Methods and systems for persistent cross-application mobile device identification
First Claim
1. A system for persistently identifying a mobile device across applications, the system comprising:
- a memory which comprises;
a first sandbox associated with a first application;
a second sandbox associated with a second application; and
a persistent shared storage configured to store a universal device identifier which identifies a mobile device across the first application and the second application; and
a processor programmed to;
execute the first application in the first sandbox, wherein the first application is restricted from accessing the second sandbox;
execute the second application in the second sandbox, wherein the second application is restricted from accessing the first sandbox;
receive a first request from the first application to access information associated with the mobile device, wherein the first request comprises the universal device identifier;
receive a second request from the second application to access the information associated with the mobile device, wherein the second request comprises the universal device identifier;
retrieve the universal device identifier from the persistent shared storage; and
return the universal device identifier and the information associated with the mobile device to the first application and the second application for fraud detection, in response to the first request and the second request respectively.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are provided for persistent cross-application mobile device identification. A mobile device may have a plurality of sandboxes in memory containing applications. The mobile device may have a shared storage which may accessible by applications from different sandboxes. A storage location identifier may be used to access information in shared storage. A universal device identifier may be stored in the shared storage to identify the mobile device and may be accessible by multiple applications and updates to applications. The universal device identifier may be used to track the mobile device for advertising, fraud detection, reputation tracking, or other purposes.
711 Citations
20 Claims
-
1. A system for persistently identifying a mobile device across applications, the system comprising:
-
a memory which comprises; a first sandbox associated with a first application; a second sandbox associated with a second application; and a persistent shared storage configured to store a universal device identifier which identifies a mobile device across the first application and the second application; and a processor programmed to; execute the first application in the first sandbox, wherein the first application is restricted from accessing the second sandbox; execute the second application in the second sandbox, wherein the second application is restricted from accessing the first sandbox; receive a first request from the first application to access information associated with the mobile device, wherein the first request comprises the universal device identifier; receive a second request from the second application to access the information associated with the mobile device, wherein the second request comprises the universal device identifier; retrieve the universal device identifier from the persistent shared storage; and return the universal device identifier and the information associated with the mobile device to the first application and the second application for fraud detection, in response to the first request and the second request respectively. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for persistently identifying a mobile device across applications, the method comprising:
-
executing a first application in a first sandbox, wherein the first application is restricted from accessing a second sandbox associated with a second application; executing the second application in the second sandbox, wherein the second application is restricted from accessing the first sandbox; receiving a first request from the first application to access information associated with the mobile device, wherein the first request comprises a universal device identifier which identifies the mobile device across the first application and the second application; receiving a second request from the second application to access the information associated with the mobile device, wherein the second request comprises the universal device identifier; retrieving the universal device identifier from a persistent shared storage accessible by the first application and the second application; and returning the universal device identifier and the information associated with the mobile device to the first application and the second application for fraud detection, in response to the first request and the second request respectively. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. Non-transitory computer storage having stored thereon a computer program, the computer program including executable instructions that instruct a computer system to at least:
-
execute a first application in a first sandbox, wherein the first application is restricted from accessing a second sandbox associated with a second application; execute the second application in the second sandbox, wherein the second application is restricted from accessing the first sandbox; receive a first request from the first application to access information associated with the mobile device, wherein the first request comprises a universal device identifier which identifies the mobile device across the first application and the second application; receive a second request from the second application to access the information associated with the mobile device, wherein the second request comprises the universal device identifier; retrieve the universal device identifier from a persistent shared storage accessible by the first application and the second application; and return the universal device identifier and the information associated with the mobile device to the first application and the second application for fraud detection, in response to the first request and the second request respectively. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification