×

Protection of user data in hosted application environments

  • US 9,430,653 B2
  • Filed: 04/14/2015
  • Issued: 08/30/2016
  • Est. Priority Date: 11/13/2012
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of converting an original application into a distributed application, the method comprising:

  • splitting, by a processor, the original application into a plurality of application components, along security relevant boundaries, wherein the original application performs a plurality of functions;

    constructing, by the processor, a customized licensing agreement with a distinct textual section for each application component;

    removing, by the processor, each textual section from the licensing agreement that is associated with one of the application components that has access to an external party and to user data of a user, when a privacy policy of the user indicates that the corresponding external party is to be denied access to the user data;

    mapping, by the processor, the application components to hosting infrastructure boundaries to enable the application components to be hosted by separate entities communicating with one another through a computer network;

    using, by the processor, a mechanism to enforce the privacy policy to provide secure communications between the application components; and

    presenting, by the processor, the customized licensing agreement to the user for approval by the user before access to the distributed application is enabled.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×