Enhanced security using service provider authentication
First Claim
1. A method for providing enhanced security on a network node, comprising:
- responsive to receiving an application over a communications network, comparing a first carrier identification associated with the application to a second carrier identification; and
responsive to identifying a match between the first and second carrier identifications, assigning permissions to the application that provide access to privileged functionality on the network node.
4 Assignments
0 Petitions
Accused Products
Abstract
A method (100) and an apparatus (210) for providing enhanced security using service provider authentication. In addition to authenticating an application signature (245) against a root certificate (235) stored on the network node (210), a first carrier identification (250) associated with the application (240) is compared to a second carrier identification (255). If the first and second carrier identifications match, then the application can be assigned to a trusted protection domain and granted permissions which provide privileged access to the network node. For example, the application can be granted permission to be installed and/or executed on the network node. Otherwise the application can be denied privileged access. Accordingly, a carrier'"'"'s applications will be only installed onto network nodes that are intended recipients of the applications.
58 Citations
22 Claims
-
1. A method for providing enhanced security on a network node, comprising:
-
responsive to receiving an application over a communications network, comparing a first carrier identification associated with the application to a second carrier identification; and
responsive to identifying a match between the first and second carrier identifications, assigning permissions to the application that provide access to privileged functionality on the network node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus for processing an application, comprising:
-
a network interface for receiving the application over a communications network;
a processor for comparing a first carrier identification associated with the application to a second carrier identification and, responsive to identifying a match between the first and second carrier identifications, assigning permissions to the application that provide access to privileged functionality on the apparatus. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification