Executing applications at appropriate trust levels
First Claim
Patent Images
1. A computer implemented method comprising:
- determining potentially dangerous operations of an application by finding one or more universal resource locators (URLs) in the application and analyzing code associated with each URL effective to determine whether the code is configured to communicate with one or more remote locations; and
preventing or intercepting the potentially dangerous operations of the application by embedding a requested trust level into the application, the requested trust level comprising at least one of;
a full trust level that requests permission to communicate with any remote location;
ora location-dependent trust level that requests permission to communicate with at least one of the one or more remote locations.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods that enable execution of applications at appropriate trust levels are described. These systems and methods can determine appropriate trust levels by comparing applications'"'"' permitted trust levels with their requested trust levels. These systems and method can determine applications'"'"' permitted trust levels by comparing applications'"'"' execution locations with their published locations. Applications can also be executed at a restricted trust level at which potentially dangerous operations are prohibited.
813 Citations
26 Claims
-
1. A computer implemented method comprising:
-
determining potentially dangerous operations of an application by finding one or more universal resource locators (URLs) in the application and analyzing code associated with each URL effective to determine whether the code is configured to communicate with one or more remote locations; and preventing or intercepting the potentially dangerous operations of the application by embedding a requested trust level into the application, the requested trust level comprising at least one of; a full trust level that requests permission to communicate with any remote location;
ora location-dependent trust level that requests permission to communicate with at least one of the one or more remote locations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer implemented method comprising:
-
determining potentially dangerous operations in an application, the determining including scanning the application for universal resource locators and code that is configured to communicate with one or more remote locations associated with the universal resource locators; and preventing or intercepting the potentially dangerous operations by embedding a requested trust level into the application, the requested trust level comprising at least one of; a full trust level that requests permission to communicate with any remote location;
ora location dependent trust level that requests permission to communicate with at least one of the one or more remote locations. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
-
23. A computer implemented method comprising:
-
determining if an application is configured to access data outside of the applications boundaries based on one or more URL'"'"'s; responsive to determining that the application is configured to access data outside of the application'"'"'s boundaries based on said one or more URL'"'"'s, embedding a location dependent trust level into the application that requests permission to access data outside of the application'"'"'s boundaries; and responsive to determining that the application is not configured to access data outside of the application'"'"'s boundaries based on said one or more URL'"'"'s, embedding a restricted trust level into the application that does not request permission to access data outside of the application'"'"'s boundaries. - View Dependent Claims (24, 25, 26)
-
Specification