POLICY CONFIGURATION FOR MOBILE DEVICE APPLICATIONS
First Claim
1. A method comprising:
- determining, using a processor, whether a digital certificate associated with an application executable on a mobile device has been signed by a first trusted certificate authority, the first trusted certificate authority being included in a list of trusted certificate authorities hard-coded in the mobile device; and
when the digital certificate is determined to have been signed by the first trusted certificate authority, configuring the application for execution on the mobile device based on an access privilege indicating a physical interface of the mobile device the application is permitted to access, and execution configuration information associated with the application.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, articles of manufacture, and apparatus to perform policy configuration for mobile device applications are disclosed. A disclosed example method includes determining whether a digital certificate associated with a application executable on a mobile device has been signed by a first trusted certificate authority, the first trusted certificate authority being included in a list of trusted certificate authorities hard-coded in the mobile device, and when the digital certificate is determined to have been signed by the first trusted certificate authority, configuring the application for execution on the mobile device based on an access privilege indicating a physical interface of the mobile device the application is permitted to access, and execution configuration information associated with the application.
203 Citations
20 Claims
-
1. A method comprising:
-
determining, using a processor, whether a digital certificate associated with an application executable on a mobile device has been signed by a first trusted certificate authority, the first trusted certificate authority being included in a list of trusted certificate authorities hard-coded in the mobile device; and when the digital certificate is determined to have been signed by the first trusted certificate authority, configuring the application for execution on the mobile device based on an access privilege indicating a physical interface of the mobile device the application is permitted to access, and execution configuration information associated with the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A tangible article of manufacture storing machine readable instructions that, when executed, cause a machine to:
-
determine whether a digital certificate associated with a application executable on a mobile device has been signed by a first trusted certificate authority, the first trusted certificate authority being included in a list of trusted certificate authorities hard-coded in the mobile device; and when the digital certificate is determined to have been signed by the first trusted certificate authority, configure the application for execution on the mobile device based on an access privilege indicating a physical interface of the mobile device the application is permitted to access, and execution configuration information associated with the application. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A mobile device comprising:
-
a set of physical interfaces; a policy engine to determine from a digital certificate a set of access privileges that indicate which of the set of physical interfaces of the mobile device an application executing on the mobile device is permitted to access, the policy engine to have access to a list of trusted certificate authorities authorized to sign digital certificates associated with applications executing on the mobile device; and a removable memory device to store a first trusted certificate authority for inclusion in the list of trusted certificate authorities. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification