APPLICATION LOGGING INTERFACE FOR A MOBILE DEVICE
First Claim
1. A method for selectively transporting information packets produced by an accessory application residing on mobile device to reach a device monitoring destination, comprising:
- communicating information from trusted components through a diagnostic component to a device monitoring destination executing on a mobile device;
gating transport of an information packet from an accessory application in response to a determination that the information packet does not violate a defensive constraint to interface with the diagnostic component; and
packaging the information packet from the accessory application with a trusted credential of the interface to transfer the information packet through the diagnostic component to the device monitoring destination in response to determining that the defensive constraint is not violated.
1 Assignment
0 Petitions
Accused Products
Abstract
A mobile device, and particularly a wireless device, provides a computing platform upon which third-party (e.g., accessory) applications can execute, increasing features/functions desirable to a user. In order to better serve users of wireless devices, third-party developers of such applications would benefit from information about how their fielded applications are being used. However, creating log packets that can ultimately reach the developers is generally not permissible or enabled by wireless devices due to privacy concerns, safeguards against malicious applications, the environment generally afforded to accessory applications, the limited communication channel (e.g., bandwidth, duration, user expense, etc.), and difficulty in integrating such applications to chipsets tailored for mobile devices, such as cell phones. Authentication of the application and a defined log header prior to deployment coupled a confirming unlock feature on the device allows for log packets of increasing complexity that can be selectively allowed, filtered, and reported by a device.
-
Citations
29 Claims
-
1. A method for selectively transporting information packets produced by an accessory application residing on mobile device to reach a device monitoring destination, comprising:
-
communicating information from trusted components through a diagnostic component to a device monitoring destination executing on a mobile device; gating transport of an information packet from an accessory application in response to a determination that the information packet does not violate a defensive constraint to interface with the diagnostic component; and packaging the information packet from the accessory application with a trusted credential of the interface to transfer the information packet through the diagnostic component to the device monitoring destination in response to determining that the defensive constraint is not violated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. At least one processor for selectively transporting information packets produced by an accessory application residing on mobile device to reach a device monitoring destination, comprising:
-
a first module for communicating information from trusted components through a diagnostic component to a device monitoring destination executing on a mobile device; a second module for gating transport of an information packet from an accessory application in response to a determination that the information packet does not violate a defensive constraint to interface with the diagnostic component; and a third module for packaging the information packet from the accessory application with a trusted credential of the interface to transfer the information packet through the diagnostic component to the device monitoring destination in response to determining that the defensive constraint is not violated.
-
-
19. A computer program product comprising:
a computer-readable medium comprising; code for causing a computer to communicate information from trusted components through a diagnostic component to a device monitoring destination executing on a mobile device; code for causing the computer to gate transport of an information packet from an accessory application in response to a determination that the information packet does not violate a defensive constraint to interface with the diagnostic component; and code for causing the computer to package an information packet from the accessory application with a trusted credential of the interface to transfer the information packet through the diagnostic component to the device monitoring destination in response to determining that the defensive constraint is not violated.
-
20. An apparatus for selectively transporting information packets produced by an accessory application residing on mobile device to reach a device monitoring destination, comprising:
-
means for communicating information from trusted components through a diagnostic component to a device monitoring destination; means for gating transport of an information packet from an accessory application in response to a determination that the information packet does not violate a defensive constraint to interface with the diagnostic component; and means for packaging the information packet from the accessory application with a trusted credential of the interface to transfer the information packet through the diagnostic component to the device monitoring destination in response to determining that the defensive constraint is not violated.
-
-
21. A mobile device for selectively transporting information packets produced by an accessory application residing on mobile device to reach a device monitoring destination, comprising:
-
at least one trusted component for reporting troubleshooting log packets; a diagnostic component receiving a trusted credential from the at least one trusted component and a troubleshooting log packet for sending to a device monitoring destination; an accessory application; and an application interface for gating transport of an information packet from an accessory application in response to a determination that the information packet does not violate a defensive constraint to interface with the diagnostic component and for packaging the information packet from the accessory application with a trusted credential of the application interface to transfer the information packet through the diagnostic component to the diagnostic monitoring destination. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29)
-
Specification