Methods, systems and machine-readable media for providing security services
First Claim
1. A method for providing a security service from a central application to another application on a computing device, the method comprising:
- providing a first application configured to provide a security service on a computing device;
providing a second application on the computing device, the second application having original, post-compile object code;
modifying, using at least one processor operatively coupled with a memory, the original object code of the second application to create replacement object code, the replacement object code configured for communication with the first application, the replacement object code incorporating a policy engine configured to retrieve a security policy and process a command that sets the second application to an initial, unused state, wherein the security policy is retrieved from a server that is remote from the computing device.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods and machine-readable media for providing a security service are disclosed. The methods include receiving a modification of the application object code to allow the software application to transmit a request for the security service; retrieving the modified application object code corresponding to the software application from memory; receiving, via a processor, the request for the security service from the modified application object code; and providing, via the processor, the security service. The systems and machine-readable media performing operations according to the methods disclosed.
65 Citations
32 Claims
-
1. A method for providing a security service from a central application to another application on a computing device, the method comprising:
-
providing a first application configured to provide a security service on a computing device; providing a second application on the computing device, the second application having original, post-compile object code; modifying, using at least one processor operatively coupled with a memory, the original object code of the second application to create replacement object code, the replacement object code configured for communication with the first application, the replacement object code incorporating a policy engine configured to retrieve a security policy and process a command that sets the second application to an initial, unused state, wherein the security policy is retrieved from a server that is remote from the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A machine-readable non-transitory storage medium embodying information indicative of instructions for causing one or more machines to perform the operations comprising:
-
providing a first application configured to provide a security service on a computing device; providing a second application on the computing device, the second application having original, post-compile object code; modifying, using at least one processor operatively coupled with a memory, the original object code of the second application to create replacement object code, the replacement object code configured for communication with the first application, the replacement object code incorporating a policy engine configured to retrieve a security policy and process a command that sets the second application to an initial, unused state, wherein the security policy is retrieved from a server that is remote from the computing device. - View Dependent Claims (27)
-
-
28. A computer system executing instructions in a computer program, the computer system comprising:
-
a processor; and a memory operatively coupled with a processor, the processor executing program code from the memory comprising; program code for providing a first application configured to provide a security service on a computing device; program code for providing a second application on the computing device, the second application having original, post-compile object code; program code for modifying, using at least one processor operatively coupled with a memory, the original object code of the second application to create replacement object code, the replacement object code configured for communication with the first application, the replacement code incorporating a policy engine configured to retrieve a security policy and process a command that sets the second application to an initial, unused state, wherein the security policy is retrieved from a server that is remote from the computing device. - View Dependent Claims (29, 30, 31, 32)
-
Specification