Adapting a mobile application to a partitioned environment
First Claim
Patent Images
1. A method of providing a secure partition, comprising:
- receiving an indication that a first app is to be available to be used in a secure zone of a mobile device, wherein the indication comprises an attempt to install the first app to the secure zone, wherein the secure zone corresponds to a partition of the mobile device in which a second app and a third app are executed, wherein the second app is configured to store and access data that is accessible to the third app operating within the secure zone and that is inaccessible to a fourth app that operates outside the secure zone;
determining whether the first app is authorized to be installed in the secure zone;
in the event the first app is authorized to be installed in the secure zone, installing a secure zone version of the first app that exhibits a behavior associated with the secure zone on the mobile device, wherein the secure zone version is generated at least in part by;
performing reverse engineering on code included in the first app to determine a behavior to be modified to adapt the first app to the secure zone, andreplacing portions of the code of the first app, the portions of the code being associated with the behavior to be modified with code exhibiting the behavior associated with the secure zone, wherein the behavior associated with the secure zone is not a native behavior of the first app; and
in the event the first app is not authorized to be installed in the secure zone, replacing the first app with one that will not launch within the secure zone.
4 Assignments
0 Petitions
Accused Products
Abstract
Adapting a mobile or other application (“app”) to a partitioned environment is disclosed. In various embodiments, a “secure zone” or other logical partition is created and enforced at least in part by adapting a mobile or other app to behave in a manner required by and/or otherwise associated with the secure zone or other partition and which behavior is or in various embodiments may be different than a native behavior of the mobile or other app as designed and written by an application developer of the app.
33 Citations
26 Claims
-
1. A method of providing a secure partition, comprising:
-
receiving an indication that a first app is to be available to be used in a secure zone of a mobile device, wherein the indication comprises an attempt to install the first app to the secure zone, wherein the secure zone corresponds to a partition of the mobile device in which a second app and a third app are executed, wherein the second app is configured to store and access data that is accessible to the third app operating within the secure zone and that is inaccessible to a fourth app that operates outside the secure zone; determining whether the first app is authorized to be installed in the secure zone; in the event the first app is authorized to be installed in the secure zone, installing a secure zone version of the first app that exhibits a behavior associated with the secure zone on the mobile device, wherein the secure zone version is generated at least in part by; performing reverse engineering on code included in the first app to determine a behavior to be modified to adapt the first app to the secure zone, and replacing portions of the code of the first app, the portions of the code being associated with the behavior to be modified with code exhibiting the behavior associated with the secure zone, wherein the behavior associated with the secure zone is not a native behavior of the first app; and in the event the first app is not authorized to be installed in the secure zone, replacing the first app with one that will not launch within the secure zone. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 22, 23, 24, 25, 26)
-
-
17. A mobile device, comprising:
-
a processor configured to; receive an indication that a first app is to be available to be used in a secure zone of a mobile device, wherein the indication comprises an attempt to install the first app to the secure zone, wherein the secure zone corresponds to a partition of the mobile device in which a second app is configured to store and access data that is accessible to a third app operating within the secure zone and that is inaccessible to a fourth app that operates outside the secure zone; determine whether the first app is authorized to be installed in the secure zone; in the event the first app is authorized to be installed in the secure zone, installing a secure zone version of the first app that exhibits a behavior associated with the secure zone on the mobile device, wherein the secure zone version of the first app is generated at least in part by performing reverse engineering on code included in the first app to determine a behavior to be modified to adapt the first app to the secure zone and replacing portions of the code of the first app, the portions of the code being associated with the behavior to be modified with code corresponding to the behavior associated with the secure zone, wherein the behavior is not a native behavior of the first app; and in the event the first app is not authorized to be installed in the secure zone, replacing the first app with one that will not launch within the secure zone; and a memory or other storage device coupled to the processor and configured to store the secure zone version of the first app. - View Dependent Claims (18, 19, 20)
-
-
21. A computer program product to provide a secure partition, the computer program product being embodied in a tangible, non-transitory computer readable storage medium and comprising computer instructions for:
-
receiving an indication that a first app is to be available to be used in a secure zone of a mobile device, wherein the indication comprises an attempt to install the first app to the secure zone, wherein the secure zone corresponds to a partition of the mobile device in which a second app is configured to store and access data that is accessible to a third app operating within the secure zone and that is inaccessible to a fourth app that operates outside the secure zone; determining whether the first app is authorized to be installed in the secure zone; in the event the first app is authorized to be installed in the secure zone, installing a secure zone version of the first app that exhibits a behavior associated with the secure zone on the mobile device, wherein the secure zone version of the first app is generated at least in part by; performing reverse engineering on code included in the first app to determine a behavior to be modified to adapt the first app to the secure zone, and replacing portions of the code of the first app, the portions of the code being associated with the behavior to be modified with code corresponding to the behavior associated with the secure zone, wherein the behavior is not a native behavior of the first app; and in the event the first app is not authorized to be installed in the secure zone, replacing the first app with one that will not launch within the secure zone.
-
Specification