×

Monitoring installed applications on user devices

  • US 9,992,025 B2
  • Filed: 04/15/2014
  • Issued: 06/05/2018
  • Est. Priority Date: 06/05/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • receiving a first signing identifier from a first computing device of a known source, wherein the first computing device is configured to send the first signing identifier to a third computing device;

    accessing known component data stored in a data repository, the known component data comprising data regarding known characteristics for components of one or more prior applications installed on at least one user device, wherein the prior applications have been installed on the at least one user device by downloading from the third computing device;

    after receiving the first signing identifier, evaluating, by a second computing device, authenticity of a first application comprising a plurality of components packaged within the first application, the evaluating including identifying at least one of the prior applications that is similar to the first application, and the similarity based on comparing a respective characteristic for each one or more of the plurality of components to the known component data;

    causing, by the second computing device, an identification of the plurality of components in a user interface of at least one user device, wherein the user interface is configured to receive selection of a behavior based on the identification of the components;

    identifying, based on the evaluating, at least one second application having a second signing identifier that is different from the first signing identifier, wherein the at least one second application is available for installation on at least one user device by downloading;

    in response to identifying that the at least one second application is similar to the first application, sending a communication as a challenge to the first computing device to authenticate the known source as a signer for the at least one second application, wherein the challenge comprises sending data to the first computing device to be signed with a private key, receiving the signed data from the first computing device, and confirming the signed data corresponds to the first signing identifier;

    sending, over a network, at least one communication to the first computing device that identifies the at least one second application, wherein the at least one communication includes the selected behavior; and

    updating, based on an instruction from the first computing device, a policy to control behavior on at least one user device of the at least one second application, wherein the updated policy includes the selected behavior.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×