Test enabled application execution
First Claim
1. A method for executing an application on a wireless device, comprising:
- receiving, at the wireless device, a permission parameter associated with the wireless device;
requesting, at the wireless device, the execution of the application on the wireless device;
evaluating by the wireless device the permission parameter associated with the wireless device using a rule stored in the wireless device;
executing the application in the event the evaluation of the permission and the rule indicate the application is allowed to execute; and
wherein the application is tested to ensure that it satisfies requirements for an environment in which it will execute, permissions are assigned to dictate which devices or systems may execute the application, and the application is removed if the application performs illegal or undesirable actions.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods consistent with the present invention provides safe and secure application distribution and execution and controls the risk of providing a test environment associated with the testing of applications. Test enabled permissions are created and distributed to selected application test entities. A management function is used to aid in distributing the test-enabled permissions. The risk is controlled by providing closer scrutiny of the identity of the test entity prior to distributing a test enabled permission to the test entity, providing expiration times associated with the test enabled permissions, and limiting the number of test enabled permissions distributed. The management function tracks the distribution of the test-enabled permissions.
39 Citations
19 Claims
-
1. A method for executing an application on a wireless device, comprising:
-
receiving, at the wireless device, a permission parameter associated with the wireless device; requesting, at the wireless device, the execution of the application on the wireless device; evaluating by the wireless device the permission parameter associated with the wireless device using a rule stored in the wireless device; executing the application in the event the evaluation of the permission and the rule indicate the application is allowed to execute; and wherein the application is tested to ensure that it satisfies requirements for an environment in which it will execute, permissions are assigned to dictate which devices or systems may execute the application, and the application is removed if the application performs illegal or undesirable actions. - View Dependent Claims (2, 3)
-
-
4. A method for accessing applications on a wireless device, comprising:
-
requesting an application independent permission for the wireless device; receiving, at the wireless device, the application independent permission; initiating the access of a first application on the wireless device; evaluating the first application independent permission on the wireless device; accessing the first application in the event the evaluation of the application independent permission indicates access is allowed; and wherein the application is tested to ensure that it satisfies requirements for an environment in which it will execute, permissions are assigned to dictate which devices or systems may execute the application, and the application is removed if the application performs illegal or undesirable actions. - View Dependent Claims (5, 6, 7, 8, 9, 10)
-
-
11. A wireless device, comprising:
-
an input to receive an application independent permission; a storage to store the application independent permission and a unique identifier associated with the wireless device; a control program configured to determine access to an application by evaluating the application independent permission and the unique identifier; and wherein the application is tested to ensure that it satisfies requirements for an environment in which it will execute, permissions are assigned to dictate which devices or systems may execute the application, and the application is removed if the application performs illegal or undesirable actions. - View Dependent Claims (12, 13, 14)
-
-
15. A method for managing application independent permissions, comprising:
-
storing profile information related to a wireless device; receiving a request by an entity for an application independent permission for the wireless device; assigning the application independent permission for the wireless device; transmitting the application independent permission to the wireless device; and wherein the application is tested to ensure that it satisfies requirements for an environment in which it will execute, permissions are assigned to dictate which devices or systems may execute the application, and the application is removed if the application performs illegal or undesirable actions. - View Dependent Claims (16, 17)
-
-
18. A system for accessing applications on a wireless device, comprising:
-
means for requesting an application independent permission for the wireless device; means for receiving, at the wireless device, the application independent permission; means for initiating the access of a first application on the wireless device; means for evaluating the first application independent permission on the wireless device; means for accessing the first application in the event the evaluation of the application independent permission indicates access is allowed; and wherein the application is tested to ensure that it satisfies requirements for an environment in which it will execute, permissions are assigned to dictate which devices or systems may execute the application, and the application is removed if the application performs illegal or undesirable actions.
-
-
19. A computer-readable medium containing computer-executable instructions for accessing application on a wireless device that when executed perform a method, comprising:
-
requesting an application independent permission for the wireless device; receiving, at the wireless device, the application independent permission; initiating the access of a first application on the wireless device; evaluating the first application independent permission on the wireless device; accessing the first application in the event the evaluation of the application independent permission indicates access is allowed; and wherein the application is tested to ensure that it satisfies requirements for an environment in which it will execute, permissions are assigned to dictate which devices or systems may execute the application, and the application is removed if the application performs illegal or undesirable actions.
-
Specification