Safe application distribution and execution in a wireless environment
First Claim
1. A method for distributing and processing an application, comprising the steps of:
- receiving the application and identification information;
certifying the application satisfies a predetermined criterion;
assigning a permission to the application;
transmitting the application, the permission and the identification information to the a device using a modification detection technique;
determining whether the application was modified during transmission;
storing a rule on the device;
determining if the application may be process using the permission and the rule; and
removing the application from the device.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention provides safe and secure application distribution and execution by providing systems and methods that test an application to ensure that it satisfies predetermined criteria associated with the environment in which it will execute. Furthermore, by using rules and permission lists, application removal, and a modification detection technique, such as digital signatures, the present invention provides mechanisms to safely distribute and execute tested, or untested, applications by determining whether the application has been modified, determining if it has permission to execute in a given wireless device environment, and removing the application should it be desirable to do so.
84 Citations
53 Claims
-
1. A method for distributing and processing an application, comprising the steps of:
-
receiving the application and identification information;
certifying the application satisfies a predetermined criterion;
assigning a permission to the application;
transmitting the application, the permission and the identification information to the a device using a modification detection technique;
determining whether the application was modified during transmission;
storing a rule on the device;
determining if the application may be process using the permission and the rule; and
removing the application from the device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for distributing and processing an application, comprising the steps of:
-
receiving the application and identification information;
certifying the application satisfies a predetermined criterion;
assigning a permission to the application;
transmitting the application, the permission and the identification information to the a wireless device;
storing a rule on the device; and
determining if the application may be processed on the device using the permission and the rule. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 17, 18, 19, 20, 21, 22, 23, 25, 26, 27, 28)
-
-
16. A method for distributing and processing an application, comprising the steps of:
-
receiving the application and identification information;
assigning a permission to the application;
transmitting the application, the permission and the identification information to the a device using a modification detection technique;
determining whether the application was modified during transmission;
storing a rule on the device;
determining if the application may be process using the permission and the rule; and
removing the application from the device.
-
-
24. A system for distributing an executing an application on a wireless device, comprising:
-
a central server operable to receive the application and developer identification, to assign a permission associated with the application and to transmit the application information to the wireless device;
a server operable to certify the application satisfies a predefined criterion; and
the wireless device operable to receive the application and developer identification, and to evaluate the assigned permission.
-
-
29. A system for distributing and executing an application on a wireless device, comprising:
-
means for receiving the application and identification information;
means for assigning a permission to the application;
means for transmitting the application, the permission and the identification information to the device using a modification detection technique;
means for determining whether the application was modified during transmission;
means for storing a rule on the device;
means for determining if the application may be process using the permission and the rule; and
means for removing the application from the device.
-
-
30. A method of processing application distribution, comprising the steps of:
-
receiving the application and identification information;
certifying the application satisfies a predetermined criterion;
assigning a permission to the application;
transmitting the application, the permission and the identification information to the device using a modification detection technique; and
initiating a request to remove the application from a device. - View Dependent Claims (31, 32)
-
-
33. A method of processing application distribution, comprising the steps of:
-
receiving the application and identification information;
assigning a permission to the application; and
transmitting the application, the permission and the identification information to the device using a modification detection technique. - View Dependent Claims (34, 35, 36, 37, 39)
-
-
38. A system for application distribution, comprising:
-
a central server operable to receive application and identity information, assign a permission, and transmit the application using a modification detection technique; and
a network connected to the central server to receive the application.
-
-
40. A system for application distribution, comprising:
-
means for receiving the application and identification information;
means for certifying the application satisfies a predetermined criterion;
means for assigning a permission to the application; and
means for transmitting the application, the permission and the identification information to the device using a modification detection technique.
-
-
41. A computer-readable medium containing computer-executable instructions for distributing applications, comprising the steps of:
-
receiving the application and identification information;
certifying the application satisfies a predetermined criterion;
assigning a permission to the application; and
transmitting the application, the permission and the identification information to the device using a modification detection technique.
-
-
42. A method for executing an application on a wireless device, comprising the steps of:
-
storing a rule to evaluate a permission;
receiving information comprising the application, the permission and an identification using a modification detection technique;
receiving a request to execute the application on the wireless device;
evaluating the received information to determine if the received information was modified;
in the event the received information was not modified, evaluating the permission associated with the application; and
in the event the permission is granted, executing the application. - View Dependent Claims (43, 44, 45, 47, 48, 49, 50)
-
-
46. A method for executing an application on a wireless device, comprising the steps of:
-
storing a rule to evaluate a permission;
receiving information comprising the application, the permission and an identification using a modification detection technique;
receiving a request to execute the application on the wireless device; and
evaluating the permission associated with an application; and
in the event the information was modified, removing the application from the wireless device.
-
-
51. A wireless device for executing an application, comprising:
-
a input to receive an application and a permission;
a rule contained in storage to evaluate the permission; and
a key contained in storage to evaluate a digital signature, wherein the wireless device is operable to execute the application upon evaluation of the permission and digital signature.
-
-
52. A wireless device for executing an application, comprising:
-
means for storing a rule to evaluate a permission;
means for receiving information comprising the application, the permission and an identification using a modification detection technique;
means for receiving a request to execute the application on the wireless device;
means for evaluating the received information to determine if the received information was modified;
means for, in the event the received information was not modified, evaluating the permission associated with the application; and
means for, in the event the permission is granted, executing the application.
-
-
53. A computer-readable medium containing computer-executable instructions for distributing applications, comprising the steps of:
-
storing a rule to evaluate a permission;
receiving information comprising the application, the permission and an identification using a modification detection technique;
receiving a request to execute the application on the wireless device;
evaluating the received information to determine if the received information was modified;
in the event the received information was not modified, evaluating the permission associated with the application; and
in the event the permission is granted, executing the application.
-
Specification