×

Method and system for application-based policy monitoring and enforcement on a mobile device

  • US 8,844,036 B2
  • Filed: 03/02/2012
  • Issued: 09/23/2014
  • Est. Priority Date: 03/02/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • with at least one computing device;

    selecting a self-contained application package for security and/or privacy repackaging, the application package comprising an executable software application, the selecting in response to a user selecting a user interface element representative of the application package;

    processing the selected application package to obtain a plurality of executable components of the software application;

    creating, without modifying or replacing any of the executable components of the software application, a self-contained repackaged application package, the repackaged application package comprising the executable components of the software application, non-operating system redirecting code, and intercepting code;

    storing the self-contained repackaged application package on the computing device;

    activating the repackaged application package in response to the user selecting a user interface element representative of the repackaged application package;

    in response to activating the repackaged application package and prior to executing the software application, executing the redirecting code to (i) store an address associated with an operating system interface object callable by the software application during execution of the software application and (ii) replace the address associated with the operating system interface object with an address of the intercepting code; and

    during execution of the software application, in response to a system call by the software application to the operating system interface object, executing the intercepting code to (i) process an argument of the system call for use by application monitoring code, (ii) pass the processed argument to the application monitoring code, and (iii) with the application monitoring code, determine whether the software application is attempting to use the system call to perform a potentially unauthorized activity based on a security and/or privacy policy.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×