Authorizing local application activity using remotely defined security data
First Claim
1. A computer implemented method comprising:
- executing a sequence of instructions using a virtual machine on a mobile device, the sequence of instructions including at least one permission indicator associated with a protected activity on the mobile device, the executing causing presentation of content associated with a particular information channel on a user interface, the at least one permission indicator and the sequence of instructions being received from a remote server, the at least one permission indicator being delivered from the remote server with the sequence of instructions;
identifying, using the virtual machine, an instruction within the sequence of instructions as being associated with the protected activity;
determining, using the virtual machine, whether execution of the identified instruction is permitted based, at least in part, on the first permission indicator received from the remote server; and
in response a determination that execution of the identified instruction is permitted, performing the protected activity.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods, including computer software adapted to perform certain operations, can be implemented for preventing content received from non-trusted sources from accessing protected data. A sequence of instructions and multiple permission indicators associated with the sequence of instructions are received. One or more of permission indicators are associated with a protected activity. An instruction within the sequence of instructions associated with the protected activity is identified. A determination is made whether execution of the identified instruction is permitted based, at least in part, on the one or more permission indicators, and the protected activity is performed if execution of the identified instruction is permitted.
-
Citations
19 Claims
-
1. A computer implemented method comprising:
-
executing a sequence of instructions using a virtual machine on a mobile device, the sequence of instructions including at least one permission indicator associated with a protected activity on the mobile device, the executing causing presentation of content associated with a particular information channel on a user interface, the at least one permission indicator and the sequence of instructions being received from a remote server, the at least one permission indicator being delivered from the remote server with the sequence of instructions; identifying, using the virtual machine, an instruction within the sequence of instructions as being associated with the protected activity; determining, using the virtual machine, whether execution of the identified instruction is permitted based, at least in part, on the first permission indicator received from the remote server; and in response a determination that execution of the identified instruction is permitted, performing the protected activity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable storage medium comprising instructions that, when executed by at least one processor of a machine, cause the machine to perform operations comprising:
-
executing a sequence of instructions using a virtual machine on an electronic device, the sequence of instructions including at least one permission indicator, a first of the at least one permission indicators associated with a protected activity on the electronic device, the executing causing presentation of content associated with a particular information channel on a user interface, the sequence of instructions and at least one permission indicator stored in a particular segment of a file system on the electronic device, the file system including a plurality of segments, each segment corresponding to one of a plurality of information channels, the at least one permission indicator being received from a remote server with the sequence of instructions; receiving an updated value for the permission indicator from the remote source; storing, in the particular segment of the file system, the received updated value for the permission indicator; identifying, using the virtual machine, an instruction within the sequence of instructions as being associated with the protected activity; determining, using the virtual machine, whether execution of the identified instruction is permitted based, at least in part, on the first permission indicator received from the remote server; and in response a determination that execution of the identified instruction is permitted, performing the protected activity. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
a user interface device; a persistent storage device; and one or more processors operable to interact with the user interface device and the persistent storage device, the one or more processors further operable to; receive a sequence of instructions and at least one permission indicator at a virtual machine on an electronic device, the sequence of instructions and the at least one permission indicator provided to the virtual machine from a remote server; execute the sequence of instructions using the virtual machine on the electronic device, the sequence of instructions including the at least one permission indicator, a first of the at least one permission indicators associated with a protected activity on the electronic device, the executing causing presentation of content associated with a particular information channel on a user interface, the sequence of instructions and at least one permission indicator stored in a particular segment of a file system on the electronic device, the file system including a plurality of segments, each segment corresponding to one of a plurality of information channels, the at least one permission indicator being received from the remote source with the sequence of instructions; identify, using the virtual machine, an instruction within the sequence of instructions as being associated with the protected activity; determine whether the instruction is implemented in a custom extension expanding functionality of a runtime component; reviewing custom extension permissions for the custom extension; determine, using the virtual machine, whether execution of the identified instruction is permitted based, at least in part, on the first permission indicator and the custom extension permissions; and in response a determination that execution of the identified instruction is permitted, perform the protected activity. - View Dependent Claims (18, 19)
-
Specification