METHOD FOR VALIDATING DYNAMICALLY LOADED LIBRARIES USING TEAM IDENTIFIERS
    41.
    发明申请
    METHOD FOR VALIDATING DYNAMICALLY LOADED LIBRARIES USING TEAM IDENTIFIERS 有权
    使用团队识别员验证动态加载图书馆的方法

    公开(公告)号:US20160350529A1

    公开(公告)日:2016-12-01

    申请号:US14726292

    申请日:2015-05-29

    Applicant: Apple Inc.

    CPC classification number: G06F21/52 G06F21/51 G06F21/64 G06F2221/033

    Abstract: According to one embodiment, in response to a request received from an application by a launch module hosted by an operating system and executed by a processor to dynamically load a library, a library validation module hosted by the operating system extracts a first team identifier (ID) from the application, where the first team ID identifies an application provider that provides the application. The library validation module extracts a second team ID from the library, where the second team ID identifies a library provider that provides the library. The first team ID and the second team ID are compared to determine whether the first team ID matches the second team ID. In response to determining that the first team ID matches the second team ID, the launch module launches the library to allow the application communicate with the library; otherwise, the request is denied.

    Abstract translation: 根据一个实施例,响应于由操作系统托管并由处理器执行并由处理器执行以动态加载库的从应用程序接收到的请求,由操作系统托管的库验证模块提取第一团队标识符(ID ),其中第一个团队ID标识提供应用程序的应用程序提供程序。 库验证模块从库中提取第二个团队ID,其中第二个团队ID标识提供该库的库提供程序。 比较第一个团队ID和第二个团队ID,以确定第一个团队ID是否与第二个团队ID相匹配。 为了响应确定第一个团队ID与第二个团队ID相匹配,启动模块启动该库以允许应用程序与库通信; 否则,请求被拒绝。

    CONSISTENT EXTENSION POINTS TO ALLOW AN EXTENSION TO EXTEND FUNCTIONALITY OF AN APPLICATION TO ANOTHER APPLICATION
    42.
    发明申请
    CONSISTENT EXTENSION POINTS TO ALLOW AN EXTENSION TO EXTEND FUNCTIONALITY OF AN APPLICATION TO ANOTHER APPLICATION 有权
    一致的延伸要点,以延长延长其他应用程序功能的功能

    公开(公告)号:US20150347749A1

    公开(公告)日:2015-12-03

    申请号:US14488126

    申请日:2014-09-16

    Applicant: Apple Inc.

    CPC classification number: G06F9/541 G06F8/656 G06F9/54 G06F9/546 G06F21/53

    Abstract: According to one embodiment, in response to an inquiry received from a first application for an extension service associated with a first of a plurality of extension points of an operating system, a list of one or more extensions is identified that have been registered for the first extension point with the operating system, where the first application is executed within a first sandboxed environment. The identified list of extensions is displayed to prompt a user to select one of the extensions to be associated with the first application. In response to a selection of one of the extensions, the selected extension is launched in a second sandboxed environment. The selected extension and the second application were packaged in an application bundle, and when the application bundle was installed, the selected extension and the second application appeared in a registry of the operating system as separate applications.

    Abstract translation: 根据一个实施例,响应于从与第一应用程序相关联的用于与操作系统的多个扩展点中的第一个扩展点相关联的扩展服务的查询,识别一个或多个扩展的列表,其已被注册为第一 扩展点与操作系统,第一个应用程序在第一个沙盒环境中执行。 显示已识别的扩展列表,以提示用户选择要与第一个应用程序相关联的其中一个扩展。 响应于选择其中一个扩展,所选扩展名在第二个沙盒环境中启动。 所选的扩展和第二个应用程序被打包在应用程序包中,并且当安装了应用程序包时,所选的扩展和第二个应用程序作为单独的应用程序出现在操作系统的注册表中。

    FILE SYSTEM ACCESS FOR ONE OR MORE SANDBOXED APPLICATIONS
    43.
    发明申请
    FILE SYSTEM ACCESS FOR ONE OR MORE SANDBOXED APPLICATIONS 审中-公开
    文件系统访问一个或多个SANDBOXED应用程序

    公开(公告)号:US20150199510A1

    公开(公告)日:2015-07-16

    申请号:US14605085

    申请日:2015-01-26

    Applicant: Apple Inc.

    Abstract: Methods, systems, and machine-readable storage medium are described wherein, in one embodiment, identifiers, such as bookmarks, are used to allow access to files or folders in a sandboxed environment. One or more applications are restricted by an access control system, which can be, for example, a trusted software component of an operating system. In one embodiment, the bookmarks or other identifiers allow an application to have access to a file even if the file is renamed or moved by a user while the application has been terminated. In one embodiment, a resource manager, or other trusted access control system, can interact with an application to allow for the use of bookmarks in an environment in which a sandbox application controls access to the files such that each application must make a request to the sandbox application in order to obtain access to a particular file or folder.

    Abstract translation: 描述了方法,系统和机器可读存储介质,其中在一个实施例中,诸如书签的标识符被用于允许访问沙盒环境中的文件或文件夹。 访问控制系统限制一个或多个应用程序,访问控制系统可以是例如操作系统的可信软件组件。 在一个实施例中,书签或其他标识符允许应用程序访问文件,即使在应用程序已被终止时,用户重命名或移动该文件。 在一个实施例中,资源管理器或其他受信任的访问控制系统可以与应用程序交互以允许在沙盒应用程序控制对文件的访问的环境中使用书签,使得每个应用程序必须向 沙箱应用程序,以获取访问特定的文件或文件夹。

    Securing accessory interface
    45.
    发明授权

    公开(公告)号:US11205021B2

    公开(公告)日:2021-12-21

    申请号:US16403259

    申请日:2019-05-03

    Applicant: Apple Inc.

    Abstract: Techniques are disclosed relating to securing an accessory interface on a computing device. In various embodiments, a computing device detects a connection of an accessory device to an accessory interface port and, in response to the detected connection, evaluates a policy defining one or more criteria for restricting unauthorized access to the accessory interface port. Based on the evaluating, the computing device determines whether to disable the accessory interface port to prevent communication with the connected accessory device. In some embodiments, the computing device includes an interconnect coupled between the processor and the accessory interface port, and the interconnect includes a hub circuit configured to facilitate communication between a plurality of devices via the interconnect. In some embodiments, the computing device, in response to determining to disable the accessory interface port, instructs the hub circuit to prevent traffic from being conveyed from the accessory interface port.

Patent Agency Ranking