Not applicable.
Not applicable.
Currently, processes that require services utilize an application programming interface to access the services. Developers that understand the application programming interfaces may create processes that operate in a computer system that utilizes the application programming interfaces. Unfortunately, malicious developers may use the services provided by the application programming interfaces to perform subversive tasks.
For instance, a developer may create a small process that utilizes services provided by the application programming interfaces to access information that the process may not require. For example, a developer may program an advertisement pop-up window to render on a computing device. The developer may include malicious code in the advertisement pop-up window that attempts to access contact lists provided by a service associated with the application programming interfaces. The malicious code may utilize the application programming interfaces to retrieve the contact lists. This is problematic because the application programming interfaces do not ensure the process is accessing the appropriate information required to perform a legitimate task. Accordingly, a need arises for a method to dynamically limit services accessible by a process.
In an embodiment, a secure application programming interface is generated to protect one or more services from malicious processes. An authentication value for a process attempting to access the services is generated. A list of services and the trust levels assigned to the process is provided. A determination is made based on the authentication value and the trust levels to select appropriate services. The secure programming interface implements and exposes the appropriate services.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
Embodiments of the invention provide a secure application programming interface that allows a process to execute one or more services based on a level of trust associated with the processes services. The secure application programming interface is generated at run-time and implements the services that the process requires.
In an embodiment, a developer may generate processes that utilize the secure application programming interfaces to access services that one or more computers may implement. The computers may include script engines that execute scripts associated with the processes. The scripts may utilize a markup language layout and resources to render a display associated with the computer. The resources may include multimedia files that provide content when rendered on a display device. The scripts, markup language layout and resources may be collectively referred to as a widget. The widget is a self-defining object that provides the resources and functionality for one or more processes. Additionally, the widget may be nested, that is, a widget can execute other widgets. The widget is associated with a trust level by generating an authentication value to correspond to a process the script is performing. The computers may include one or more processors, which may include a script processing engine utilized to interpret the scripts associated with the widget. The script engine supports visual basic and java language scripts, or any other suitable script language. In an embodiment of the invention, the script engine may be communicatively connected to the computer through a communication network, and the computer may be a portable device, such as, laptop, personal digital assistant, smart phone, etc.
The view 110 is a run-time representation of output generated by a widget (not shown). The view may provide a display of one or more resources and illustrate the changes that occur to the resources based on the processes executed by the script engine 130. The view is communicatively connected to the script engine 130 and the secure application programming interface 120.
The secure application programming interface 120 is a bridge object that aggregates multiple services 121 and provides access to the services 121 based on a trust level associated with the widget. The script engine 130 requests one or more services 121 from the secure application interface 120. The services 121 returned to the script engine 130 have trust levels that are less than or equal to the trust level associated with the widget. The secure application programming interface 120 is generated for each widget attempting to access one or more services 121. The secure application programming interface 120 is destroyed when the widget is terminated.
The script engine 130 executes the scripts 135 to alter the view 110. The script engine 130 communicates with the secure application programming interface 120 to retrieve services 121 that implement the script 135. The services 121 are provided to the script engine 130, after the services 121 are filtered based on a trust level associated with the widget. When the script 135 requires access to a service 121 that is above the trust level associated with the widget, the script engine 130 is unable to perform the action associated with the service 121. In an embodiment of the invention, the service may include search services, instant messenger services, upload/download services, etc. The computing architecture illustrated in
The secure application programming interface is generated for each widget executing in the computing architecture. The widget is a self-defining collection of items that provide context to enable a script engine to consume the widget. The widget provides the resources, scripts and appropriate markup language information that allows the script engine to properly consume the widget by generating a view or run-time context for the widget. The run-time context includes loading the widget and generating the secure application programming interface to facilitate communication between the services and the script engine. Furthermore, the run-time context renders the appropriate markup language information and resources based on instructions received from the script engine.
The interface factory 220 retrieves the authentication value stored in the auth attribute 212 and generates a secure application programming interface based on the authentication value of the widget. The interface factory 220 has access to a collection of services 221 having varying trust levels. The secure application programming interface implements a subset of the services 221 based on a relationship between the authentication value of the widget and trust level of the services 221. In an embodiment of the invention, the collection of services 221 and corresponding trust levels may be generated by a trusted authority. Furthermore, the collection of services 221 and trust levels may be pre-defined by a computer storing the widget.
The interface factory 220 generates the secure application interface to provide the script engine with the appropriate services 221. The interface factory 220 retrieves the collection of services 221. The interface factory creates a bridge object to store a subset of the collection of services 221, after the collection of services 221 are filtered based on an authentication level. The services 221 with trust levels higher than the authentication level are removed. The bridge object exposes the stored services 221 to the script engine to allow access to the services 221.
Optionally, the bridge builder 310 may communicate with an external trusted authority (TA) 320 to generate the subset of services based on the authentication value. After the authentication value is computed, the bridge builder 310 communicates the authentication value to the TA 320. In an embodiment, the TA 320 performs a table look-up to determine the services associated with the specified authentication value. The TA 320 returns a trust level that represents a class or collection of services. The bridge builder 310 filters the registered services 312 to remove the services that are not in the class or adds services that are in the class. The bridge builder 310 may have a predetermined service map that translates the authentication value to the appropriate service, and the bridge builder 310 may communicate with the TA 320 to receive updates to the service map. Accordingly, the bridge builder 310 is flexible and scalable based on the class of services returned by the TA 320.
In an embodiment of the invention, the widget may be a web page having an associated level of trust. The level of trust may be generated by performing a hash on the contents of the web page. A secure application programming interface stores information on services that each web page should have access to based on a contract specifying whether a webpage is a business partner, and the types of service provided based on the payments received from the owner of the web page. The secure application programming interface associated with the web page is dynamically generated based on the level of trust associated with web page. The secure application programming interface exposes services to the web page depending on the levels of trust of the web page and the services. When the level of trust of the service is higher than the level of trust associated with the web page, the service is not exposed to the web page. The web page may be provided with a base line set of services, when the level of trust for the web page is below a specified threshold value.
In an embodiment of the invention, the secure application programming interface may be generated by a dispatch bridge. The dispatch bridge may utilize two components to generate the secure application programming interface. The two components are a dynamic bridge and a locked bridge. The locked and dynamic bridges have a closed and protected relationship, such as, a C++ friend relationship. The friend relationship allows the dynamic bridge to access the locked bridge to update services implemented by the locked bridge. After the locked bridge is populated with appropriate services the dynamic bridge is destroyed. The locked bridge may not be modified after the dynamic bridge is destroyed. The locked bridge is returned as the secure programming application interface.
The dispatch bridge 311 includes a dynamic dispatch bridge 410 and a locked dispatch bridge 420. The dynamic dispatch bridge 410 has a friend relationship with the locked dispatch bridge 420. The locked dispatch bridge 420 includes a collection of services 422 and 421. The collection of services 420 and 421 are added to the locked dispatch bridge 420 by the dynamic dispatch bridge 410. The dynamic dispatch bridge 410 adds the services 420 and 421 to the locked dispatch bridge 420, after the bridge builder determines which of the registered services have the appropriate trust level based on the authentication value of the widget. The dynamic dispatch bridge 410 utilizes private member functions of the locked dispatch bridge 420 to register services with the locked dispatch bridge 420. After the locked dispatch bridge 420 is populated with the appropriate services 421 and 422, the dynamic dispatch bridge 410 is destroyed and the locked dispatch bridge 410 is passed to the script engine to facilitate communication with the services 422 and 421.
In an embodiment of the invention, the widget, secure application programming interface, and services may be component object model (COM) objects that adhere to the implementation rules for COM objects. Here, the locked dispatch bridge would implement IUnknown and IDispatch to allow the other COM objects to communicate with the locked bridge. When the locked dispatch bridge implements IDispatch, the other COM objects may query the locked bridge to determine the services provided based on the trust level of the widget. Also, the locked dispatch bridge implements IUnknown to allow other COM objects to reference the locked dispatch bridge. Accordingly, the locked bridge may communicate with the other COM objects to allow information exchange.
After the secure application programming interface is exposed to the script engine, a communication protocol is utilized to allow the secure application programming interface to handle events generated by the services and method calls created by the script. The communication protocol is transparent to the services, the script, and the script engine. The secure application programming interface utilizes the relationship between the service and secure application programming interface to allow communication. Accordingly, the secure application programming interface seamlessly routes the events and method calls between the services and the script engine.
A locked dispatch bridge provides the security that enables the secure application programming interface. Creating the secure application programming interface allows the widget to access services based on trust levels required to access the service. After populating the secure application programming interface with the appropriate services the secure application programming interface is exposed to the script engine.
The method begins when a widget is loaded, in step 610. An authentication value associated with the widget is received, in step 620. A listing of registered services and trust levels associated with the services are received, in step 630. The listing of registered services is filtered based on the authentication value, in step 640. The registered services that have a trust level above the authentication value are removed from the listing of registered services. The remaining registered service are added to the secure application programming interface and exposed, in step 650. The process ends in step 660.
In sum, a widget utilizes the secure application interface to access services based on the authentication level associated with the widget. A separate secure application interface is generated at run time for each widget executing on the computer. The secure application interface provides communication security to allow only authorized widgets to receive the events and method calls associated with the service.
In an alternative embodiment, a method to pass events between the services and the secure application programming interface is provided. Events are generated by service objects and are routed through a connection proxy to the secure application programming interface. The secure application programming interface maps the events from the service object to the script engine and generates event messages having the proper namespace to allow the script engine to perform an action based on the generated event. The connection proxy provides the context information that enables the secure application processing interface to map the event to the service.
The foregoing descriptions of the invention are illustrative, and modifications in configuration and implementation will occur to persons skilled in the art. For instance, while the present invention has generally been described with relation to