Method and devices for managing permission requests to allow access to a computing resource
First Claim
1. A method of managing permission requests to allow access to computing resources on a computing device, the method comprising:
- for an application to be installed on the computing device,determining an application category that the application is associated with, andretrieving a common permissions list for the application category, wherein the common permissions list identifies at least one computing resource that applications associated with the application category are configured to access;
during an installation of the application on the computing device, determining, using data from a source other than the common permissions list, one or more computing resources on the computing device that the application is configured to access when the application is executed on the computing device;
determining which computing resources, of the one or more computing resources on the computing device that the application is configured to access when the application is executed on the computing device, are not identified in the common permissions list; and
for each computing resource that the application is configured to access when the application is executed on the computing device that is not identified in the common permissions list, providing, in a user interface of the computing device, a first permission request to allow the application to access the computing resource; and
for each computing resource that the application is configured to access when the application is executed on the computing device that is identified in the common permissions list, providing, in the user interface of the computing device, a second permission request to allow the application to access the computing resource;
wherein the first permission request is visually distinguishable, when displayed in the user interface of the computing device, from the second permission request.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods and devices for managing permission requests to allow access to a computing resource are disclosed herein. In one example embodiment, the method comprises: for an application to be installed on the computing device, determining an application category that the application is associated with, and retrieving a common permissions list for the application category, wherein the common permissions list identifies at least one computing resource that applications associated with the application category are configured to access; during an installation of the application on the computing device, determining one or more computing resources on the computing device that the application is configured to access when the application is executed on the computing device; determining which computing resources, of the one or more computing resources on the computing device that the application is configured to access when the application is executed on the computing device, are not identified in the common permissions list; and for each computing resource that the application is configured to access when the application is executed on the computing device that is not identified in the common permissions list, providing, in a user interface of the computing device, a permission request to allow the application to access the computing resource.
-
Citations
26 Claims
-
1. A method of managing permission requests to allow access to computing resources on a computing device, the method comprising:
-
for an application to be installed on the computing device, determining an application category that the application is associated with, and retrieving a common permissions list for the application category, wherein the common permissions list identifies at least one computing resource that applications associated with the application category are configured to access; during an installation of the application on the computing device, determining, using data from a source other than the common permissions list, one or more computing resources on the computing device that the application is configured to access when the application is executed on the computing device; determining which computing resources, of the one or more computing resources on the computing device that the application is configured to access when the application is executed on the computing device, are not identified in the common permissions list; and for each computing resource that the application is configured to access when the application is executed on the computing device that is not identified in the common permissions list, providing, in a user interface of the computing device, a first permission request to allow the application to access the computing resource; and for each computing resource that the application is configured to access when the application is executed on the computing device that is identified in the common permissions list, providing, in the user interface of the computing device, a second permission request to allow the application to access the computing resource; wherein the first permission request is visually distinguishable, when displayed in the user interface of the computing device, from the second permission request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computing device configured to manage permission requests to allow access to computing resources on the computing device, wherein the computing device comprises a processor configured to:
-
for an application to be installed on the computing device, determine an application category that the application is associated with, and retrieve a common permissions list for the application category, wherein the common permissions list identifies at least one computing resource that applications associated with the application category are configured to access; during an installation of the application on the computing device, determine, using data from a source other than the common permissions list, one or more computing resources on the computing device that the application is configured to access when the application is executed on the computing device; determine which computing resources, of the one or more computing resources on the computing device that the application is configured to access when the application is executed on the computing device, are not identified in the common permissions list; and for each computing resource that the application is configured to access when the application is executed on the computing device that is not identified in the common permissions list, provide, in a user interface of the computing device, a first permission request to allow the application to access the computing resource; and for each computing resource that the application is configured to access when the application is executed on the computing device that is identified in the common permissions list provide, in the user interface of the computing device, a second permission request to allow the application to access the computing resource; wherein the first permission request is visually distinguishable, when displayed in the user interface of the computing device, from the second permission request. - View Dependent Claims (16)
-
-
17. A non-transitory computer-readable medium comprising instructions which, when executed by a processor of a computing device, cause the processor to perform a method of managing permission requests to allow access to computing resources on the computing device, an wherein the method comprises:
-
for an application to be installed on the computing device, determining an application category that the application is associated with, and retrieving a common permissions list for the application category, wherein the common permissions list identifies at least one computing resource that applications associated with the application category are configured to access; during an installation of the application on the computing device, determining, using data from a source other than the common permissions list, one or more computing resources on the computing device that the application is configured to access when the application is executed on the computing device; determining which computing resources, of the one or more computing resources on the computing device that the application is configured to access when the application is executed on the computing device, are not identified in the common permissions list; for each computing resource that the application is configured to access when the application is executed on the computing device that is not identified in the common permissions list, providing, in a user interface of the computing device, a first permission request to allow the application to access the computing resource; and for each computing resource that the application is configured to access when the application is executed on the computing device that is identified in the common permissions list providing, in the user interface of the computing device a second permission request to allow the application to access the computing resource; wherein the first permission request is visually distinguishable, when displayed in the user interface of the computing device, from the second permission request.
-
-
18. A method of adding at least one computing resource to a common permissions list the common permissions list for identifying computing resources that applications associated with an application category are configured to access on a computing device, the method comprising:
-
determining a plurality of applications associated with the application category; for each of the plurality of applications associated with the application category, determining, using data from a source other than the common permissions list for the application category, which computing resources the application is configured to access when the application is executed on the computing device; for each of at least one computing resource, computing how many of the plurality of applications associated with the application category are configured to access the computing resource, and if the number of applications that are configured to access the computing resource exceeds a particular threshold, adding the computing resource to the common permissions list for the application category. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
-
25. A server device configured to add at least one computing resource to a common permissions list, the common permissions list for identifying computing resources that applications associated with an application category are configured to access on a computing device, the server device comprising a processor configured to:
-
determine a plurality of applications associated with the application category; for each of the plurality of applications associated with the application category, determine, using data from a source other than the common permissions list for the application category, which computing resources the application is configured to access when the application is executed on the computing device; for each of at least one computing resource, compute how many of the plurality of applications associated with the application category are configured to access the computing resource, and if the number of applications that are configured to access the computing resource exceeds a particular threshold, add the computing resource to the common permissions list for the application category.
-
-
26. A non-transitory computer-readable medium comprising instructions which, when executed by a processor of a server device, cause the processor to perform a method of adding at least one computing resource to a common permissions list, the common permissions list for identifying computing resources that applications associated with an application category are configured to access on a computing device, the method comprising:
-
determining a plurality of applications associated with the application category; for each of the plurality of applications associated with the application category, determining, using data from a source other than the common permissions list for the application category, which computing resources the application is configured to access when the application is executed on the computing device; for each of at least one computing resource, computing how many of the plurality of applications associated with the application category are configured to access the computing resource, and if the number of applications that are configured to access the computing resource exceeds a particular threshold, adding the computing resource to the common permissions list for the application category.
-
Specification