System and method for creating secure applications
First Claim
1. A method of operating a secure application, comprising:
- receiving a request to activate the secure application through an input device, wherein the secure application was created from a target application having a first set of functions associated with a first application behavior and the secure application has a second set of functions that are imposed on the first set of functions and that are associated with a second application behavior;
in response to the receipt of the request, forcing the secure application to override the first application behavior with the second application behavior, wherein the second application behavior takes priority over the first application behavior; and
via a processing unit, performing the second application behavior.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for generating a secure application is described herein. The method can include the steps of obtaining a target application and decomposing the target application into original files that contain predictable instructions. One or more predictable instructions in the original files may be identified. In addition, the target application may be modified to create the secure application by binding one or more intercepts to the target application. These intercepts can enable the modification of the predictable instructions in accordance with one or more policies such that the behavior of the secure application is different from the original behavior of the target application. Modification of the target application may be conducted without access to the source code of the target application.
-
Citations
20 Claims
-
1. A method of operating a secure application, comprising:
-
receiving a request to activate the secure application through an input device, wherein the secure application was created from a target application having a first set of functions associated with a first application behavior and the secure application has a second set of functions that are imposed on the first set of functions and that are associated with a second application behavior; in response to the receipt of the request, forcing the secure application to override the first application behavior with the second application behavior, wherein the second application behavior takes priority over the first application behavior; and via a processing unit, performing the second application behavior. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of generating a secure application, comprising:
via a processor; receiving a target application that is designed to interact with an operating system; configuring the target application by imposing one or more intercepts on the target application, wherein the imposition of the intercepts converts the target application into a secure application that maintains the interaction with the operating system; and repackaging the secure application such that the intercepts are integrated with the secure application and are inseparable from the secure application. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
16. A method of remotely managing a secure application, comprising:
-
selecting a secure application installed on a computing device, wherein the secure application was created from a target application by imposing one or more intercepts on the target application; and remotely managing the secure application by enforcing one or more policies against the secure application installed on the computing device such that the behavior of the secure application is modified from and overrides the original behavior of the target application. - View Dependent Claims (17, 18, 19, 20)
-
Specification