DETERMINING SOURCE OF SIDE-LOADED SOFTWARE
First Claim
1. A non-transitory computer-readable storage medium storing computer-readable instructions, which when executed, cause a first computing device to:
- store, in memory, a device state of the first computing device, the device state to vary between states comprising trusted, untrusted, and unknown;
determine, by at least one processor of the first computing device, whether a first source identifier of a first application matches a first list of source identifiers;
in response to determining that the first source identifier does not match the first list;
set the device state to unknown, and send, by the at least one processor, over a network to a second computing device, at least one message comprising the first source identifier and a first application identifier for the first application;
receive, over the network, a first message from the second computing device, the first message comprising a value of a first state designation for the first application, wherein the first state designation can be set to values including trusted and untrusted, and the second computing device is configured to set the value for the first state designation; and
in response to receiving the first message, change, in the memory, the device state from unknown to the value of the first state designation received in the first message.
10 Assignments
0 Petitions
Accused Products
Abstract
A source of side-loaded software is determined. An action may be performed in response to the determination of the source. In one case, the handling of an application on a mobile device may be based on whether the source of the application is trusted or untrusted. If a software application being newly-installed on a mobile device of a user is determined to be untrusted, installation or execution is blocked. In one approach, the determination of the source includes: determining whether a first source identifier of a first application matches a white list of source identifiers or a black list of source identifiers; and sending the first source identifier and a first application identifier for the first application to a different computing device.
-
Citations
30 Claims
-
1. A non-transitory computer-readable storage medium storing computer-readable instructions, which when executed, cause a first computing device to:
-
store, in memory, a device state of the first computing device, the device state to vary between states comprising trusted, untrusted, and unknown; determine, by at least one processor of the first computing device, whether a first source identifier of a first application matches a first list of source identifiers; in response to determining that the first source identifier does not match the first list;
set the device state to unknown, and send, by the at least one processor, over a network to a second computing device, at least one message comprising the first source identifier and a first application identifier for the first application;receive, over the network, a first message from the second computing device, the first message comprising a value of a first state designation for the first application, wherein the first state designation can be set to values including trusted and untrusted, and the second computing device is configured to set the value for the first state designation; and in response to receiving the first message, change, in the memory, the device state from unknown to the value of the first state designation received in the first message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 10, 11, 14)
-
-
9. (canceled)
-
12-13. -13. (canceled)
-
15. A method, comprising:
-
receiving, by a first computing device from at least one of plurality of computing devices, a first application identifier and a first source identifier, each for a first application; setting, by the first computing device, a first state designation for the first application, wherein the first state designation is to be used for setting a device state on a second computing device, the device state stored in a memory of the second computing device, the device state to vary between states comprising trusted, untrusted, and unknown, and the first state designation set by the first computing device to values including trusted and untrusted; and sending, by the first computing device, a value of the first state designation to the second computing device to cause the changing of the device state from unknown to the value of the first state designation. - View Dependent Claims (16, 18, 19, 20, 21, 22, 23)
-
-
17. (canceled)
-
24. A system, comprising:
-
at least one processor; and memory storing instructions configured to instruct the at least one processor to; receive, from a first computing device, a first application identifier and a first source identifier, each for a first application of the first computing device; determine whether the first source identifier matches at least one of a white list of source identifiers or a black list of source identifiers; send the first application identifier and the first source identifier over a network to a second computing device; receive, from the second computing device, a first state designation for the first application; set a second state designation to a value based on the first state designation, wherein the second state designation can be set to values including trusted and untrusted; and send the value of the second state designation to the first computing device, the sending to cause a device state stored in a memory of the first computing device to be changed from unknown to the value of the second state designation, wherein the device state varies between states comprising trusted, untrusted, and unknown. - View Dependent Claims (25, 26, 27, 28, 29, 30)
-
Specification