Method, system and apparatus for generating security permissions for applications
An application generation and security technology, used in computer security devices, special data processing applications, instruments, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be understood by those skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, and components have not been described in detail so as not to obscure the present invention.
[0024] Methods and systems are described that provide a tool that a user can run once that computes possible security exceptions in an application and their corresponding components. The user can then confirm that all of these exceptions are valid so that the tool proceeds and generates the required security policy file in the correct format. Moreover, the required security policy files can be correctly calculated to match the application hierarchy, which enables their application to enable Java2 security.
[0025] The described methods and sys...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


