COORDINATING MULTIPLE SECURITY COMPONENTS
First Claim
1. A method, implemented by one or more processors, comprising:
- determining, by a first security component of a first application executing on a client device, a need to perform a sharable functional task;
identifying a set of software components installed on the client device and capable of performing variations of the sharable functional task, wherein variations of the sharable functional task are functionally overlapping and not identical;
establishing inter-app communication between the first security component and at least a second security component of the set of software components;
identifying a set of characteristics characterizing both the first security component and the second security component;
selecting, using the first security component and the second security component, the second security component as a primary security component for performing a variation of the sharable functional task based on the set of characteristics, wherein the set of characteristics includes at least a version number;
delegating, by the one or more processors, performance of the sharable functional task to the primary security component; and
instructing the one or more processors to cause functionality associated with the first security component to be at least partially suspended.
8 Assignments
0 Petitions
Accused Products
Abstract
A system and method for coordinating security components, including: determining, by an application executing on a client device, a need to perform a sharable functional task; identifying a first security component and a second security component installed on the client device and capable of performing variations of the sharable functional task, where variations of the sharable functional task are functionally overlapping and not identical; identifying a set of characteristics characterizing the first security component and the second security component; selecting the second security component as a primary security component for performing a variation of the sharable functional task based on the set of characteristics; delegating, by one or more processors, performance of the sharable functional task to the primary security component; and instructing the processors to cause functionality associated with the first security component to be at least partially suspended.
-
Citations
29 Claims
-
1. A method, implemented by one or more processors, comprising:
-
determining, by a first security component of a first application executing on a client device, a need to perform a sharable functional task; identifying a set of software components installed on the client device and capable of performing variations of the sharable functional task, wherein variations of the sharable functional task are functionally overlapping and not identical; establishing inter-app communication between the first security component and at least a second security component of the set of software components; identifying a set of characteristics characterizing both the first security component and the second security component; selecting, using the first security component and the second security component, the second security component as a primary security component for performing a variation of the sharable functional task based on the set of characteristics, wherein the set of characteristics includes at least a version number; delegating, by the one or more processors, performance of the sharable functional task to the primary security component; and instructing the one or more processors to cause functionality associated with the first security component to be at least partially suspended. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
a computer processor; and a manager module executing on the computer processor and configured to cause the computer processor to; determine a need to perform a sharable functional task; identify a set of software components installed on the client device and capable of performing variations of the sharable functional task, wherein variations of the sharable functional task are functionally overlapping and not identical; identify a set of characteristics characterizing both a first security component and a second security component of the set of software components; select the second security component as a primary security component for performing a variation of the sharable functional task based on the set of characteristics, wherein the set of characteristics includes at least a version number; delegate, using the computer processor, performance of the sharable functional task to the primary security component; and instruct the computer processor to cause functionality associated with the first security component to be at least partially suspended.
-
-
18. A non-transitory computer-readable storage medium comprising a plurality of instructions configured to execute on at least one computer processor to cause the computer processor to:
-
determine, using a first security component of a first application, a need to perform a sharable functional task; identify a set of software components installed on the client device and capable of performing variations of the sharable functional task, wherein variations of the sharable functional task are functionally overlapping and not identical; establish communication with the first security component and at least a second security component of the set of software components; identify a set of characteristics characterizing both the first security component and the second security component; select, using the first security component and the second security component, the second security component as a primary security component for performing a variation of the sharable functional task based on the set of characteristics, wherein the set of characteristics includes at least a version number; instruct the at least one computer processor to delegate performance of the sharable functional task to the primary security component; and instruct the at least one computer processor to cause functionality associated with the first security component to be at least partially suspended.
-
-
19. A method, implemented by one or more processors, comprising:
-
determining, using a first security component of a first application, a need to perform a sharable functional task; identifying a first set of software components capable of performing variations of the sharable functional task, wherein variations of the sharable functional task are functionally overlapping and not identical, and wherein the first set of software components comprises at least a second security component; identifying a set of characteristics characterizing each software component of the first set of software components; selecting, using the first security component and the second security component, the second security component as a primary security component for performing a variation of the sharable functional task based on a rank value of each of the first set of software components, wherein the rank values are calculated using the set of characteristics; delegating, by the one or more processors, performance of the sharable functional task to the primary security component; and suspending, by the one or more processors, functionality associated with the first security component. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification