Methods and systems for persistent cross-application mobile device identification
First Claim
1. A system for persistently identifying a mobile device across applications, the system comprising:
- a memory which comprises;
a first sandbox associated with a first application;
a second sandbox associated with a second application; and
a persistent shared storage configured to store a universal device identifier which identifies a mobile device across the first application and the second application; and
a processor programmed to;
execute the first application in the first sandbox, wherein the first application is restricted from accessing the second sandbox;
execute the second application in the second sandbox, wherein the second application is restricted from accessing the first sandbox;
receive a first request from the first application to access information associated with the mobile device, wherein the first request comprises the universal device identifier;
receive a second request from the second application to access the information associated with the mobile device, wherein the second request comprises the universal device identifier;
identify data associated with the first application indicative of a fraud;
link the data associated with the first application indicative of the fraud with the universal device identifier;
store the data associated with the first application indicative of the fraud in the persistent shared storage associated with the universal device identifier; and
in response to the second request from the second application to access information associated with the mobile device, access the persistent shared storage associated with the universal device identifier and return a data packet comprising the data associated with the first application indicative of the fraud to the second application.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are provided for persistent cross-application mobile device identification. A mobile device may have a plurality of sandboxes in memory containing applications. The mobile device may have a shared storage which may accessible by applications from different sandboxes. A storage location identifier may be used to access information in shared storage. A universal device identifier may be stored in the shared storage to identify the mobile device and may be accessible by multiple applications and updates to applications. The universal device identifier may be used to track the mobile device for advertising, fraud detection, reputation tracking, or other purposes.
-
Citations
20 Claims
-
1. A system for persistently identifying a mobile device across applications, the system comprising:
-
a memory which comprises; a first sandbox associated with a first application; a second sandbox associated with a second application; and a persistent shared storage configured to store a universal device identifier which identifies a mobile device across the first application and the second application; and a processor programmed to; execute the first application in the first sandbox, wherein the first application is restricted from accessing the second sandbox; execute the second application in the second sandbox, wherein the second application is restricted from accessing the first sandbox; receive a first request from the first application to access information associated with the mobile device, wherein the first request comprises the universal device identifier; receive a second request from the second application to access the information associated with the mobile device, wherein the second request comprises the universal device identifier; identify data associated with the first application indicative of a fraud; link the data associated with the first application indicative of the fraud with the universal device identifier; store the data associated with the first application indicative of the fraud in the persistent shared storage associated with the universal device identifier; and in response to the second request from the second application to access information associated with the mobile device, access the persistent shared storage associated with the universal device identifier and return a data packet comprising the data associated with the first application indicative of the fraud to the second application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for persistently identifying a mobile device across applications, the method comprising:
-
executing a first application in a first sandbox, wherein the first application is restricted from accessing a second sandbox; executing a second application in a second sandbox, wherein the second application is restricted from accessing the first sandbox; receiving a first request from the first application to access information associated with the mobile device, wherein the first request comprises a universal device identifier; receiving a second request from the second application to access the information associated with the mobile device, wherein the second request comprises the universal device identifier; identifying data associated with the first application indicative of a fraud; linking the data associated with the first application indicative of the fraud with the universal device identifier; storing the data associated with the first application indicative of the fraud in a persistent shared storage associated with the universal device identifier; and in response to the second request from the second application to access information associated with the mobile device, accessing the persistent shared storage associated with the universal device identifier and returning a data packet comprising the data associated with the first application indicative of the fraud to the second application. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. Non-transitory computer storage having stored thereon a computer program, the computer program including executable instructions that instruct a computer system to at least:
-
execute a first application in a first sandbox, wherein the first application is restricted from accessing a second sandbox; execute a second application in a second sandbox, wherein the second application is restricted from accessing the first sandbox; receive a first request from the first application to access information associated with the mobile device, wherein the first request comprises a universal device identifier; receive a second request from the second application to access the information associated with the mobile device, wherein the second request comprises the universal device identifier; identify data associated with the first application indicative of a fraud; link the data associated with the first application indicative of the fraud with the universal device identifier; store the data associated with the first application indicative of the fraud in a persistent shared storage associated with the universal device identifier; and in response to the second request from the second application to access information associated with the mobile device, access the persistent shared storage associated with the universal device identifier and return a data packet comprising the data associated with the first application indicative of the fraud to the second application. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification