Method of preventing access to sensitive data of a computing device
First Claim
Patent Images
1. A method of controlling access by an application to data or a service supported by a computing system, said method comprising:
- identifying, by said computing system, a request from said application for access to said data or said service supported by said computing system;
determining, by said computing system, whether said access has been restricted to said data or said service, wherein said access to said data or said service is requesting-application specific; and
, if so,indicating to said application, by said computing system, that said request for said access has been granted by said computing system; and
automatically emulating, by said computing system, said data or said service when said data or said service is accessed by said application,wherein if said service being accessed is;
a microphone, a camera, a video camera, or a GPS location service, a response to the request comprises;
an audio file, an image, a movie, or location data, respectively; and
wherein if said service being accessed is permission to perform calls, said response to the request comprises emulating a fake phone call with a non-responding number.
1 Assignment
0 Petitions
Accused Products
Abstract
A technique is provided for controlling access by an application to data or a service supported by a computing system, a computer program product and an access control unit. The technique includes identifying a request from an application for access to data or a service supported by the system, determining whether access has been restricted to the data or service, and, if so, indicating to the application that the request for access has been granted by the system and emulating the data or service when the data or service is accessed by the application.
18 Citations
15 Claims
-
1. A method of controlling access by an application to data or a service supported by a computing system, said method comprising:
-
identifying, by said computing system, a request from said application for access to said data or said service supported by said computing system; determining, by said computing system, whether said access has been restricted to said data or said service, wherein said access to said data or said service is requesting-application specific; and
, if so,indicating to said application, by said computing system, that said request for said access has been granted by said computing system; and automatically emulating, by said computing system, said data or said service when said data or said service is accessed by said application, wherein if said service being accessed is;
a microphone, a camera, a video camera, or a GPS location service, a response to the request comprises;
an audio file, an image, a movie, or location data, respectively; andwherein if said service being accessed is permission to perform calls, said response to the request comprises emulating a fake phone call with a non-responding number. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer readable medium of a computing system having computer readable instructions encoded therein, said computer readable instructions adapted to be executed to implement steps comprising:
-
identifying, by said computing system, a request from said application for access to said data or said service supported by said computing system; determining, by said computing system, whether said access has been restricted to said data or said service, wherein said access to said data or said service is requesting-application specific; and
, if so,indicating to said application, by said computing system, that said request for said access has been granted by said computing system; and automatically emulating, by said computing system, said data or said service when said data or said service is accessed by said application, wherein if said service being accessed is;
a microphone, a camera, a video camera, or a GPS location service, a response to the request comprises;
an audio file, an image, a movie, or location data, respectively; andwherein if said service being accessed is permission to perform calls, said response to the request comprises emulating a fake phone call with a non-responding number.
-
-
15. A method, consisting of:
-
identifying, by a computing system, a request from an application for access to data or a service supported by said computing system; determining, by said computing system, whether said access has been restricted to said data or said service, wherein said access to said data or said service is requesting-application specific; and
, if so,indicating to said application, by said computing system, that said request for said access has been granted by said computing system; and automatically emulating, by said computing system, said data or said service when said data or said service is accessed by said application; wherein if said service being accessed is permission to perform calls, said response to the request comprises emulating a fake phone call with a non-responding number.
-
Specification