System and method of operation control on an electronic device
First Claim
Patent Images
1. A method of application control for use on an electronic device, the method comprising:
- receiving an operation request from an application;
determining whether the requested operation is allowed to be performed by the application based upon a stored authorization record and an application identifier associated with the application;
wherein the authorization record and the application identifier are provided by an external source for storage on the electronic device;
allowing the application to perform the requested operation based upon whether the requested operation is determined to be allowed to be performed by the application;
storing source authentication information onto the device; and
using the source authentication information to prevent any party other than the external source from altering the stored authorization record;
wherein the source authentication information comprises a digital signature public key that corresponds to a digital signature private key used by the external source to digitally sign the source authentication information with a digital signature, and wherein using the source authentication information to prevent any party other than the external source from altering the stored authorization record comprises decrypting the digital signature with the digital signature public key.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods of application control for use on an electronic device. A device can be configured to receive an operation request from an application. The device can determine whether the requested operation is allowed to be performed by the application based upon a stored authorization record and an application identifier associated with the application. The application is allowed to perform the requested operation based upon whether the requested operation is determined to be allowed to be performed by the application.
-
Citations
30 Claims
-
1. A method of application control for use on an electronic device, the method comprising:
-
receiving an operation request from an application; determining whether the requested operation is allowed to be performed by the application based upon a stored authorization record and an application identifier associated with the application; wherein the authorization record and the application identifier are provided by an external source for storage on the electronic device; allowing the application to perform the requested operation based upon whether the requested operation is determined to be allowed to be performed by the application; storing source authentication information onto the device; and using the source authentication information to prevent any party other than the external source from altering the stored authorization record; wherein the source authentication information comprises a digital signature public key that corresponds to a digital signature private key used by the external source to digitally sign the source authentication information with a digital signature, and wherein using the source authentication information to prevent any party other than the external source from altering the stored authorization record comprises decrypting the digital signature with the digital signature public key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system of application control for use on an electronic device, comprising:
-
an authorization record store configured to store operation authorization data records and application identifiers that are associated with the operation authorization data records; software instructions that are configured to operate on the electronic device and to consult the operation authorization data in the authorization record store in order to determine whether an operation requested by an application operating on the electronic device is allowed to be performed by the application; wherein the application identifiers associated with the operation authorization data records are used to determine which of the operation authorization data records is to be used by the software instructions in determining whether to permit the requested operation; wherein the operation authorization data records and the application identifiers are provided by an external source for storage on the electronic device; a source authentication information store that is contained on the electronic device; and software instructions that arc configured to operate on the electronic device and to consult the source authentication information store in order to prevent any party other than the external source from altering the stored authorization record. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. A system of application control for use on wireless mobile communications device, comprising:
-
means for receiving an operation request from an application; wherein the requested operation is selected from the group consisting of;
opening a connection, accessing a telephone API, accessing local memory and communicating with another executing application;means for determining whether the requested operation is allowed to be performed by the application based upon a stored authorization record and an application identifier associated with the application; wherein the stored authorization record is associated with data indicative of whether the application is required, allowed, or excluded; wherein the authorization record related to determining whether the requested operation is to be allowed is provided by an external computer that is used to enforce policies for operating electronic devices within an organization; means for allowing the application to perform the requested operation based upon whether the requested operation is determined to be allowed to be performed by the application; a source authentication information store, and means for consulting the source authentication information store in order to prevent any party other than the external computer from altering the stored authorization record; wherein the source authentication information store comprises a digital signature public key that corresponds to a digital signature private key used by the external computer to digitally sign the source authentication information with a digital signature, and wherein the means for consulting the source authentication information to prevent any party other than the external computer from altering the stored authorization record operate by decrypting the digital signature with the digital signature public key. - View Dependent Claims (24)
-
-
25. A system of application control for use on an electronic device, wherein an operation request is received from an application, the system comprising:
-
software instructions configured to operate on the electronic device and to determine whether the requested operation is allowed to be performed by the application based upon a stored authorization record and an application identifier associated with the application; wherein the authorization record and the application identifier are provided by an external source for storage on the electronic device; and software instructions configured to operate on the electronic device and to allow the application to perform the requested operation based upon whether the requested operation is determined to be allowed to be performed by the application; wherein the source authentication information is stored on the device; wherein the source authentication information is used to prevent any party other than the external source from altering the stored authorization record; wherein the source authentication information comprises a digital signature public key that corresponds to a digital signature private key used by the external source to digitally sign the source authentication information with a digital signature, and wherein the use of the source authentication information to prevent any party other than the external source from altering the stored authorization record comprises decrypting the digital signature with the digital signature public key.
-
-
26. A mobile device with application control, comprising:
-
means for receiving an operation request from an application; means configured to operate on the electronic device and to determine whether the requested operation is allowed to be performed by the application based upon a stored authorization record and an application identifier associated with the application; wherein the authorization record and the application identifier are provided by an external source for storage on the electronic device; and means configured to operate on the electronic device and to allow the application to perform the requested operation based upon whether the requested operation is determined to be allowed to be performed by the application; wherein the source authentication information is stored on the device; wherein the source authentication information is used to prevent any party other than the external source from altering the stored authorization record; wherein the source authentication information comprises a digital signature public key that corresponds to a digital signature private key used by the external source to digitally sign the source authentication information with a digital signature, and wherein the use of the source authentication information to prevent any party other than the external source from altering the stored authorization record comprises decrypting the digital signature with the digital signature public key.
-
-
27. A method of application control for use on an electronic device, comprising:
-
storing, in an authorization record store that is on the electronic device, operation authorization data records and application identifiers that are associated with the operation authorization data records; wherein the electronic device consults the operation authorization data in the authorization record store in order to determine whether an operation requested by an application operating on the electronic device is allowed to be performed by the application; wherein the application identifiers associated with the operation authorization data records are used to determine which of the operation authorization data records is to be used by the software instructions in determining whether to permit the requested operation; wherein the operation authorization data records and the application identifiers are provided by an external source for storage on the electronic device; wherein a source authentication information store is contained on the electronic device; and using a processor of the electronic device to consult the source authentication information store in order to prevent any party other than the external source from altering the stored authorization record.
-
-
28. A mobile device with application control, comprising:
-
means for storing applications on the mobile device; a processor for executing software instructions on the mobile device; an authorization record store configured to store operation authorization data records and application identifiers that are associated with the operation authorization data records; software instructions that are configured to operate on the mobile device and to consult the operation authorization data in the authorization record store in order to determine whether an operation requested by an application operating on the mobile device is allowed to be performed by the application; wherein the application identifiers associated with the operation authorization data records are used to determine which of the operation authorization data records is to be used by the software instructions in determining whether to permit the requested operation; wherein the operation authorization data records and the application identifiers are provided by an external source for storage on the mobile device; a source authentication information store that is contained on the mobile device; and software instructions that are configured to operate on the mobile device and to consult the source authentication information store in order to prevent any party other than the external source from altering the stored authorization record.
-
-
29. A method of application control for use on wireless mobile communications device, comprising:
-
receiving through the wireless mobile communications device an operation request from an application; wherein the requested operation is selected from the group consisting of;
opening a connection, accessing a telephone API, accessing local memory and communicating with another executing application;determining through the wireless mobile communications device whether the requested operation is allowed to be performed by the application based upon a stored authorization record and an application identifier associated with the application; wherein the stored authorization record is associated with data indicative of whether the application is required, allowed, or excluded; wherein the authorization record related to determining whether the requested operation is to be allowed is provided by an external computer that is used to enforce policies for operating electronic devices within an organization; wherein the wireless mobile communications device allows the application to perform the requested operation based upon whether the requested operation is determined to be allowed to be performed by the application; wherein a source authentication information store is contained on the wireless mobile communications device, and wherein the wireless mobile communications device consults the source authentication information store in order to prevent any party other than the external computer from altering the stored authorization record; wherein the source authentication information store comprises a digital signature public key that corresponds to a digital signature private key used by the external computer to digitally sign the source authentication information with a digital signature, and wherein the means for consulting the source authentication information to prevent any party other than the external computer from altering the stored authorization record operate by decrypting the digital signature with the digital signature public key.
-
-
30. A wireless mobile communication device with application control, wherein an operation request is received from an application, wherein the requested operation is selected from the group consisting of:
- opening a connection, accessing a telephone API, accessing local memory and communicating with another executing application, said wireless mobile communication device comprising;
means for determining whether the requested operation is allowed to be performed by the application based upon a stored authorization record and an application identifier associated with the application; wherein the stored authorization record is associated with data indicative of whether the application is required, allowed, or excluded; wherein the authorization record related to determining whether the requested operation is to be allowed is provided by an external computer that is used to enforce policies for operating electronic devices within an organization; means for allowing the application to perform the requested operation based upon whether the requested operation is determined to be allowed to be performed by the application; a source authentication information store, and means for consulting the source authentication information store in order to prevent any party other than the external computer from altering the stored authorization record; wherein the source authentication information store comprises a digital signature public key that corresponds to a digital signature private key used by the external computer to digitally sign the source authentication information with a digital signature, and wherein the means for consulting the source authentication information to prevent any party other than the external computer from altering the stored authorization record operate by decrypting the digital signature with the digital signature public key.
- opening a connection, accessing a telephone API, accessing local memory and communicating with another executing application, said wireless mobile communication device comprising;
Specification