Systems, methods and apparatus to apply permissions to applications
First Claim
1. An apparatus to authorize an application, comprising:
- an address trust manager to obtain a first network address having a request for address authentication from a first entity, the request including a second network address associated with a second entity, the second entity having downloaded the application from the first entity via the first network address;
an address associator to compare the first network address to addresses in a trusted address database to determine whether the first network address is trusted; and
a shadow environment communicator to generate a signed message based on the comparison, at least one of the address trust manager, the address associator, or the shadow environment communicator including a logic circuit, the address trust manager to;
in response to a match in the trusted address database, transmit the signed message with an indication of authorization to the second entity via the first network address; and
in response to a lack of a match in the trusted address database, transmit the signed message with an indication of non-authorization to the second entity via the first network address.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus are disclosed to apply permissions to applications. A disclosed example apparatus includes an address trust manager to obtain a first network address having a request for address authentication from a first entity, the first network address having a second network address associated with a second entity to execute the application, an address associator to compare the first network address to a trusted address database to determine whether the first network address is trusted, and a shadow environment communicator to generate a signed message based on the comparison of the trusted address database, the address trust manager to transmit the signed message to the second entity with an indication of authorization via the first network address in response to a match in the trusted address database, and transmit the signed message to the second entity with an indication of non-authorization via the first network address in response to a lack of a match in the trusted address database.
-
Citations
20 Claims
-
1. An apparatus to authorize an application, comprising:
-
an address trust manager to obtain a first network address having a request for address authentication from a first entity, the request including a second network address associated with a second entity, the second entity having downloaded the application from the first entity via the first network address; an address associator to compare the first network address to addresses in a trusted address database to determine whether the first network address is trusted; and a shadow environment communicator to generate a signed message based on the comparison, at least one of the address trust manager, the address associator, or the shadow environment communicator including a logic circuit, the address trust manager to; in response to a match in the trusted address database, transmit the signed message with an indication of authorization to the second entity via the first network address; and in response to a lack of a match in the trusted address database, transmit the signed message with an indication of non-authorization to the second entity via the first network address. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method to authorize an application, comprising:
-
obtaining, by executing an instruction with a processor, a first network address from a request for address authentication from a first entity, the request including a second network address associated with a second entity, the second entity having downloaded the application from the first entity via the first network address; comparing, by executing an instruction with the processor, the first network address to addresses in a trusted address database to determine whether the first address is trusted; generating, by executing an instruction with the processor, a signed message based on the comparison; in response to a match in the trusted address database, transmitting the signed message with an indication of authorization form the processor to the second entity via the first network address; and in response to a lack of a match in the trusted address database, transmitting the signed message with an indication of non-authorization from the processor to the second entity via the first network address. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computer-readable storage device comprising instructions that, when executed, cause a machine to perform operations comprising:
-
accessing a first network address from a request for address authentication from a first entity, the request including a second network address associated with a second entity, the second entity having downloaded the application from the first entity via the first network address; comparing the first network address to address in a trusted address database to determine whether the first address is trusted; generating a signed message based on the comparison; in response to a match in the trusted address database, transmitting the signed message with an indication of authorization to the second entity via the first network address; and in response to a lack of a match in the trusted address database, transmitting the signed message with an indication of non-authorization to the second entity via the first network address. - View Dependent Claims (17, 18, 19, 20)
-
Specification