METHOD AND SYSTEM FOR CONTROLLING SYSTEM SETTINGS OF A COMPUTING DEVICE
First Claim
1. A method of controlling system settings of a computing device, the method comprising:
- determining configuration data associated with a digitally signed software application, the configuration data identifying one or more new system settings to be temporarily enforced on the computing device during an execution of the software application, wherein the configuration data is digitally signed; and
in response to an initiation of the execution of the software application, reconfiguring system settings on the computing device, the reconfiguring comprising;
verifying at least one digital signature associated with the digitally signed configuration data;
verifying a digital signature associated with the digitally signed software application; and
verifying that a certificate used to verify the digital signature associated with the digitally signed software application is valid;
wherein if the at least one digital signature associated with the digitally signed configuration data successfully verifies, then after successfully verifying the digital signature associated with the digitally signed software application, and verifying that the certificate is valid, the reconfiguring further comprises temporarily enforcing new system settings for the duration of the execution of the software application.
5 Assignments
0 Petitions
Accused Products
Abstract
Methods and devices for controlling system settings of a computing device are described herein. One example embodiment comprises: determining configuration data associated with a software application, wherein the configuration data identifies one or more new system settings to be temporarily enforced on the computing device during an execution of the software application, and wherein the configuration data is digitally signed; and in response to an initiation of the execution of the software application, reconfiguring system settings on the computing device; wherein the reconfiguring comprises verifying at least one digital signature associated with the digitally signed configuration data; wherein if the at least one digital signature associated with the digitally signed configuration data successfully verifies, then the reconfiguring further comprises temporarily enforcing new system settings for the duration of the execution of the software application.
-
Citations
21 Claims
-
1. A method of controlling system settings of a computing device, the method comprising:
-
determining configuration data associated with a digitally signed software application, the configuration data identifying one or more new system settings to be temporarily enforced on the computing device during an execution of the software application, wherein the configuration data is digitally signed; and in response to an initiation of the execution of the software application, reconfiguring system settings on the computing device, the reconfiguring comprising; verifying at least one digital signature associated with the digitally signed configuration data; verifying a digital signature associated with the digitally signed software application; and verifying that a certificate used to verify the digital signature associated with the digitally signed software application is valid; wherein if the at least one digital signature associated with the digitally signed configuration data successfully verifies, then after successfully verifying the digital signature associated with the digitally signed software application, and verifying that the certificate is valid, the reconfiguring further comprises temporarily enforcing new system settings for the duration of the execution of the software application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computing device comprising:
a processor and a memory, the memory storing executable instructions that, when executed by the processor, cause the processor to; determine configuration data associated with a digitally signed software application, the configuration data identifying one or more new system settings to be temporarily enforced on the computing device during an execution of the software application, wherein the configuration data is digitally signed; and in response to an initiation of the execution of the software application, reconfigure the system settings on the computing device, the reconfiguring comprising; verifying at least one digital signature associated with the digitally signed configuration data; verifying a digital signature associated with the digitally signed software application; and verifying that a certificate used to verify the digital signature associated with the digitally signed software application is valid; wherein if the at least one digital signature associated with the digitally signed configuration data successfully verifies, then after successfully verifying the digital signature associated with the digitally signed software application, and verifying that the certificate is valid, the reconfiguring further comprises temporarily enforcing new system settings for the duration of the execution of the software application. - View Dependent Claims (17)
-
18. A computer-readable storage medium comprising instructions that, when executed by a processor of a computing device, cause the processor to perform a method of controlling system settings of the computing device, the method comprising:
-
determining configuration data associated with a digitally signed software application, the configuration data identifying one or more new system settings to be temporarily enforced on the computing device during an execution of the software application, wherein the configuration data is digitally signed; and in response to an initiation of the execution of the software application, reconfiguring system settings on the computing device, the reconfiguring comprising; verifying at least one digital signature associated with the digitally signed configuration data; verifying a digital signature associated with the digitally signed software application; and verifying that a certificate used to verify the digital signature associated with the digitally signed software application is valid; wherein if the at least one digital signature associated with the digitally signed configuration data successfully verifies, then after successfully verifying the digital signature associated with the digitally signed software application, and verifying that the certificate is valid, the reconfiguring further comprises temporarily enforcing new system settings for the duration of the execution of the software application. - View Dependent Claims (19)
-
-
20. A method of controlling system settings of a computing device, the method comprising:
-
determining configuration data associated with a digitally signed software application, the configuration data identifying one or more new system settings to be temporarily enforced on the computing device during an execution of the software application; in response to an initiation of the execution of the software application, determining if the software application is allowed to enforce the one or more new system settings, the determining if the software application is allowed to enforce the one or more new system settings comprising; verifying a digital signature associated with the digitally signed software application; and verifying that a certificate used to verify the digital signature associated with the digitally signed software application is valid; and if the software application is allowed to enforce the one or more new system settings, configuring system settings on the computing device to temporarily enforce the new system settings, the configuring comprising; for each of at least one new system setting identified by the configuration data; storing data identifying a corresponding original system setting, and applying the new system setting; continuing the execution of the software application with the new system settings applied, until the execution of the software application terminates; detecting termination of the software application; and restoring original system settings upon the termination of the software application. - View Dependent Claims (21)
-
Specification