Systems and methods for protecting computing devices from imposter accessibility services
First Claim
1. A computer-implemented method for protecting computing devices from imposter accessibility services, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- registering a security application with the computing device as an accessibility service that has special permissions on the computing device that are not available to other applications;
ensuring that the security application is the first registered accessibility service on the computing device;
performing, by the security application, a security action after ensuring that the security application is the first registered accessibility service.
6 Assignments
0 Petitions
Accused Products
Abstract
The disclosed computer-implemented method for protecting computing devices from imposter accessibility services may include (1) registering a security application with the computing device as an accessibility service that has special permissions on the computing device that are not available to other applications, (2) ensuring that the security application is the first registered accessibility service on the computing device, and (3) performing, by the security application, a security action after ensuring that the security application is the first registered accessibility service. Various other methods, systems, and computer-readable media are also disclosed.
26 Citations
20 Claims
-
1. A computer-implemented method for protecting computing devices from imposter accessibility services, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
registering a security application with the computing device as an accessibility service that has special permissions on the computing device that are not available to other applications; ensuring that the security application is the first registered accessibility service on the computing device; performing, by the security application, a security action after ensuring that the security application is the first registered accessibility service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system including memory for protecting computing devices from imposter accessibility services, the system comprising:
-
a registration module, stored in the memory, that registers a security application with the computing device as an accessibility service that has special permissions on the computing device that are not available to other applications; an ensuring module, stored in the memory, that ensures that the security application is the first registered accessibility service on the computing device; a security module, stored in the memory, that performs, by the security application, a security action after ensuring that the security application is the first registered accessibility service; at least one physical processor configured to execute the registration module, the ensuring module, and the security module. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable medium comprising one or more computer-readable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
register a security application with the computing device as an accessibility service that has special permissions on the computing device that are not available to other applications; ensure that the security application is the first registered accessibility service on the computing device; perform, by the security application, a security action after ensuring that the security application is the first registered accessibility service. - View Dependent Claims (20)
-
Specification