Systems and methods for providing controls for application behavior
First Claim
1. A computer-implemented method for providing controls for application behavior, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- identifying, by the computing device, an application that is distributed via an application repository and that is configured to use a permission on a computing platform that enables the application to access a feature of the computing platform;
receiving, by the computing device, a request from a user to reconfigure the application to control attempts by the application to use the permission by intercepting and interfering with attempts by the application to use the permission;
reconfiguring, by the computing device in response to the request from the user, the application to control attempts by the application to use the permission by intercepting and interfering with attempts by the application to use the permission;
determining, by the computing device, that an updated version of the application is available via the application repository;
reconfiguring the updated version of the application to continue controlling attempts by the application to use the permission based at least in part on the request from the user by intercepting and interfering with attempts by the updated version of the application to use the permission in response to an instruction to update the application.
6 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for providing controls for application behavior may include (1) identifying an application that is distributed via an application repository and that is configured to use a permission on a computing platform that enables the application to access a feature of the computing platform, (2) receiving a request to reconfigure the application to intercept and interfere with attempts by the application to use the permission, (3) reconfiguring the application, in response to the request, to intercept and interfere with attempts by the application to use the permission, (4) determining that an updated version of the application is available via the application repository, and (5) reconfiguring the updated version of the application to intercept and interfere with attempts by the application to use the permission in response to an instruction to update the application. Various other methods, systems, and computer-readable media are also disclosed.
-
Citations
20 Claims
-
1. A computer-implemented method for providing controls for application behavior, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
identifying, by the computing device, an application that is distributed via an application repository and that is configured to use a permission on a computing platform that enables the application to access a feature of the computing platform; receiving, by the computing device, a request from a user to reconfigure the application to control attempts by the application to use the permission by intercepting and interfering with attempts by the application to use the permission; reconfiguring, by the computing device in response to the request from the user, the application to control attempts by the application to use the permission by intercepting and interfering with attempts by the application to use the permission; determining, by the computing device, that an updated version of the application is available via the application repository; reconfiguring the updated version of the application to continue controlling attempts by the application to use the permission based at least in part on the request from the user by intercepting and interfering with attempts by the updated version of the application to use the permission in response to an instruction to update the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for providing controls for application behavior, the system comprising:
-
an identification module, stored in memory, that identifies an application that is distributed via an application repository and that is configured to use a permission on a computing platform that enables the application to access a feature of the computing platform; a receiving module, stored in memory, that receives a request from a user to reconfigure the application to control attempts by the application to use the permission by intercepting and interfering with attempts by the application to use the permission; a reconfiguration module, stored in memory, that reconfigures the application, in response to the request from the user, to control attempts by the application to use the permission by intercepting and interfering with attempts by the application to use the permission; a determination module, stored in memory, that determines that an updated version of the application is available via the application repository; an updating module, stored in memory, that reconfigures the updated version of the application to continue controlling attempts by the application to use the permission based at least in part on the request from the user by intercepting and interfering with attempts by the updated version of the application to use the permission in response to an instruction to update the application; at least one hardware processor that executes the identification module, the receiving module, the reconfiguration module, the determination module, and the updating module. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable-storage medium comprising one or more computer-readable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
identify an application that is distributed via an application repository and that is configured to use a permission on a computing platform that enables the application to access a feature of the computing platform; receive a request from a user to reconfigure the application to control attempts by the application to use the permission by intercepting and interfering with attempts by the application to use the permission; reconfigure the application, in response to the request from the user, to control attempts by the application to use the permission by intercepting and interfering with attempts by the application to use the permission; determine that an updated version of the application is available via the application repository; reconfigure the updated version of the application to continue controlling attempts by the application to use the permission based at least in part on the request from the user by intercepting and interfering with attempts by the updated version of the application to use the permission in response to an instruction to update the application.
-
Specification