METHOD AND SYSTEM FOR APPLICATION-BASED POLICY MONITORING AND ENFORCEMENT ON A MOBILE DEVICE
First Claim
Patent Images
1. A method comprising:
- with at least one computing device;
processing a software application executable by a mobile device to obtain a plurality of executable components of the software application;
associating at least one second component with at least one of the components of the software application without modifying or replacing any of the executable components of the software application, the at least one second component configured to, during execution of the software application, determine whether the software application is attempting to perform a potentially unauthorized activity; and
creating a software application package comprising the executable components of the software application and the at least one second component, the software application package adapted for installation on the mobile device.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system for application-based monitoring and enforcement of security, privacy, performance and/or other policies on a mobile device includes incorporating monitoring and policy enforcement code into a previously un-monitored software application package that is installable on a mobile device, and executing the monitoring and policy enforcement code during normal use of the software application by a user of the mobile device.
79 Citations
18 Claims
-
1. A method comprising:
-
with at least one computing device; processing a software application executable by a mobile device to obtain a plurality of executable components of the software application; associating at least one second component with at least one of the components of the software application without modifying or replacing any of the executable components of the software application, the at least one second component configured to, during execution of the software application, determine whether the software application is attempting to perform a potentially unauthorized activity; and creating a software application package comprising the executable components of the software application and the at least one second component, the software application package adapted for installation on the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
after a software application comprising code interpretable as a system call to an operating system object is launched by a user and loaded into memory for execution by a mobile device, and prior to the execution of the software application by the mobile device; temporarily associating the operating system object with a security and/or privacy monitoring routine, such that during the execution of the software application, the security and/or privacy monitoring routine is executed prior to execution of the at least one system call. - View Dependent Claims (13, 14, 15)
-
-
16. A method comprising:
-
with at least one computing device; processing an original application package, the original application package comprising a software application executable by a mobile device and at least one other file, to obtain a plurality of executable components of the software application; associating at least one second component with at least one of the executable components of the software application without modifying or replacing any of the executable components of the software application, the at least one second component configured to;
after the software application is launched by a user and prior to execution of the software application, change a dynamic link to an external function that is called by the software application during execution of the software application to point to a memory location of application monitoring code, and during execution of the software application follow the changed dynamic link to evaluate a call to the external function using the application monitoring code; andcreating a new software application package comprising the components of the software application and the at least one second component, the software application package adapted for installation on the mobile device. - View Dependent Claims (17, 18)
-
Specification