TRUST POLICY FOR TELECOMMUNICATIONS DEVICE
First Claim
1. A method comprising:
- detecting, by a telecommunication device, an attempt to access an input/output (I/O) component of the telecommunication device by an application on the telecommunication device;
determining, by the telecommunication device, that a registered permission of an operating system of the telecommunication device indicates that the application has the operating system'"'"'s permission to access the I/O component of the telecommunication device;
determining, by the telecommunication device, that a trust policy conflicts with the registered permission by denying access to the I/O component to the application; and
preventing, by the telecommunication device, the application from sending data to or receiving data from the I/O component in response to the attempt, based on the determining that the trust policy conflicts with the registered permission.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and processes that may be implemented to manage access by software applications to various resources of a user telecommunications device are disclosed. The systems and processes may implement a trust policy which reflects privacy criteria selected by a user of the user telecommunications device, wherein the trust policy overrides registered permissions of the software applications. The user telecommunication device may include a memory that stores a software application has been granted registered permissions to access a input and/or output component of the user telecommunications device as well as a trust policy has been set by the user to proscribe access by that particular software application to the input and/or output component. In implementing the trust policy, the software application may be prevented from accessing the input and/or output component notwithstanding the software application having registered permissions to access the input and/or output component.
-
Citations
20 Claims
-
1. A method comprising:
-
detecting, by a telecommunication device, an attempt to access an input/output (I/O) component of the telecommunication device by an application on the telecommunication device; determining, by the telecommunication device, that a registered permission of an operating system of the telecommunication device indicates that the application has the operating system'"'"'s permission to access the I/O component of the telecommunication device; determining, by the telecommunication device, that a trust policy conflicts with the registered permission by denying access to the I/O component to the application; and preventing, by the telecommunication device, the application from sending data to or receiving data from the I/O component in response to the attempt, based on the determining that the trust policy conflicts with the registered permission. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A telecommunication device, comprising:
-
one or more processors; an input/output (I/O) component; memory storing computer-executable instructions that, when executed by the one or more processors, cause the telecommunication device to; detect an attempt to access the I/O component by an application on the telecommunication device; determine that a registered permission of an operating system of the telecommunication device indicates that the application has the operating system'"'"'s permission to access the I/O component; determine that a trust policy conflicts with the registered permission by denying access to the I/O component to the application; and prevent the application from sending data to or receiving data from the I/O component in response to the attempt, based on determining that the trust policy conflicts with the registered permission. - View Dependent Claims (13, 14, 15)
-
-
16. A method comprising:
-
detecting, by a secure operating system of a telecommunication device that is partitioned from a normal operating system of the telecommunication device, an attempt to access an input/output (I/O) component of the telecommunication device by an application on the telecommunication device; determining, by the secure operating system, that a trust policy does not grant access to the I/O component to the application, wherein the trust policy overrides registered permissions for the application in the normal operating system; and preventing, by the secure operating system, the application from sending data to or receiving data from the I/O component in response to the attempt, based on determining that the trust policy does not grant access to the I/O component to the application. - View Dependent Claims (17, 18, 19, 20)
-
Specification