, processing the request.
4 Assignments
0 Petitions
Accused Products
Abstract
Plural modes of operation, each associated with a class attribute, may be established on a mobile device. The present application discloses a method of handling an application launch request, a computing device for carrying out the method and a computer readable medium for adapting a processor to carry out the method. The method includes receiving a launch request identifying an application that is to be launched, acquiring an identity for the application, acquiring a class for the application, labeling the application with the identity and the class and launching the application.
-
Citations
15 Claims
-
1. A method of handling attempted access to a store in a memory of a device, the method comprising:
-
receiving, at a computing device, from an application, a request for access to the store; detecting an identity attribute for the application; detecting a class attribute for the application, wherein the class attribute for the application is associated with a mode of operation of the device; basing a namespace of the application on the identity attribute for the application and the class attribute for the application; determining that the application can access the store, wherein the determining that the application can access the store comprises determining that the store is in the namespace of the application; and based on the determining, processing the request. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computing device comprising:
-
a memory; a processor adapted to; receive, from an application, a request for access to a store; detect an identity attribute for the application; detect a class attribute for the application, wherein the class attribute for the application is associated with a mode of operation of the computing device; base a namespace of the application on the identity attribute for the application and the class attribute for the application; determine that the application can access the store, wherein to determine that the application can access the store, the processor is adapted to determine that the store is in the namespace of the application; and process the request based on the determining. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium containing computer-executable instructions that, when performed by a processor in a computing device, cause the processor to:
-
receive, from an application, a request for access to a store; detect an identity attribute for the application; detect a class attribute for the application, wherein the class attribute for the application is associated with a mode of operation of the computing device; base a namespace of the application on the identity attribute for the application and the class attribute for the application; determine that the application can access the store, wherein to determine that the application can access the store, the instructions cause the processor to determine that the store is in the namespace of the application; and process the request based on the determining. - View Dependent Claims (12, 13, 14, 15)
-
Specification