Systems and methods for selectively blocking application installation
First Claim
1. A method of monitoring execution of an installer of an application, the method performed by a processor comprising:
- determining an instance of the installer on a computing device;
comparing a current action of the installer, as defined by an installer script, to a predetermined set of rules stored on the computing device;
blocking the current action from executing if the predetermined set of rules indicate that current action is undesirable; and
repeating the comparing and the blocking for subsequent actions of the installer until the installer completes execution; and
furtherproviding an option to allow the current action if the predetermined set of rules indicate that the current action is undesirable; and
adding the allowed current action to a second set of predetermined rules that override the predetermined set of rules.
10 Assignments
0 Petitions
Accused Products
Abstract
Methods and system for preventing or allowing an installer application from installing applications based on a comparison of the installer application actions to profiles and rules. The profiles and rules are established (and periodically updated) to identify a particular software installation process as undesirable and stop it from occurring. An install blocker processes the profiles and rules and compares them against what the installer is trying to do as part of its installation process. If the installer is attempting to install an application deemed undesirable, the user could then be notified, provided all of the information about what the installer was trying to do, and provided choice to allow the installation to continue.
-
Citations
16 Claims
-
1. A method of monitoring execution of an installer of an application, the method performed by a processor comprising:
-
determining an instance of the installer on a computing device; comparing a current action of the installer, as defined by an installer script, to a predetermined set of rules stored on the computing device; blocking the current action from executing if the predetermined set of rules indicate that current action is undesirable; and repeating the comparing and the blocking for subsequent actions of the installer until the installer completes execution; and
furtherproviding an option to allow the current action if the predetermined set of rules indicate that the current action is undesirable; and adding the allowed current action to a second set of predetermined rules that override the predetermined set of rules. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An install blocker for a computing device, the install blocker stored in a non-transitory computer-readable medium comprising:
-
a database contains a predetermined set of rules that describe undesirable actions taken by an installer when installing an application; and a blocker application that performs; determining an instance of the installer on the computing device, comparing a current action of the installer, as defined by an installer script, to the predetermined set of rules contained in the database, blocking the current action from executing if the predetermined set of rules indicate that current action is undesirable, and repeating the comparing and the blocking for each action taken by the installer until the installer completes execution; and wherein the blocker application further provides an option to allow the current action if the predetermined set of rules indicate that the current action is undesirable, and adds the allowed current action to a second set of predetermined rules that override the predetermined set of rules. - View Dependent Claims (7, 8, 9)
-
-
10. A method of blocking installation of undesirable applications, the method performed by a processor comprising:
-
maintaining a database of rules that define installation actions associated with the undesirable applications; determining an instance of an installer on a computing device; identifying a current action of the installer, as defined by an installer script, to the rules in the database; matching the current action to the rules, and if there is a match, blocking the current action from executing; and periodically updating the rules in the database; and
furtherproviding an option to allow the current action if the current matches one of the rules; adding the current action to a second set of rules that override the rules; operating the identifying and the matching to the rules and the second set of rules for each action of the installer until the installer completes execution. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
Specification