Method and system for protecting privacy and enhancing security on an electronic device
First Claim
1. A method for controlling access to a delivery of sensor information to a requesting application running on an electronic device, the method comprising:
- collecting, by a sensor in the electronic device hosting a plurality of applications, the sensor information associated with at least one user input action;
intercepting, by the electronic device, a request to access the sensor information from the requesting application of the plurality of applications;
determining, by the electronic device, that the requesting application is running in one of a foreground of the electronic device and a background of the electronic device; and
controlling, by the electronic device, access of the requesting application to the sensor information associated with the at least one user input action by applying a set of access rules including at least one rule based on the determination that the requesting application is running in the foreground of the electronic device and at least one rule based on the determination that the requesting application is running in the background of the electronic device, wherein the set of rules defines access control policies to permit or to prevent the delivery of the sensor information to the requesting application running on the electronic device, the access control policies being associated with the sensor information collected by the sensor in the electronic device.
7 Assignments
0 Petitions
Accused Products
Abstract
A method for protecting privacy and enhancing security on an electronic device is provided. When sensor information associated with at least one user input action is collected by a sensor in an electronic device hosting a plurality of applications, the method includes intercepting a request to access the sensor information from a requesting application of the plurality of applications, and controlling access to the sensor information associated with the at least one user input action based on the requesting application. By controlling access to the sensor information, leakage of sensitive or secure information to a malicious background application is minimized and privacy and security are enhanced.
317 Citations
22 Claims
-
1. A method for controlling access to a delivery of sensor information to a requesting application running on an electronic device, the method comprising:
-
collecting, by a sensor in the electronic device hosting a plurality of applications, the sensor information associated with at least one user input action; intercepting, by the electronic device, a request to access the sensor information from the requesting application of the plurality of applications; determining, by the electronic device, that the requesting application is running in one of a foreground of the electronic device and a background of the electronic device; and controlling, by the electronic device, access of the requesting application to the sensor information associated with the at least one user input action by applying a set of access rules including at least one rule based on the determination that the requesting application is running in the foreground of the electronic device and at least one rule based on the determination that the requesting application is running in the background of the electronic device, wherein the set of rules defines access control policies to permit or to prevent the delivery of the sensor information to the requesting application running on the electronic device, the access control policies being associated with the sensor information collected by the sensor in the electronic device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium carrying one or more sequences of instructions for controlling access to the delivery of sensor information to a requesting application running on an electronic device, which instructions, when executed by one or more processors, cause the one or more processors to perform operations comprising:
-
collecting, by a sensor in the electronic device hosting a plurality of applications, the sensor information associated with at least one user input action; intercepting, by the electronic device, a request to access the sensor information from the requesting application of the plurality of applications; determining, by the electronic device, that the requesting application is running in one of a foreground of the electronic device and a background of the electronic device; and controlling, by the electronic device, access of the requesting application to the sensor information associated with the at least one user input action by applying a set of access rules including at least one rule based on the determination that the requesting application is running in the foreground of the electronic device and at least one rule based on the determination that the requesting application is running in the background of the electronic device, wherein the set of rules defines access control policies to permit or to prevent the delivery of the sensor information to the requesting application running on the electronic device, the access control policies being associated with the sensor information collected by the sensor in the electronic device. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
Specification