An example embodiment of the invention relates generally to wireless communication technology and, more particularly, relates to a method, apparatus, and computer program product for providing an efficient and reliable mechanism of securing applications in a communications network.
The modern communications era has brought about a tremendous expansion of wireline and wireless networks. Computer networks, television networks, and telephony networks are experiencing an unprecedented technological expansion, fueled by consumer demand. Wireless and mobile networking technologies have addressed related consumer demands, while providing more flexibility and immediacy of information transfer.
Current and future networking technologies continue to facilitate ease of information transfer and convenience to users. Due to the now ubiquitous nature of electronic communication devices, people of all ages and education levels are utilizing electronic devices to communicate with other individuals or contacts, receive services and/or share information, media and other content. One area in which there is a demand to increase ease of information transfer relates to the delivery of services to a user of a mobile terminal. The services may be in the form of a particular media or communication application desired by the user, such as a music player, a game player, an electronic book, short messages, email, content sharing, etc. The services may also be in the form of interactive applications in which the user may respond to a network device in order to perform a task or achieve a goal.
Communication device users may access some of these interactive applications or other resources via a browser on a communication device. At present, browsers commonly implement a same-origin policy in which web pages are given permissions based on their load origin. For example, a user may allow a web page loaded from a particular web site to access device location data, whereas a web page loaded from another web site may deny access. In this regard, user trust may be bound to the organization hosting the web site.
At present, a mechanism such as virtual hosting may host multiple domain names (with separate handling of each name) on a single server (or pool of servers). This allows one server to share its resources, such as memory and processor cycles, without requiring all services provided to use the same host name.
There are two main types of virtual hosting, such as name based virtual hosting and Internet Protocol (IP) based virtual hosting. Name based virtual hosting generally uses the host name presented by a client device. This approach may save IP addresses and the associated administrative overhead but the protocol being served may need to supply the host name at an appropriate point. IP based virtual hosting may utilize a separate IP address for each host name, and IP based virtual hosting may be performed with any protocol but may require a dedicated IP address for each domain name being served.
Currently, some communication devices may virtual host applications and may provide one or more of the hosted applications to another communication device. At present, a problem may arise involving a mismatch of web security principles and the architecture being used in an instance in which a communication device hosting applications provides one or more of the hosted applications to another device(s) when requested. For instance, a communication device may host several applications that originate from various sources and each application may be given specific permissions based on their trust level. These permissions may be enforced by the browser of another communication device using the same-origin policy principle. However, if all applications are loaded from the same origin, all applications may get the same permissions in a browser of another communication device. Also several other browser features, such as local storage and cookies, may rely on distinct load origin.
As such, the same origin for different applications may result in all applications being able to access the same local storage and cookies, which may result in a security breach.
A method, apparatus, and computer program product are therefore provided in accordance with an example embodiment to facilitate a more robust security system to enable applications to receive access to resources.
In an example embodiment, a communication device may load or provide one or more applications to another communication device, instead of loading the applications directly from a network device(s) that may be maintained by a source origin entity (e.g., organization (e.g., company)).
An example embodiment of the invention may generate one or more virtual domains that are allocated during installation of one or more of the loaded applications. Each of the virtual domains may include one or more applications that originated for a same source origin. Additionally, an example embodiment may associate one or more permissions, of an application(s) to resources, with a virtual domain-specific token and a communication device may manage access to one or more resources (e.g., secure resources) based on the token.
In one example embodiment, a method may include determining one or more respective origins of one or more applications, received from at least one network device, during installation of the applications. The method may further include creating one or more virtual domains based at least in part on the determined origins of the applications. The method may further include including the applications determined to belong to a same origin in a same virtual domain of the created virtual domains. The method may further include enabling provision of the applications, to a communication device and data indicating corresponding virtual domains that the respective applications are included within. The data may include a generated token that enables a corresponding application to access one or more resources.
In another example embodiment, an apparatus may include a processor and a memory including computer program code. The memory and computer program code are configured to, with the processor, cause the apparatus to at least perform operations including determining one or more respective origins of one or more applications, received from at least one network device, during installation of the applications. The memory and the computer program code are further configured to, with the processor, cause the apparatus to create one or more virtual domains based at least in part on the determined origins of the applications. The memory and the computer program code are further configured to, with the processor, cause the apparatus to include the applications determined to belong to a same origin in a same virtual domain of the created virtual domains. The memory and the computer program code are further configured to, with the processor, cause the apparatus to enable provision of the applications, to a communication device and data indicating corresponding virtual domains that the respective applications are included within. The data may include a generated token that enables a corresponding application to access one or more resources.
In another example embodiment, a computer program product may include at least one computer-readable storage medium having computer-readable program code portions stored therein. The computer-executable program code instructions may include program code instructions configured to determine one or more respective origins of one or more applications, received from at least one network device, during installation of the applications. The program code instructions may also create one or more virtual domains based at least in part on the determined origins of the applications. The program code instructions may also include the applications determined to belong to a same origin in a same virtual domain of the created virtual domains. The program code instructions may also enable provision of the applications, to a communication device and data indicating corresponding virtual domains that the respective applications are included within. The data may include a generated token that enables a corresponding application to access one or more resources.
In another example embodiment, an apparatus may include means for determining one or more respective origins of one or more applications, received from at least one network device, during installation of the applications. The apparatus may include means for creating one or more virtual domains based at least in part on the determined origins of the applications. The apparatus may include means for including the applications determined to belong to a same origin in a same virtual domain of the created virtual domains. The apparatus may include means for enabling provision of the applications, to a communication device and data indicating corresponding virtual domains that the respective applications are included within. The data may include a generated token that enables a corresponding application to access one or more resources.
Having thus described the invention in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
Some embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all embodiments of the invention are shown. Indeed, various embodiments of the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Like reference numerals refer to like elements throughout. As used herein, the terms “data,” “content,” “information” and similar terms may be used interchangeably to refer to data capable of being transmitted, received and/or stored in accordance with embodiments of the invention. Moreover, the term “exemplary”, as used herein, is not provided to convey any qualitative assessment, but instead merely to convey an illustration of an example. Thus, use of any such terms should not be taken to limit the spirit and scope of embodiments of the invention.
Additionally, as used herein, the term ‘circuitry’ refers to (a) hardware-only circuit implementations (e.g., implementations in analog circuitry and/or digital circuitry); (b) combinations of circuits and computer program product(s) comprising software and/or firmware instructions stored on one or more computer readable memories that work together to cause an apparatus to perform one or more functions described herein; and (c) circuits, such as, for example, a microprocessor(s) or a portion of a microprocessor(s), that require software or firmware for operation even if the software or firmware is not physically present. This definition of ‘circuitry’ applies to all uses of this term herein, including in any claims. As a further example, as used herein, the term ‘circuitry’ also includes an implementation comprising one or more processors and/or portion(s) thereof and accompanying software and/or firmware. As another example, the term ‘circuitry’ as used herein also includes, for example, a baseband integrated circuit or applications processor integrated circuit for a mobile phone or a similar integrated circuit in a server, a cellular network device, other network device, and/or other computing device.
As defined herein a “computer-readable storage medium,” which refers to a non-transitory, physical or tangible storage medium (e.g., volatile or non-volatile memory device), may be differentiated from a “computer-readable transmission medium,” which refers to an electromagnetic signal.
As referred to herein, a “sandbox” or “sandboxes” may denote a security mechanism for separating running programs. A sandbox may prevent certain functions in an instance in which an application(s) (e.g., a web application(s)) is received and executed. In this regard, a sandbox may create an environment in which there may be limits on what resources an application may request or access. One or more sandboxes of an example embodiment may be utilized to determine sources or origins of one or more applications to enable the applications to receive one or more resources securely.
Referring now to
Referring now to
A problem or drawback may arise in currently existing architecture or systems in an instance in which a device such as, for example, device 3 hosting applications (e.g., application X, application Y) and serves or provides one or more of the applications to other devices (e.g., device 11) as needed. For instance, as shown in
In
In some existing systems, a problem may arise based on the mismatch of web security principles and the used architecture. For instance, since device 3 may host several applications that originate from various sources (e.g., Site of company X, Site of company Y), each application may be given specific permissions based on their level of trust. These permissions may be enforced by the browser 12 of device 11 using the same-origin policy principle. However, if all applications are loaded from the same origin (e.g., the web server 17 of device 3), all applications may get the same sandbox (e.g., device sandbox 18) and thus the same permissions in the browser 12 of device 11, as shown in
The network 30 may include a collection of various different nodes (of which the second and third communication devices 20 and 25 may be examples), devices or functions that may be in communication with each other via corresponding wired and/or wireless interfaces. As such, the illustration of
One or more communication terminals such as the mobile terminal 10 and the second and third communication devices 20 and 25 may be in communication with each other via the network 30 and each may include an antenna or antennas for transmitting signals to and for receiving signals from one or more base sites. The base sites could be, for example one or more base stations (BS) that is a part of one or more cellular or mobile networks or one or more access points (APs) that may be coupled to a data network, such as a Local Area Network (LAN), Wireless Local Area Network (WLAN), a Metropolitan Area Network (MAN), and/or a Wide Area Network (WAN), such as the Internet. In turn, other devices such as processing elements (e.g., personal computers, server computers or the like) may be coupled to the mobile terminal 10 and the second and third communication devices 20 and 25 via the network 30. By directly or indirectly connecting the mobile terminal 10 and the second and third communication devices 20 and 25 (and/or other devices) to the network 30, the mobile terminal 10 and the second and third communication devices 20 and 25 may be enabled to communicate with the other devices or each other. For example, the mobile terminal 10 and the second and third communication devices 20 and 25 as well as other devices may communicate according to numerous communication protocols including Hypertext Transfer Protocol (HTTP) and/or the like, to thereby carry out various communication or other functions of the mobile terminal 10 and the second and third communication devices 20 and 25, respectively.
Furthermore, although not shown in
In an example embodiment, the first communication device (e.g., the mobile terminal 10) may be a mobile communication device such as, for example, a wireless telephone or other devices such as a personal digital assistant (PDA), mobile computing device, camera, video recorder, audio/video player, positioning device, game device, television device, radio device, or various other like devices or combinations thereof. The second communication device 20 and the third communication device 25 may be mobile or fixed communication devices. However, in one example, the second communication device 20 and the third communication device 25 may be servers, remote computers or terminals such as personal computers (PCs) or laptop computers.
In an example embodiment, the network 30 may be an ad hoc or distributed network arranged to be a smart space. Thus, devices may enter and/or leave the network 30 and the devices of the network 30 may be capable of adjusting operations based on the entrance and/or exit of other devices to account for the addition or subtraction of respective devices or nodes and their corresponding capabilities. In an example embodiment, the second communication device 20 and the third communication device 25 may be network devices such as, for example, servers hosting applications (e.g., web applications). In this example embodiment, the mobile terminal 10 may receive one or more of the applications from the communication device 20 and/or the third communication device 25.
In another example embodiment, the mobile terminal as well as the second and third communication devices may employ an apparatus (e.g., apparatus of
Referring now to
The memory device 76 may be configured to store information, data, files, applications (e.g., software applications), instructions or the like for enabling the apparatus to carry out various functions in accordance with an example embodiment of the invention. For example, the memory device 76 could be configured to buffer input data for processing by the processor 70. Additionally or alternatively, the memory device 76 could be configured to store instructions for execution by the processor 70. As yet another alternative, the memory device 76 may be one of a plurality of databases that store information and/or media content (e.g., pictures, videos, etc.). The memory device 76 may also store one or more applications 83 (also referred to herein as application(s) 83). The application(s) 83 may, but need not be, be received from one or more network devices. The network devices may host applications (e.g., web applications).
The apparatus 50 may, in one embodiment, be a mobile terminal (e.g., mobile terminal 10) or a fixed communication device or computing device configured to employ an example embodiment of the invention. However, in one embodiment, the apparatus 50 may be embodied as a chip or chip set. In other words, the apparatus 50 may comprise one or more physical packages (e.g., chips) including materials, components and/or wires on a structural assembly (e.g., a baseboard). The structural assembly may provide physical strength, conservation of size, and/or limitation of electrical interaction for component circuitry included thereon. The apparatus 50 may therefore, in some cases, be configured to implement an embodiment of the invention on a single chip or as a single “system on a chip.” As such, in some cases, a chip or chipset may constitute means for performing one or more operations for providing the functionalities described herein. Additionally or alternatively, the chip or chipset may constitute means for enabling user interface navigation with respect to the functionalities and/or services described herein.
The processor 70 may be embodied in a number of different ways. For example, the processor 70 may be embodied as one or more of various processing means such as a coprocessor, microprocessor, a controller, a digital signal processor (DSP), processing circuitry with or without an accompanying DSP, or various other processing devices including integrated circuits such as, for example, an ASIC (application specific integrated circuit), an FPGA (field programmable gate array), a microcontroller unit (MCU), a hardware accelerator, a special-purpose computer chip, or the like. In an example embodiment, the processor 70 may be configured to execute instructions stored in the memory device 76 or otherwise accessible to the processor 70. As such, whether configured by hardware or software methods, or by a combination thereof, the processor 70 may represent an entity (e.g., physically embodied in circuitry) capable of performing operations according to an embodiment of the invention while configured accordingly. Thus, for example, when the processor 70 is embodied as an ASIC, FPGA or the like, the processor 70 may be specifically configured hardware for conducting the operations described herein. Alternatively, as another example, when the processor 70 is embodied as an executor of software instructions, the instructions may specifically configure the processor 70 to perform the algorithms and operations described herein when the instructions are executed. However, in some cases, the processor 70 may be a processor of a specific device (e.g., a mobile terminal or network device) adapted for employing an embodiment of the invention by further configuration of the processor 70 by instructions for performing the algorithms and operations described herein. The processor 70 may include, among other things, a clock, an arithmetic logic unit (ALU) and logic gates configured to support operation of the processor 70.
In an example embodiment, the processor 70 may be configured to operate a connectivity program, such as a browser 72, Web browser (e.g., Firefox™, Internet Explorer™, Google Chrome™, Safari™, etc.) or the like. In this regard, the connectivity program may enable the apparatus 50 to transmit and receive Web content, such as for example location-based content, applications (e.g., web applications) or any other suitable content, according to a Wireless Application Protocol (WAP), for example. The browser 72 may include an optional top level UI 75 which may load one or more applications from another communication device (e.g., another apparatus 50). In addition, the top level UI 75 may provide a token to an application in an instance in which the application is loaded and the top level UI 75 may perform other corresponding functions, as described more fully below.
Meanwhile, the communication interface 74 may be any means such as a device or circuitry embodied in either hardware, a computer program product, or a combination of hardware and software that is configured to receive and/or transmit data from/to a network and/or any other device or module in communication with the apparatus 50. In this regard, the communication interface 74 may include, for example, an antenna (or multiple antennas) and supporting hardware and/or software for enabling communications with a wireless communication network (e.g., network 30). In fixed environments, the communication interface 74 may alternatively or also support wired communication. As such, the communication interface 74 may include a communication modem and/or other hardware/software for supporting communication via cable, digital subscriber line (DSL), universal serial bus (USB), Ethernet or other mechanisms.
The user interface 67 may be in communication with the processor 70 to receive an indication of a user input at the user interface 67 and/or to provide an audible, visual, mechanical or other output to the user. As such, the user interface 67 may include, for example, a keyboard, a mouse, a joystick, a display, a touch screen, a microphone, a speaker, or other input/output mechanisms. In an example embodiment in which the apparatus is embodied as a server or some other network devices, the user interface 67 may be limited, remotely located, or eliminated. The processor 70 may comprise user interface circuitry configured to control at least some functions of one or more elements of the user interface, such as, for example, a speaker, ringer, microphone, display, and/or the like. The processor 70 and/or user interface circuitry comprising the processor 70 may be configured to control one or more functions of one or more elements of the user interface through computer program instructions (e.g., software and/or firmware) stored on a memory accessible to the processor 70 (e.g., memory device 76, and/or the like).
The server 73 may be any means such as a device or circuitry operating in accordance with software or otherwise embodied in hardware or a combination of hardware and software (e.g., processor 70) operating under software control, the processor 70 embodied as an ASIC or FPGA specifically configured to perform the operations described herein, or a combination thereof) thereby configuring the device or structure to perform the corresponding functions of the server 73, as described below.
For instance, the server 73 may provide one or more applications to another communication device (e.g., another apparatus 50). The server 73 may also provide one or more applications to browser 72. The server 73 may create one or more virtual domains and may include one or more applications in these virtual domains. In this regard, the server 73 may provide one or more of the applications from the created virtual domains to another communication device (e.g., another apparatus 50) and may perform other corresponding functions, as described more fully below.
The installation manager 71 may be embodied as the processor 70 (e.g., as an FGPA, ASIC, or the like). Additionally, the installation manager 71 may be any device or circuitry operating in accordance with software or otherwise embodied in hardware or a combination of hardware and software thereby configuring the device or circuitry to perform the corresponding functions of the installation manager 71, as described herein. For instance, the installation manager 71 may detect a source organization (e.g., Nokia™) of an application from a digital signature and may store granted permissions for the application in a permission registry. The installation manager 71 may also instruct the server 73 to create a virtual domain and copy the application(s) in the virtual domain, as well as perform other corresponding functions as described herein.
In an example embodiment, the processor 70 may be embodied as, include or otherwise control the DB access manager 78. The DB access manager 78 may be any means such as a device or circuitry operating in accordance with software or otherwise embodied in hardware or a combination of hardware and software (e.g., processor 70 operating under software control, the processor 70 embodied as an ASIC or FPGA specifically configured to perform the operations described herein, or a combination thereof) thereby configuring the device or circuitry to perform the corresponding functions of the DB access manager 78, as described below. Thus, in an example in which software is employed, a device or circuitry (e.g., the processor 70 in one example) executing the software forms the structure associated with such means.
The DB access manager 78 may receive one or more requests for access to a memory (e.g., memory device 76) and/or a database of the memory. The access requests (also referred to herein as DB access requests) may be requests for information or resources associated with an application. The DB access manager 78 may check a received request for a security token in an instance in which an access request requires permissions, and may perform other corresponding functions, as described more fully below.
Referring now to
In addition to the memory 96, the processor 94 may also be connected to at least one interface or other means for displaying, transmitting and/or receiving data, content, and/or the like. In this regard, the interface(s) may comprise at least one communication interface 98 or other means for transmitting and/or receiving data, content, and/or the like, as well as at least one user input interface 95. The user input interface 95, in turn, may comprise any of a number of devices allowing the network entity to receive data from a user, such as a keypad, a touch display, a joystick or other input device. In this regard, the processor 94 may comprise user interface circuitry configured to control at least some functions of one or more elements of the user input interface. The processor and/or user interface circuitry of the processor may be configured to control one or more functions of one or more elements of the user interface through computer program instructions (e.g., software and/or firmware) stored on a memory accessible to the processor (e.g., volatile memory, non-volatile memory, and/or the like).
The network device 39 may receive a request(s) from a browser (e.g., browser 72) for content (e.g., one or more applications). The network device 39 may, but need not, be a source entity or originator of the content (e.g., applications). In response to receipt of the request(s), the processor 94 of the network device 39 may provide the content to the browser of a communication device (e.g., apparatus 50). In one example embodiment, the network device 39 may include be a repository (also referred to herein as an application store) for storing or hosting one or more applications.
Referring now to
In the example embodiment of
The installation manager 52 (e.g., installation manager 71) may map the source entities (e.g., an organization (e.g., origin entity X, origin entity Y)) of the applications (e.g., application X 56, application Y 58), detected during installation, to a virtual domain from which the applications (e.g., application X 56, application Y 58) are provided. In this example embodiment, the application X 56 provided from source origin entity X (e.g., Company X) may include one or more permissions (e.g., permission Z). On the other hand, the application Y 58 provided from source origin entity Y (e.g., Company Y) may not include any permissions.
In the example embodiment of
By utilizing this approach, the installation manager 52 may achieve a desired effect of separating applications into different virtual domains such that one or more browsers (e.g., browser 60) (e.g., or third party browsers) loading the applications (e.g., application X 56, application Y 58) may separate the applications into their own sandboxes according to browser security principles, as described more fully below.
During installation, the installation manager 52 may ask a user of the communication device 53 whether a permission (e.g., permission Z) requested by an application (e.g., application X 56) is granted and in an instance in which the permission is granted, the installation manager 52 may store the granted permission(s) in a memory. The server 54 may link or associate the granted permission(s) to a token that is generated for the application (e.g., application X 56). In the example embodiment of
Referring now to
In the example embodiment of
In the example embodiment of the systems of
For instance, as shown in
For instance, in the example of
The installation manager 52 may detect a source origin (e.g., an organization or company (e.g., Nokia)) from an application digital signature of a received application(s) (e.g., application X 56, application Y 58). As described above, the application(s) may be received from one or more network devices (e.g., network device 51). Additionally, the installation manager 52 may detect one or more application permission requirements (e.g., permission Z) from application installation package meta-data associated with an application (e.g., application X 56). The installation manager 52 may prompt a user to accept one or more permissions (e.g., permission Z) for an installable application(s) (e.g., application X 56). Moreover, the installation manager 52 may facilitate storage, in a memory (e.g., memory 59) of the granted permissions for an application(s) into a permission registry. The installation manager 52 may also instruct the server 54 to create a virtual domain and copy or include a corresponding application in a virtual domain. The installation manager 52 may create one or more links (e.g., associated with an icon) to an installed application(s) into a top level UI (e.g., top level UI 75) running in a browser (e.g., browser 72).
The DB access manager 57 may receive one or more access requests (e.g., DB access request 67, DB access request 69) from a communication device (e.g., communication device 55). The access requests sent by a top level UI 61 of a communication device (e.g., communication device 53) to the DB access manager 57 may include one or more tokens granting permissions to resources. The tokens (e.g., token X 62, token Y 64) may be retrieved by the top level UI 61 from one or more corresponding sandboxes (e.g., entity X virtual site sandbox 63, entity Y virtual site sandbox 65). In response to receiving an access request (e.g., access request 67) requiring a permission(s) (for example to resources (e.g., memory, processing capacity, operating system resources, etc.) on the communication device 53), the request is may be checked by the DB access manager 57 for a security token(s). In this regard, the DB access manager 57 may query the server 54 to check for which virtual domain (e.g., virtual site of entity X 77) the token (e.g., token X 62) is provided. The determined virtual domain may then be checked by the DB access manager 57 against a permission registry (e.g., permission registry 81) (also referred to herein as permissions 81). In an instance in which the DB access manager 57 determines that a virtual domain is not allowed to perform a requested operation, the request may be denied by the DB access manager 57. In addition, in an instance in which an access request does not include a token, the DB access manager 57 may deny the request. In an example embodiment, the DB access manager 57 may send the top level UI 61 a message indicating that an access request is denied.
In the example embodiment of
Referring now to
At operation 1210, an apparatus (e.g., communication device 53) may copy or include one or more application files of a corresponding application(s) (e.g., application X 56, application Y 58) in a corresponding created virtual domain(s) (e.g., virtual site of entity X 77, virtual site of entity Y 79). At operation 1215, an apparatus (e.g., communication device 53) may add one or more links to an installed application(s) into a top-level UI (e.g., top level UI 75, top level UI 61) running in a browser (e.g., browser 72, browser 60). In this regard, a user may click an application link in top-level UI to load a corresponding application(s) (e.g., application X 56, application Y 58). As such, a browser may load an application(s) (e.g., application X 56, application Y 58) from a virtual domain (e.g., virtual site of entity X 77, virtual site of entity Y 79) that may be provided by a server (e.g., server 54). As such, a browser (e.g., browser 72) may limit application access to a virtual domain in accordance with the same-origin policy.
In an alternative example embodiment, access control to a communication device such as, for example, communication device 53 may be done by using a token(s) (e.g., token X 62, token Y 64) that is provided to an application(s) (e.g., application X 56, application Y 58) running in a corresponding virtual site sandbox (e.g., entity X virtual site sandbox 63, entity Y virtual site sandbox 65). As such, in this example embodiment, the application may be responsible for keeping the token(s) safe. The application (or a convenience library that the application uses for database access) may need to provide the token(s) with each access request (e.g., access request 67, access request 69) to a DB access manager (e.g., DB access manager 57).
In another alternative example embodiment, database access or access to other resources (e.g., memory, processing capacity, etc.) may be performed through a top-level UI (which resides in its own sandbox). In this regard, the sandbox may be implemented with an inline frame (iframe), which may allow communicating to another iframe using a mechanism referred to as postMessage( ). The postMessage( ) may allow securely determining the origin domain of the message, which means that a top-level UI may determine which application sandbox created an access request message. The top level UI may then add a token corresponding to the application sandbox to an access request message.
An example embodiment of the invention may be different from existing approaches in that virtual domains of the example embodiment may be allocated during application installation. Additionally, an example embodiment may be different from existing approaches in that one or more permissions may be associated with or tied to a virtual domain-specific token and a server of a communication device may manage access to security-critical resources based on the virtual domain-specific token.
In another alternative example embodiment, virtual domains maybe dynamically managed such as, for example, allowing an application to be served from a different domain each time an application is loaded. In this regard, a domain manager may allocate domains based on the situation, for example, by putting all untrusted applications into a single domain, even in an instance in which space of a memory of a communication device (e.g., communication device 55) is running out (the browser (e.g., browser 60) of the communication device may have memory overhead for maintaining separate domains). On the other hand, not having fixed domains may, but need not, complicate application development in some instances, as web applications are commonly using features like local storage and cookies that rely on static origin.
Referring now to
At operation 1310, the apparatus (e.g., communication device 53) may include one or more applications determined to belong to a same origin (e.g., source origin entity X 56) in a same virtual domain (e.g., virtual site of entity X 77) of the created virtual domains. At operation 1315, the apparatus (e.g., communication device 53) may provide one or more of the applications, to a communication device (e.g., communication device 55 (e.g., apparatus 50)) and data indicating corresponding virtual domains (e.g., virtual site of entity X 77, virtual site of entity Y 79) that the respective applications are included within. The data may include a generated token(s) (e.g., token X 62, token Y 64) that enables a corresponding application(s) (e.g., application X 56, application Y 58) to access one or more resources (e.g., a database, a memory, processing capacity, operating system resources, etc.).
It should be pointed out that
Accordingly, blocks of the flowcharts support combinations of means for performing the specified functions. It will also be understood that one or more blocks of the flowcharts, and combinations of blocks in the flowcharts, can be implemented by special purpose hardware-based computer systems which perform the specified functions, or combinations of special purpose hardware and computer instructions.
In an example embodiment, an apparatus for performing the methods of
Many modifications and other embodiments of the inventions set forth herein will come to mind to one skilled in the art to which these inventions pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the inventions are not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Moreover, although the foregoing descriptions and the associated drawings describe exemplary embodiments in the context of certain exemplary combinations of elements and/or functions, it should be appreciated that different combinations of elements and/or functions may be provided by alternative embodiments without departing from the scope of the appended claims. In this regard, for example, different combinations of elements and/or functions than those explicitly described above are also contemplated as may be set forth in some of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.