SECURING AND MANAGING APPS ON A DEVICE
First Claim
1. A method of securing an app for execution on a device using a security program, the method comprising:
- obtaining core object code of the app, wherein a digital signature is removed from the app;
substituting app object code with security program object code, thereby creating a security-wrapped app;
preparing the security-wrapped app for execution on the device; and
re-signing the security-wrapped app with a new key,wherein a centralized policy to control and secure access to data is implemented on the device.
3 Assignments
0 Petitions
Accused Products
Abstract
Apps are secured or security-wrapped either before they are downloaded onto a device, such as a smartphone or tablet device, or after they are downloaded but before they are allowed to access the device operating system and cause any potential damage to the device. An app provider, such as an employer or a cellphone provider, can secure its apps before consumers download an app from their app store or marketplace. The app is secured before it is allowed to access the operating system of the device, thereby preventing the app from malicious behavior. Core object code of the app is obtained and the digital signature is removed. App object code is substituted with security program object code, thereby creating a security-wrapped app. The security-wrapped app is prepared for execution on the device and is re-signed with a new key.
-
Citations
23 Claims
-
1. A method of securing an app for execution on a device using a security program, the method comprising:
-
obtaining core object code of the app, wherein a digital signature is removed from the app; substituting app object code with security program object code, thereby creating a security-wrapped app; preparing the security-wrapped app for execution on the device; and re-signing the security-wrapped app with a new key, wherein a centralized policy to control and secure access to data is implemented on the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method of preventing an app from damaging a device, the method comprising:
-
executing a security-wrapped app on the device; applying a security check to a call made by the security-wrapped app to an operating system of the device; and based on said application of security check to said call, performing one of (a) allowing the call to pass to the operating system; (b) enhancing the call; (c) blocking the call; and (d) terminating the security-wrapped app, wherein a policy to control and secure access to data is implemented on the device. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
Specification