Determining source of side-loaded software using an administrator server
First Claim
1. A system, comprising:
- at least one processor; and
memory storing instructions configured to instruct the at least one processor to;
receive, from a first computing device, a first application identifier and a first source identifier, each for a first application;
determine whether the first source identifier matches at least one of a white list of source identifiers or a black list of source identifiers;
send the first application identifier and the first source identifier over a network to a second computing device;
receive, from the second computing device, a first state designation for the first application, the first state designation representing a trusted state or an untrusted state;
in response to receiving the first state designation, set a second state designation, wherein the second state designation is different than the state represented by the first state designation; and
send the second state designation to the first computing device.
7 Assignments
0 Petitions
Accused Products
Abstract
An action may be performed in response to a determination of a source of side-loaded software. In one case, the handling of an application on a mobile device may be based on whether the source of the application is trusted or untrusted. If a software application being newly-installed on a mobile device of a user is determined to be untrusted, installation or execution is blocked. In one approach, the determination of the source includes: receiving, from the mobile device, a first application identifier and a first source identifier, each for a first application; sending the first application identifier and the first source identifier over a network to an administrator server; receiving, from the administrator server, a first state designation for the first application; setting a second state designation based on the first state designation; and sending the second state designation to the mobile device.
396 Citations
20 Claims
-
1. A system, comprising:
-
at least one processor; and memory storing instructions configured to instruct the at least one processor to; receive, from a first computing device, a first application identifier and a first source identifier, each for a first application; determine whether the first source identifier matches at least one of a white list of source identifiers or a black list of source identifiers; send the first application identifier and the first source identifier over a network to a second computing device; receive, from the second computing device, a first state designation for the first application, the first state designation representing a trusted state or an untrusted state; in response to receiving the first state designation, set a second state designation, wherein the second state designation is different than the state represented by the first state designation; and send the second state designation to the first computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, comprising:
-
receiving, by a first computing device from at least one of plurality of computing devices, a first application identifier and a first source identifier, each for a first application; receiving, from a third computing device, a second state designation for the first application, the second state designation representing a trusted state or an untrusted state; in response to receiving the second state designation setting, by the first computing device, a first state designation for the first application, wherein the first state designation is to be used for setting a state on a second computing device, and wherein the first state designation is different than the state represented by the second state designation; and sending, by the first computing device, the first state designation to the second computing device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable storage medium storing computer-readable instructions, which when executed, cause a first computing device to:
-
receive, from a second computing device, a first application identifier and a first source identifier, each for a first application; send the first application identifier and the first source identifier over a network to a third computing device; receive, from the third computing device, a first state designation for the first application, the first state designation representing a trusted state or an untrusted state; in response to receiving the first state designation, set a second state designation, wherein the second state designation is different than the state represented by the first state designation; and send the second state designation to the second computing device; wherein the second computing device is configured to store an application state for the first application, set the application state to untrusted in response to receiving the second state designation, and disallow the first application in response to setting the application state to untrusted.
-
Specification