CA2448979A1 - Safe application distribution and execution in a wireless environment - Google Patents

Safe application distribution and execution in a wireless environment Download PDF

Info

Publication number
CA2448979A1
CA2448979A1 CA002448979A CA2448979A CA2448979A1 CA 2448979 A1 CA2448979 A1 CA 2448979A1 CA 002448979 A CA002448979 A CA 002448979A CA 2448979 A CA2448979 A CA 2448979A CA 2448979 A1 CA2448979 A1 CA 2448979A1
Authority
CA
Canada
Prior art keywords
application
permission
wireless device
detection technique
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002448979A
Other languages
French (fr)
Other versions
CA2448979C (en
Inventor
Laurence Lundblade
Marc S. Phillips
Brian Minear
Yan Zhuang
Anand Krishnan
Stephen A. Sprigg
Mazen Chmaytelli
Mitchell Oliver
Gerald Horel
Karen Crossland
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2448979A1 publication Critical patent/CA2448979A1/en
Application granted granted Critical
Publication of CA2448979C publication Critical patent/CA2448979C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/54Link editing before load time
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • EFIXED CONSTRUCTIONS
    • E04BUILDING
    • E04HBUILDINGS OR LIKE STRUCTURES FOR PARTICULAR PURPOSES; SWIMMING OR SPLASH BATHS OR POOLS; MASTS; FENCING; TENTS OR CANOPIES, IN GENERAL
    • E04H4/00Swimming or splash baths or pools
    • E04H4/0006Devices for producing waves in swimming pools
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/60Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63BAPPARATUS FOR PHYSICAL TRAINING, GYMNASTICS, SWIMMING, CLIMBING, OR FENCING; BALL GAMES; TRAINING EQUIPMENT
    • A63B69/00Training appliances or apparatus for special sports
    • A63B69/0093Training appliances or apparatus for special sports for surfing, i.e. without a sail; for skate or snow boarding
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63BAPPARATUS FOR PHYSICAL TRAINING, GYMNASTICS, SWIMMING, CLIMBING, OR FENCING; BALL GAMES; TRAINING EQUIPMENT
    • A63B71/00Games or sports accessories not covered in groups A63B1/00 - A63B69/00
    • A63B71/04Games or sports accessories not covered in groups A63B1/00 - A63B69/00 for small-room or indoor sporting games
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63GMERRY-GO-ROUNDS; SWINGS; ROCKING-HORSES; CHUTES; SWITCHBACKS; SIMILAR DEVICES FOR PUBLIC AMUSEMENT
    • A63G31/00Amusement arrangements
    • A63G31/007Amusement arrangements involving water
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T29/00Metal working
    • Y10T29/49Method of mechanical manufacture
    • Y10T29/49826Assembling or joining
    • Y10T29/49947Assembling or joining by applying separate fastener

Abstract

The present invention provides safe and secure application distribution and execution by providing systems and methods that test an application to ensur e that it satisfies predetermined criteria associated with the environment in which it will execute. Furthermore, by using rules and permission lists, application removal, and a modification detection technique, such as digital signatures, the present invention provides mechanisms to safely distribute a nd execute tested, or untested, applications by determining whether the application has been modified, determining if it has permission to execute i n a given wireless device environment, and removing the application.

Claims (53)

1. A method for distributing and processing an application, comprising the steps of:
receiving the application and identification information;
certifying the application satisfies a predetermined criterion;
assigning a permission to the application;
transmitting the application, the permission and the identification information to the a device using a modification detection technique;
determining whether the application was modified during transmission;
storing a rule on the device;
determining if the application may be process using the permission and the rule; and removing the application from the device.
2. The method of claim 1 further comprising the steps of:
initiating the execution of the application on the device;
monitoring the execution of the application; and detecting the application attempting to make an improper operation.
3. The method of claim 1, wherein the application is denied permission to be processed on the device.
4. The method of claim 1, wherein the identification information is retrieved by the device.
5. The method of claim 1 further comprising the step of detecting a modification in the application.
6. The method of claim 1 further comprising the step of detecting a modification in the permission.
7. The method of claim 1, wherein the modification detection technique uses a digital signature.
8. A method for distributing and processing an application, comprising the steps of:
receiving the application and identification information;
certifying the application satisfies a predetermined criterion;
assigning a permission to the application;
transmitting the application, the permission and the identification information to the a wireless device;
storing a rule on the device; and determining if the application may be processed on the device using the permission and the rule.
9. The method of claim 8 further comprising the steps of:
initiating the execution of the application on the wireless device;
monitoring the execution of the application;
detecting the application attempting to make an improper operation; and removing the application from the wireless device.
10. The method of claim 8, wherein the application was denied permission to be processed on the wireless device and further comprising the step of removing the application from the device.
11. The method of claim 8, wherein the identification information is determined by the wireless device.
12. The method of claim 8, wherein a modification detection technique is used to transmit the application, the permission and the identification information.
13. The method of claim 12, wherein the modification detection technique uses a digital signature.
14. The method of claim 12 further comprising the steps of:
detecting a modification in the application transmitted to the device; and removing the application from the device.
15. The method of claim 12 further comprising the steps of:
detecting a modification in the permission transmitted to the device; and removing the application from the device.
16. A method for distributing and processing an application, comprising the steps of:
receiving the application and identification information;
assigning a permission to the application;
transmitting the application, the permission and the identification information to the a device using a modification detection technique;
determining whether the application was modified during transmission;
storing a rule on the device;
determining if the application may be process using the permission and the rule; and removing the application from the device.
17. The method of claim 16 further comprising the steps of:
initiating the execution of the application on the wireless device;
monitoring the execution of the application;
detecting the application attempting to make an improper operation; and removing the application from the wireless device.
18. The method of claim 16, wherein the application was denied permission to be processed on the wireless device and further comprising the step of removing the application from the device.
19. The method of claim 16, wherein the identification information is determined by the wireless device.
20. The method of claim 16, wherein a modification detection technique is used to transmit the application, the permission and the identification information.
21. The method of claim 20, wherein the modification detection technique uses a digital signature.
22. The method of claim 20 further comprising the steps of:
detecting a modification in the application transmitted to the device; and removing the application from the device;
23. The method of claim 12 further comprising the steps of:
detecting a modification in the permission transmitted to the device; and removing the application from the device.
24. A system for distributing an executing an application on a wireless device, comprising:
a central server operable to receive the application and developer identification, to assign a permission associated with the application and to transmit the application information to the wireless device;
a server operable to certify the application satisfies a predefined criterion;
and the wireless device operable to receive the application and developer identification, and to evaluate the assigned permission.
25. The system of claim 24, wherein the central server is further operable to transmit the application to the wireless device using a modification detection technique.
26. The system of claim 24, wherein the central server is further operable to transmit the permission to the wireless device using a modification detection technique.
27. The system of claim 24, wherein the server is operable to certify the application is the central server.
28. The system of claim 24, wherein the wireless device is operable to evaluate the assigned permission using a rule stored in the wireless device.
29. A system for distributing and executing an application on a wireless device, comprising:
means for receiving the application and identification information;
means for assigning a permission to the application;
means for transmitting the application, the permission and the identification information to the device using a modification detection technique;
means for determining whether the application was modified during transmission;
means for storing a rule on the device;
means for determining if the application may be process using the permission and the rule; and means for removing the application from the device.
30. A method of processing application distribution, comprising the steps of:
receiving the application and identification information;
certifying the application satisfies a predetermined criterion;
assigning a permission to the application;
transmitting the application, the permission and the identification information to the device using a modification detection technique; and initiating a request to remove the application from a device.
31. The method of claim 30, further comprising the step of:
evaluating the received application and identification information to determine the identity of a developer of the application.
32. The method of claim 30, wherein the modification detection technique uses a digital signature.
33. A method of processing application distribution, comprising the steps of:
receiving the application and identification information;
assigning a permission to the application; and transmitting the application, the permission and the identification information to the device using a modification detection technique.
34. The method of claim 33 further comprising the step of initiating a request to remove the application from a device.
35 The method of claim 33 further comprising the step of certifying the application satisfies a predetermined criterion.
36. The method of claim 33, further comprising the step of:
evaluating the received application and identification information to determine the identity of a developer of the application.
37. The method of claim 33, wherein the modification detection technique uses a digital signature.
38. A system for application distribution, comprising:
a central server operable to receive application and identity information, assign a permission, and transmit the application using a modification detection technique; and a network connected to the central server to receive the application.
39. The system of claim 38, wherein the central server is further operable to certify the application satisfies a predefined criterion.
40. A system for application distribution, comprising:
means for receiving the application and identification information;
means for certifying the application satisfies a predetermined criterion;
means for assigning a permission to the application; and means for transmitting the application, the permission and the identification information to the device using a modification detection technique.
41. A computer-readable medium containing computer-executable instructions for distributing applications, comprising the steps of:
receiving the application and identification information;
certifying the application satisfies a predetermined criterion;
assigning a permission to the application; and transmitting the application, the permission and the identification information to the device using a modification detection technique.
42. A method for executing an application on a wireless device, comprising the steps of:
storing a rule to evaluate a permission;
receiving information comprising the application, the permission and an identification using a modification detection technique;
receiving a request to execute the application on the wireless device;
evaluating the received information to determine if the received information was modified;
in the event the received information was not modified, evaluating the permission associated with the application; and in the event the permission is granted, executing the application.
43. The method of claim 42, wherein the modification detection technique uses a digital signature.
44. The method of claim 42 further comprising the step of monitoring the execution of the application to determine if an improper operation is attempted.
45. The method of claim 42 further comprising the step of removing the application from the wireless device.
46. A method for executing an application on a wireless device, comprising the steps of:
storing a rule to evaluate a permission;
receiving information comprising the application, the permission and an identification using a modification detection technique;
receiving a request to execute the application on the wireless device; and evaluating the permission associated with an application; and in the event the information was modified, removing the application from the wireless device.
47. The method of claim 46, further comprising the steps of:
in the event the received information was not modified, evaluating the permission associated with the application; and in the event the permission is granted, executing the application.
48. The method of claim 46, wherein the modification detection technique uses a digital signature.
49. The method of claim 46 further comprising the step of monitoring the execution of the application to determine if an improper operation is attempted.
50. The method of claim 46 further comprising the step of removing the application from the wireless device in the event the improper operation is attempted.
51. A wireless device for executing an application, comprising:

a input to receive an application and a permission;
a rule contained in storage to evaluate the permission; and a key contained in storage to evaluate a digital signature, wherein the wireless device is operable to execute the application upon evaluation of the permission and digital signature.
52. A wireless device for executing an application, comprising:
means for storing a rule to evaluate a permission;
means for receiving information comprising the application, the permission and an identification using a modification detection technique;
means for receiving a request to execute the application on the wireless device;
means for evaluating the received information to determine if the received information was modified;
means for, in the event the received information Was not modified, evaluating the permission associated with the application; and means for, in the event the permission is granted, executing the application.
53. A computer-readable medium containing computer-executable instructions for distributing applications, comprising the steps of:
storing a rule to evaluate a permission;
receiving information comprising the application, the permission and an identification using a modification detection technique;
receiving a request to execute the application on the wireless device;
evaluating the received information to determine if the received information was modified;
in the event the received information was not modified, evaluating the permission associated with the application; and in the event the permission is granted, executing the application.
CA2448979A 2001-05-31 2002-05-23 Safe application distribution and execution in a wireless environment Expired - Lifetime CA2448979C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US09/872,418 US7099663B2 (en) 2001-05-31 2001-05-31 Safe application distribution and execution in a wireless environment
US09/872,418 2001-05-31
PCT/US2002/016485 WO2002097620A2 (en) 2001-05-31 2002-05-23 Safe application distribution and execution in a wireless environment

Publications (2)

Publication Number Publication Date
CA2448979A1 true CA2448979A1 (en) 2002-12-05
CA2448979C CA2448979C (en) 2011-03-01

Family

ID=25359530

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2448979A Expired - Lifetime CA2448979C (en) 2001-05-31 2002-05-23 Safe application distribution and execution in a wireless environment

Country Status (20)

Country Link
US (5) US7099663B2 (en)
EP (2) EP2163986B1 (en)
JP (2) JP4795636B2 (en)
KR (1) KR100634773B1 (en)
CN (1) CN1258141C (en)
AR (1) AR036043A1 (en)
AT (1) ATE447739T1 (en)
AU (1) AU2002312041B2 (en)
BR (1) BRPI0209741B1 (en)
CA (1) CA2448979C (en)
DE (1) DE60234267D1 (en)
ES (1) ES2334336T3 (en)
HK (1) HK1069451A1 (en)
IL (1) IL159117A0 (en)
MX (1) MXPA03010890A (en)
NZ (1) NZ529867A (en)
PE (1) PE20030021A1 (en)
RU (1) RU2295753C2 (en)
TW (1) TWI252701B (en)
WO (1) WO2002097620A2 (en)

Families Citing this family (131)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IL133584A (en) * 1999-12-19 2010-02-17 Enco Tone Ltd Method for the acoustic encodification of dynamic identification codes
US7099663B2 (en) 2001-05-31 2006-08-29 Qualcomm Inc. Safe application distribution and execution in a wireless environment
JP2003050641A (en) * 2001-08-07 2003-02-21 Nec Corp Program management system, its program management method, and information management program
US20030041125A1 (en) * 2001-08-16 2003-02-27 Salomon Kirk C. Internet-deployed wireless system
US8832754B2 (en) * 2002-05-03 2014-09-09 Tvworks, Llc System and method for providing synchronized events to a television application
JP2003337716A (en) * 2002-05-20 2003-11-28 Ntt Docomo Inc Electronic device, data sharing method, program, and recording medium
US6965674B2 (en) * 2002-05-21 2005-11-15 Wavelink Corporation System and method for providing WLAN security through synchronized update and rotation of WEP keys
GB0212314D0 (en) * 2002-05-28 2002-07-10 Symbian Ltd Secure mobile wireless device
US7965842B2 (en) * 2002-06-28 2011-06-21 Wavelink Corporation System and method for detecting unauthorized wireless access points
US7606242B2 (en) * 2002-08-02 2009-10-20 Wavelink Corporation Managed roaming for WLANS
US7522906B2 (en) 2002-08-09 2009-04-21 Wavelink Corporation Mobile unit configuration management for WLANs
US20080313282A1 (en) 2002-09-10 2008-12-18 Warila Bruce W User interface, operating system and architecture
US7139559B2 (en) * 2002-12-09 2006-11-21 Qualcomm Inc. System and method for handshaking between wireless devices and servers
US7793355B2 (en) 2002-12-12 2010-09-07 Reasearch In Motion Limited System and method of owner control of electronic devices
US7088237B2 (en) 2003-02-14 2006-08-08 Qualcomm Incorporated Enhanced user privacy for mobile station location services
CA2516580C (en) * 2003-02-21 2011-01-25 Research In Motion Limited System and method of multiple-level control of electronic devices
US8156558B2 (en) 2003-05-17 2012-04-10 Microsoft Corporation Mechanism for evaluating security risks
US7203967B2 (en) * 2003-09-10 2007-04-10 Qualcomm Incorporated Methods and apparatus for content protection in a wireless network
US8549166B2 (en) 2004-03-01 2013-10-01 Qualcomm Incorporated Execution of unverified programs in a wireless, device operating environment
CN100465889C (en) * 2004-04-29 2009-03-04 杭州斯达康通讯有限公司 Method for downloading computer data to mobile phone
US7546956B2 (en) 2004-04-30 2009-06-16 Research In Motion Limited System and method of operation control on an electronic device
CN1311341C (en) * 2004-05-10 2007-04-18 杭州斯达康通讯有限公司 Method for conducting digital signature when downloading computer data to mobile phone
US7979706B1 (en) * 2004-09-29 2011-07-12 Rockwell Automation Technologies, Inc. Systems and methods for queuing an action in industrial automation systems
US20060093149A1 (en) * 2004-10-30 2006-05-04 Shera International Ltd. Certified deployment of applications on terminals
US7877744B2 (en) * 2004-11-05 2011-01-25 Qualcomm Incorporated Method, software and apparatus for activating resident applications
US20060107327A1 (en) * 2004-11-16 2006-05-18 Sprigg Stephen A Methods and apparatus for enforcing application level restrictions on local and remote content
DE102004058882A1 (en) * 2004-12-06 2006-06-08 Giesecke & Devrient Gmbh Generating program code in a load format and providing executable program code
US20060149741A1 (en) * 2005-01-04 2006-07-06 Oracle International Corporation Efficient Approach to Implement Applications on Server Systems in a Networked Environment
JP4232767B2 (en) * 2005-03-14 2009-03-04 セイコーエプソン株式会社 Software authentication system, software authentication program, and software authentication method
JP4727278B2 (en) * 2005-04-05 2011-07-20 株式会社エヌ・ティ・ティ・ドコモ Application program verification system, application program verification method, and computer program
US7770785B2 (en) * 2005-06-13 2010-08-10 Qualcomm Incorporated Apparatus and methods for detection and management of unauthorized executable instructions on a wireless device
US8238352B2 (en) * 2005-09-02 2012-08-07 Cisco Technology, Inc. System and apparatus for rogue VoIP phone detection and managing VoIP phone mobility
US20070078907A1 (en) * 2005-10-05 2007-04-05 Ming-Tsung Chiang Method for updating function of handheld apparatus through plug-and play (PnP) storage device
US9573067B2 (en) * 2005-10-14 2017-02-21 Microsoft Technology Licensing, Llc Mass storage in gaming handhelds
US8045958B2 (en) 2005-11-21 2011-10-25 Research In Motion Limited System and method for application program operation on a wireless device
EP1788505A1 (en) * 2005-11-21 2007-05-23 Research In Motion Limited System and method for application program operation on a wireless device
EP1826944B1 (en) 2006-02-27 2009-05-13 Research In Motion Limited Method of customizing a standardized IT policy
US8117441B2 (en) * 2006-06-20 2012-02-14 Microsoft Corporation Integrating security protection tools with computer device integrity and privacy policy
TW201251496A (en) 2006-12-28 2012-12-16 Interdigital Tech Corp Efficient uplink operation with high instantaneous data rates
US10045327B2 (en) 2007-01-17 2018-08-07 Eagency, Inc. Mobile communication device monitoring systems and methods
US8126456B2 (en) * 2007-01-17 2012-02-28 Eagency, Inc. Mobile communication device monitoring systems and methods
US8712396B2 (en) * 2007-01-17 2014-04-29 Eagency, Inc. Mobile communication device monitoring systems and methods
US9324074B2 (en) 2007-01-17 2016-04-26 Eagency, Inc. Mobile communication device monitoring systems and methods
US8875266B2 (en) * 2007-05-16 2014-10-28 Vmware, Inc. System and methods for enforcing software license compliance with virtual machines
US10181055B2 (en) 2007-09-27 2019-01-15 Clevx, Llc Data security system with encryption
US10778417B2 (en) 2007-09-27 2020-09-15 Clevx, Llc Self-encrypting module with embedded wireless user authentication
US10783232B2 (en) 2007-09-27 2020-09-22 Clevx, Llc Management system for self-encrypting managed devices with embedded wireless user authentication
US11190936B2 (en) 2007-09-27 2021-11-30 Clevx, Llc Wireless authentication system
US20090273438A1 (en) * 2008-05-01 2009-11-05 Delphi Technologies, Inc. Remote monitoring, interrogation and control apparatus for stationary and mobile systems
EP2248366A4 (en) * 2008-01-29 2014-04-09 Qualcomm Inc Secure application signing
JP2009253565A (en) * 2008-04-04 2009-10-29 Hitachi Ltd Mobile terminal apparatus and radio communication system management method in mobile terminal apparatus
US9076176B2 (en) * 2008-05-05 2015-07-07 Apple Inc. Electronic submission of application programs for network-based distribution
US9342287B2 (en) 2008-05-05 2016-05-17 Apple Inc. Software program ratings
US9237070B2 (en) 2008-07-22 2016-01-12 Siemens Industry, Inc. Development, test, and demonstration of automation solutions using web-based virtual computers and VPN tunneling
US9531836B2 (en) * 2008-12-18 2016-12-27 Telefonaktiebolaget Lm Ericsson (Publ) Distributing an application via a network node
CN105338106B (en) * 2008-12-18 2019-03-12 爱立信电话股份有限公司 Distribution application
FR2943482B1 (en) * 2009-03-18 2011-05-27 Bouygues Telecom Sa METHOD AND SYSTEM FOR SECURING APPLICATIONS
US8505084B2 (en) * 2009-04-06 2013-08-06 Microsoft Corporation Data access programming model for occasionally connected applications
JP5332838B2 (en) * 2009-04-07 2013-11-06 ソニー株式会社 Information processing apparatus and execution control method
US9197417B2 (en) 2009-04-24 2015-11-24 Microsoft Technology Licensing, Llc Hosted application sandbox model
US8850211B2 (en) 2009-04-27 2014-09-30 Qualcomm Incorporated Method and apparatus for improving code and data signing
US8433296B2 (en) 2009-05-01 2013-04-30 Ryan Hardin Exclusive delivery of content within geographic areas
US8522343B2 (en) * 2009-12-21 2013-08-27 Palm, Inc. Removing an active application from a remote device
DE102010006572A1 (en) * 2010-02-02 2011-08-04 Giesecke & Devrient GmbH, 81677 Method for executing an application
US8924461B2 (en) * 2010-02-03 2014-12-30 Symantec Corporation Method, system, and computer readable medium for remote assistance, support, and troubleshooting
US8315920B2 (en) * 2010-03-09 2012-11-20 At&T Intellectual Property I, L.P. Method for automating onboarding of user generated ringback tones to sales distribution channel
US8359284B2 (en) 2010-05-13 2013-01-22 Bank Of America Corporation Organization-segment-based risk analysis model
US8533537B2 (en) 2010-05-13 2013-09-10 Bank Of America Corporation Technology infrastructure failure probability predictor
US8230268B2 (en) * 2010-05-13 2012-07-24 Bank Of America Corporation Technology infrastructure failure predictor
JP5560110B2 (en) * 2010-06-16 2014-07-23 Kddi株式会社 Mobile terminal and program
EP2609538B1 (en) * 2010-08-25 2016-10-19 Lookout Inc. System and method for server-coupled malware prevention
US20120053994A1 (en) * 2010-08-30 2012-03-01 Bank Of America Organization resource allocation based on forecasted change outcomes
US9342381B2 (en) 2011-02-03 2016-05-17 Symantec Corporation Method and system for establishing a DLP-compliant environment
US9880604B2 (en) 2011-04-20 2018-01-30 Microsoft Technology Licensing, Llc Energy efficient location detection
EP2742473B1 (en) * 2011-08-08 2022-07-13 Bloomberg Finance L.P. System and method for electronic distribution of software and data
US8776040B2 (en) 2011-08-19 2014-07-08 International Business Machines Corporation Protection for unauthorized firmware and software upgrades to consumer electronic devices
US8856771B2 (en) * 2011-08-19 2014-10-07 International Business Machines Corporation Protection for unauthorized firmware and software upgrades to consumer electronic devices
US9443258B2 (en) 2011-08-26 2016-09-13 Apple Inc. Mass ingestion of content related metadata to an online content portal
US8898459B2 (en) 2011-08-31 2014-11-25 At&T Intellectual Property I, L.P. Policy configuration for mobile device applications
US8918841B2 (en) * 2011-08-31 2014-12-23 At&T Intellectual Property I, L.P. Hardware interface access control for mobile applications
US9161225B2 (en) * 2011-09-23 2015-10-13 Blackberry Limited Authentication procedures for managing mobile device applications
US10135613B2 (en) 2012-01-13 2018-11-20 Qualcomm Incorporated Method and apparatus for generating a privilege-based key
KR101308351B1 (en) * 2012-02-24 2013-09-17 주식회사 팬택 Terminal and method for assigning a permission to application
KR101900047B1 (en) * 2012-03-12 2018-09-18 삼성전자주식회사 Method and Apparatus to Evaluate Required Permissions for Application
CA2870283C (en) 2012-04-13 2021-07-06 Ologn Technologies Ag Apparatuses, methods and systems for computer-based secure transactions
EP3561714B1 (en) 2012-04-13 2022-05-04 OLogN Technologies AG Secure zone for digital communications
EP2839400A4 (en) * 2012-04-16 2016-01-06 Intel Corp Trusted user interaction
US9432348B2 (en) 2012-04-20 2016-08-30 Ologn Technologies Ag Secure zone for secure purchases
GB201207816D0 (en) * 2012-05-04 2012-06-13 Vodafone Ip Licensing Ltd Telecommunication networks
US9349015B1 (en) * 2012-06-12 2016-05-24 Galois, Inc. Programmatically detecting collusion-based security policy violations
CN103491056B (en) * 2012-06-12 2017-12-26 中兴通讯股份有限公司 The control method and device of application permission
US20140006781A1 (en) * 2012-06-23 2014-01-02 Pomian & Corella, Llc Encapsulating the complexity of cryptographic authentication in black-boxes
US9141783B2 (en) 2012-06-26 2015-09-22 Ologn Technologies Ag Systems, methods and apparatuses for the application-specific identification of devices
US8862892B2 (en) * 2012-07-31 2014-10-14 Adobe Systems Incorporated System and method for detecting a security compromise on a device
US9619653B2 (en) 2012-07-31 2017-04-11 Adobe Systems Incorporated System and method for detecting a security compromise on a device
US8875303B2 (en) 2012-08-02 2014-10-28 Google Inc. Detecting pirated applications
WO2014051597A1 (en) * 2012-09-28 2014-04-03 Hewlett-Packard Development Company, L.P. Application security testing
US8938053B2 (en) * 2012-10-15 2015-01-20 Twilio, Inc. System and method for triggering on platform usage
CN104508673B (en) * 2012-10-23 2019-04-02 惠普发展公司,有限责任合伙企业 The distribution and use of control developer application in a network environment
CN104956326A (en) 2013-02-01 2015-09-30 惠普发展公司,有限责任合伙企业 Test script creation based on abstract test user controls
WO2014141202A1 (en) 2013-03-15 2014-09-18 Ologn Technologies Ag Systems, methods and apparatuses for securely storing and providing payment information
US9998866B2 (en) 2013-06-14 2018-06-12 Microsoft Technology Licensing, Llc Detecting geo-fence events using varying confidence levels
US9820231B2 (en) * 2013-06-14 2017-11-14 Microsoft Technology Licensing, Llc Coalescing geo-fence events
US9948640B2 (en) 2013-08-02 2018-04-17 Ologn Technologies Ag Secure server on a system with virtual machines
JP6069160B2 (en) * 2013-10-07 2017-02-01 株式会社日立製作所 Control system and authentication device
CN110717178A (en) 2013-10-18 2020-01-21 诺基亚技术有限公司 Method and system for operating and monitoring permissions for applications in an electronic device
US10783254B2 (en) * 2014-10-02 2020-09-22 Massachusetts Institute Of Technology Systems and methods for risk rating framework for mobile applications
KR20160080118A (en) * 2014-12-02 2016-07-07 주식회사 수산아이앤티 Method for embedding start application in a mobile device and user's terminal and computer program for performing embedment of start application in a mobile device
CN104484608A (en) * 2014-12-16 2015-04-01 北京奇虎科技有限公司 Application-based message processing method and application-based message processing device
KR20160098912A (en) * 2015-02-11 2016-08-19 한국전자통신연구원 Method for Re-adjusting Application Permission and User terminal for performing the same Method
GB2580549B (en) * 2016-01-04 2020-12-23 Clevx Llc Data security system with encryption
US10275183B2 (en) 2016-02-24 2019-04-30 Bank Of America Corporation System for categorical data dynamic decoding
US10275182B2 (en) 2016-02-24 2019-04-30 Bank Of America Corporation System for categorical data encoding
US10366337B2 (en) 2016-02-24 2019-07-30 Bank Of America Corporation Computerized system for evaluating the likelihood of technology change incidents
US10216798B2 (en) 2016-02-24 2019-02-26 Bank Of America Corporation Technical language processor
US10019486B2 (en) 2016-02-24 2018-07-10 Bank Of America Corporation Computerized system for analyzing operational event data
US10366338B2 (en) 2016-02-24 2019-07-30 Bank Of America Corporation Computerized system for evaluating the impact of technology change incidents
US10223425B2 (en) 2016-02-24 2019-03-05 Bank Of America Corporation Operational data processor
US10366367B2 (en) 2016-02-24 2019-07-30 Bank Of America Corporation Computerized system for evaluating and modifying technology change events
US10067984B2 (en) 2016-02-24 2018-09-04 Bank Of America Corporation Computerized system for evaluating technology stability
US10430743B2 (en) 2016-02-24 2019-10-01 Bank Of America Corporation Computerized system for simulating the likelihood of technology change incidents
US10387230B2 (en) 2016-02-24 2019-08-20 Bank Of America Corporation Technical language processor administration
KR101782539B1 (en) 2016-08-19 2017-09-28 주식회사 수산아이앤티 Method for embedding start application in a mobile device and user’s terminal and computer program for performing embedment of start application in a mobile device
US10467124B2 (en) * 2016-12-19 2019-11-05 General Electric Company Certification process for cloud platform
JP6691085B2 (en) * 2017-09-20 2020-04-28 ファナック株式会社 Application security management system and edge server
US10861600B2 (en) * 2017-09-28 2020-12-08 General Electric Company Method and system for user-verifiable certification of software for medical devices
US10747525B2 (en) * 2018-03-09 2020-08-18 International Business Machines Corporation Distribution of a software upgrade via a network
GB201805429D0 (en) * 2018-04-03 2018-05-16 Palantir Technologies Inc Security system and method
EP3712789A1 (en) * 2019-03-22 2020-09-23 Siemens Aktiengesellschaft Method and administration device for administrating code artifacts for an industrial system
JP2021099693A (en) * 2019-12-23 2021-07-01 グローリー株式会社 Valuable medium processor
JPWO2021260753A1 (en) * 2020-06-22 2021-12-30

Family Cites Families (82)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5684841A (en) 1979-12-13 1981-07-10 Denki Kagaku Kogyo Kk Electron gun
US4919545A (en) 1988-12-22 1990-04-24 Gte Laboratories Incorporated Distributed security procedure for intelligent networks
US5276876A (en) * 1990-05-16 1994-01-04 International Business Machines Corporation Registration of resources for commit procedures
FR2662879B1 (en) 1990-05-30 1994-03-25 Alcatel Cit CENTRALIZED MAINTENANCE METHOD FOR A WIRELESS TELEPHONE NETWORK.
US6694359B1 (en) * 1991-08-21 2004-02-17 Unova, Inc. Data collection and dissemination system
ES2128393T3 (en) 1992-05-15 1999-05-16 Addison M Fischer METHOD AND APPARATUS FOR COMPUTER SYSTEMS WITH INFORMATION DATA STRUCTURES FOR AUTHORIZATION PROGRAMS.
FR2698510B1 (en) 1992-11-26 1994-12-23 Schlumberger Ind Sa Communication network.
WO1995014345A1 (en) * 1993-11-15 1995-05-26 Qualcomm Incorporated A method for handling unrecognizable commands in a wireless environment
SE502433C2 (en) * 1994-02-11 1995-10-16 Nobelpharma Ab Spacer for dental implants
US5521958A (en) 1994-04-29 1996-05-28 Harris Corporation Telecommunications test system including a test and trouble shooting expert system
NO942031L (en) 1994-06-01 1995-12-04 Ericsson As Creative Engineeri System for monitoring telephone networks and / or data communication networks, especially mobile telephone networks
US5724425A (en) * 1994-06-10 1998-03-03 Sun Microsystems, Inc. Method and apparatus for enhancing software security and distributing software
US5987134A (en) 1996-02-23 1999-11-16 Fuji Xerox Co., Ltd. Device and method for authenticating user's access rights to resources
US5838910A (en) 1996-03-14 1998-11-17 Domenikos; Steven D. Systems and methods for executing application programs from a memory device linked to a server at an internet site
US5825877A (en) * 1996-06-11 1998-10-20 International Business Machines Corporation Support for portable trusted software
US5862474A (en) * 1996-08-08 1999-01-19 Qualcomm Incorporated Programmable wireless modem
US6026293A (en) * 1996-09-05 2000-02-15 Ericsson Inc. System for preventing electronic memory tampering
US5953654A (en) 1996-11-01 1999-09-14 Harris Corporation Wireless communications system for identifying unauthorized mobile units
US6167520A (en) * 1996-11-08 2000-12-26 Finjan Software, Inc. System and method for protecting a client during runtime from hostile downloadables
US5892904A (en) 1996-12-06 1999-04-06 Microsoft Corporation Code certification for network transmission
US6061346A (en) 1997-01-17 2000-05-09 Telefonaktiebolaget Lm Ericsson (Publ) Secure access method, and associated apparatus, for accessing a private IP network
US6167522A (en) * 1997-04-01 2000-12-26 Sun Microsystems, Inc. Method and apparatus for providing security for servers executing application programs received via a network
JPH10301772A (en) 1997-04-30 1998-11-13 Sony Corp Information processor and method therefor and recording medium
US5940590A (en) 1997-05-31 1999-08-17 International Business Machines Corporation System and method for securing computer-executable program code using task gates
US6496979B1 (en) * 1997-10-24 2002-12-17 Microsoft Corporation System and method for managing application installation for a mobile device
US6125447A (en) 1997-12-11 2000-09-26 Sun Microsystems, Inc. Protection domains to provide security in a computer system
US6163693A (en) 1997-12-16 2000-12-19 Ericsson, Inc. Automated warranty registration
GB2333864B (en) 1998-01-28 2003-05-07 Ibm Distribution of software updates via a computer network
US6259791B1 (en) * 1998-02-26 2001-07-10 Motorola, Inc. Method and apparatus in a wireless messaging system for controlling a hierarchical provision of service
US6493870B1 (en) * 1998-03-20 2002-12-10 Sun Microsystems, Inc. Methods and apparatus for packaging a program for remote execution
US6421781B1 (en) * 1998-04-30 2002-07-16 Openwave Systems Inc. Method and apparatus for maintaining security in a push server
US6339826B2 (en) 1998-05-05 2002-01-15 International Business Machines Corp. Client-server system for maintaining a user desktop consistent with server application user access permissions
WO1999059058A1 (en) 1998-05-14 1999-11-18 Sega Enterprises, Ltd. Information processor, information processing method, information recorded medium, and information processing system
IL124571A0 (en) 1998-05-21 1998-12-06 Miki Mullor Method of restricting software operation within a licensed limitation
JP3995338B2 (en) 1998-05-27 2007-10-24 富士通株式会社 Network connection control method and system
US6256393B1 (en) 1998-06-23 2001-07-03 General Instrument Corporation Authorization and access control of software object residing in set-top terminals
SE9802423D0 (en) * 1998-07-06 1998-07-06 Pascal Medical Ab Device for the treatment of Meniere's disease and similar ailments
US6141010A (en) * 1998-07-17 2000-10-31 B. E. Technology, Llc Computer interface method and apparatus with targeted advertising
US6587684B1 (en) * 1998-07-28 2003-07-01 Bell Atlantic Nynex Mobile Digital wireless telephone system for downloading software to a digital telephone using wireless data link protocol
US6256493B1 (en) * 1998-07-31 2001-07-03 Motorola, Inc. Selective call receiver and method for programming a selective call receiver
JP3777092B2 (en) * 1998-08-01 2006-05-24 インターナショナル・ビジネス・マシーンズ・コーポレーション Method and system for running distributed applications
JP2002526830A (en) 1998-09-28 2002-08-20 アーガス システムズ グループ,インク. Compartmentalized trust computer operating system
US6609199B1 (en) 1998-10-26 2003-08-19 Microsoft Corporation Method and apparatus for authenticating an open system application to a portable IC device
US6158010A (en) 1998-10-28 2000-12-05 Crosslogix, Inc. System and method for maintaining security in a distributed computer network
US6052600A (en) * 1998-11-23 2000-04-18 Motorola, Inc. Software programmable radio and method for configuring
FI990461A0 (en) 1999-03-03 1999-03-03 Nokia Mobile Phones Ltd Procedure for loading programs from a server to a subscriber terminal
FI990601A0 (en) 1999-03-17 1999-03-17 Sonera Oy Method and system in a telecommunications system
JP2001028572A (en) 1999-03-19 2001-01-30 Sanyo Electric Co Ltd Information distribution system
US6463534B1 (en) 1999-03-26 2002-10-08 Motorola, Inc. Secure wireless electronic-commerce system with wireless network domain
AU4674300A (en) 1999-05-25 2000-12-12 Motorola, Inc. Pre-verification of applications in mobile computing
US6334056B1 (en) * 1999-05-28 2001-12-25 Qwest Communications Int'l., Inc. Secure gateway processing for handheld device markup language (HDML)
US6263434B1 (en) 1999-09-21 2001-07-17 Sun Microsystems, Inc. Signed group criteria
US6775536B1 (en) * 1999-11-03 2004-08-10 Motorola, Inc Method for validating an application for use in a mobile communication device
US7213247B1 (en) 2000-01-10 2007-05-01 Wind River Systems, Inc. Protection domains for a computer operating system
US6782527B1 (en) 2000-01-28 2004-08-24 Networks Associates, Inc. System and method for efficient distribution of application services to a plurality of computing appliances organized as subnets
US6615038B1 (en) * 2000-04-28 2003-09-02 Samsung Electronics Co., Ltd. System and method for automatically creating and updating a mobile station configuration database in a wireless network
US6728536B1 (en) 2000-05-02 2004-04-27 Telefonaktiebolaget Lm Ericsson Method and system for combined transmission of access specific access independent and application specific information over public IP networks between visiting and home networks
US6862696B1 (en) * 2000-05-03 2005-03-01 Cigital System and method for software certification
US20020107809A1 (en) 2000-06-02 2002-08-08 Biddle John Denton System and method for licensing management
US7051366B1 (en) 2000-06-21 2006-05-23 Microsoft Corporation Evidence-based security policy manager
US7131143B1 (en) 2000-06-21 2006-10-31 Microsoft Corporation Evaluating initially untrusted evidence in an evidence-based security policy manager
US6981281B1 (en) 2000-06-21 2005-12-27 Microsoft Corporation Filtering a permission set using permission requests associated with a code assembly
US7076557B1 (en) 2000-07-10 2006-07-11 Microsoft Corporation Applying a permission grant set to a call stack during runtime
US7350204B2 (en) 2000-07-24 2008-03-25 Microsoft Corporation Policies for secure software execution
US6628938B1 (en) * 2000-08-14 2003-09-30 Koninklijke Philips Electronics N.V. Wireless system, a method of selecting an application while receiving application specific messages and user location method using user location awareness
US6931545B1 (en) 2000-08-28 2005-08-16 Contentguard Holdings, Inc. Systems and methods for integrity certification and verification of content consumption environments
WO2002021413A2 (en) * 2000-09-05 2002-03-14 Zaplet, Inc. Methods and apparatus providing electronic messages that are linked and aggregated
EP1340167A2 (en) * 2000-11-28 2003-09-03 4thPass Inc. Method and system for maintaining and distributing wireless applications
US20020078380A1 (en) * 2000-12-20 2002-06-20 Jyh-Han Lin Method for permitting debugging and testing of software on a mobile communication device in a secure environment
US7174534B2 (en) * 2001-01-22 2007-02-06 Symbol Technologies, Inc. Efficient system and method for running and analyzing multi-channel, multi-modal applications
TWI270270B (en) * 2001-05-14 2007-01-01 Ntt Docomo Inc System for managing program
US7099663B2 (en) 2001-05-31 2006-08-29 Qualcomm Inc. Safe application distribution and execution in a wireless environment
US7120429B2 (en) * 2001-08-13 2006-10-10 Qualcomm Inc. System and method for licensing applications on wireless devices over a wireless network
CN1975751B (en) * 2001-08-15 2010-05-19 高通股份有限公司 Test enabled application execution
US6999748B2 (en) * 2002-12-19 2006-02-14 Cingular Wireless Ii, Llc Automated device behavior management based on network charging and rating conditions
US6941134B2 (en) * 2002-12-19 2005-09-06 Cingular Wireless Ii, Llc Automated device behavior management based on preset preferences
US7735120B2 (en) 2003-12-24 2010-06-08 Apple Inc. Server computer issued credential authentication
EP2020797B1 (en) 2007-08-02 2016-06-15 Apple Inc. Client-server Opaque token passing apparatus and method
US8701172B2 (en) 2008-08-13 2014-04-15 Apple Inc. System and method for facilitating user authentication of web page content
US8837716B2 (en) 2009-02-02 2014-09-16 Apple Inc. Sensor derived authentication for establishing peer-to-peer networks
WO2014208209A1 (en) 2013-06-25 2014-12-31 日産自動車株式会社 Control device and control method for hybrid vehicle
KR102032857B1 (en) 2015-03-22 2019-10-16 애플 인크. Methods and apparatus for user authentication and human intent verification in mobile devices

Also Published As

Publication number Publication date
PE20030021A1 (en) 2003-01-29
NZ529867A (en) 2006-06-30
WO2002097620A2 (en) 2002-12-05
CN1537273A (en) 2004-10-13
CA2448979C (en) 2011-03-01
RU2003137835A (en) 2005-05-27
IL159117A0 (en) 2004-05-12
EP2163986A3 (en) 2012-04-18
JP2009054165A (en) 2009-03-12
US20100173608A1 (en) 2010-07-08
TWI252701B (en) 2006-04-01
USRE48001E1 (en) 2020-05-19
DE60234267D1 (en) 2009-12-17
KR20040004361A (en) 2004-01-13
US20060287958A1 (en) 2006-12-21
MXPA03010890A (en) 2004-02-27
US20120137349A1 (en) 2012-05-31
JP4795636B2 (en) 2011-10-19
EP2163986B1 (en) 2016-05-18
EP2163986A2 (en) 2010-03-17
JP4440983B2 (en) 2010-03-24
US7684792B2 (en) 2010-03-23
CN1258141C (en) 2006-05-31
EP1438657A2 (en) 2004-07-21
ES2334336T3 (en) 2010-03-09
US7099663B2 (en) 2006-08-29
RU2295753C2 (en) 2007-03-20
AR036043A1 (en) 2004-08-04
EP1438657B1 (en) 2009-11-04
HK1069451A1 (en) 2005-05-20
KR100634773B1 (en) 2006-10-16
AU2002312041B2 (en) 2008-06-05
WO2002097620A3 (en) 2004-05-06
US8588766B2 (en) 2013-11-19
BRPI0209741B1 (en) 2015-09-22
ATE447739T1 (en) 2009-11-15
BR0209741A (en) 2006-02-07
JP2005517220A (en) 2005-06-09
US20020183056A1 (en) 2002-12-05
US8112076B2 (en) 2012-02-07

Similar Documents

Publication Publication Date Title
CA2448979A1 (en) Safe application distribution and execution in a wireless environment
CN110162009B (en) Fault diagnosis method, information determination method, corresponding device and equipment
CN109766700A (en) Access control method and device, the storage medium, electronic device of file
CN113689588B (en) Inspection verification method and device and electronic equipment
US9251367B2 (en) Device, method and program for preventing information leakage
CN104346566A (en) Method, device, terminal, server and system for detecting privacy authority risks
CN106778342B (en) Trusted execution environment security authentication method, device and equipment
CN108092970B (en) Wireless network maintenance method and equipment, storage medium and terminal thereof
KR20130094522A (en) Mobile terminal and method for security diagnostics
CN105814861B (en) Apparatus and method for transmitting data
CN111935095A (en) Source code leakage monitoring method and device and computer storage medium
GB2609359A (en) Privacy centric data security in cloud environment
CN103888465B (en) A kind of webpage kidnaps detection method and device
CN102957673A (en) Method, device and system for processing information
CN109598146B (en) Privacy risk assessment method and device
CN110619022A (en) Node detection method, device, equipment and storage medium based on block chain network
CN110276193B (en) Risk feature output method, application operation control method, system and device
US8095980B2 (en) Detecting malicious behavior in data transmission of a de-duplication system
CN113922952B (en) Access request response method, device, computer equipment and storage medium
KR101835319B1 (en) Attack sensing system using user behavior analysis and method thereof
US11677582B2 (en) Detecting anomalies on a controller area network bus
WO2020228564A1 (en) Application service method and device
CN106022171A (en) External storage device access control method and device for Android terminal
CN107612763B (en) Metadata management method, application server, service system, medium and controller
KR101294940B1 (en) System for protecting information on mobile platform and method for the same

Legal Events

Date Code Title Description
EEER Examination request
MKEX Expiry

Effective date: 20220524