CA2448979A1 - Safe application distribution and execution in a wireless environment - Google Patents
Safe application distribution and execution in a wireless environment Download PDFInfo
- Publication number
- CA2448979A1 CA2448979A1 CA002448979A CA2448979A CA2448979A1 CA 2448979 A1 CA2448979 A1 CA 2448979A1 CA 002448979 A CA002448979 A CA 002448979A CA 2448979 A CA2448979 A CA 2448979A CA 2448979 A1 CA2448979 A1 CA 2448979A1
- Authority
- CA
- Canada
- Prior art keywords
- application
- permission
- wireless device
- detection technique
- identification information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformation of program code
- G06F8/54—Link editing before load time
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- E—FIXED CONSTRUCTIONS
- E04—BUILDING
- E04H—BUILDINGS OR LIKE STRUCTURES FOR PARTICULAR PURPOSES; SWIMMING OR SPLASH BATHS OR POOLS; MASTS; FENCING; TENTS OR CANOPIES, IN GENERAL
- E04H4/00—Swimming or splash baths or pools
- E04H4/0006—Devices for producing waves in swimming pools
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/60—Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63B—APPARATUS FOR PHYSICAL TRAINING, GYMNASTICS, SWIMMING, CLIMBING, OR FENCING; BALL GAMES; TRAINING EQUIPMENT
- A63B69/00—Training appliances or apparatus for special sports
- A63B69/0093—Training appliances or apparatus for special sports for surfing, i.e. without a sail; for skate or snow boarding
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63B—APPARATUS FOR PHYSICAL TRAINING, GYMNASTICS, SWIMMING, CLIMBING, OR FENCING; BALL GAMES; TRAINING EQUIPMENT
- A63B71/00—Games or sports accessories not covered in groups A63B1/00 - A63B69/00
- A63B71/04—Games or sports accessories not covered in groups A63B1/00 - A63B69/00 for small-room or indoor sporting games
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63G—MERRY-GO-ROUNDS; SWINGS; ROCKING-HORSES; CHUTES; SWITCHBACKS; SIMILAR DEVICES FOR PUBLIC AMUSEMENT
- A63G31/00—Amusement arrangements
- A63G31/007—Amusement arrangements involving water
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
- Y10T29/00—Metal working
- Y10T29/49—Method of mechanical manufacture
- Y10T29/49826—Assembling or joining
- Y10T29/49947—Assembling or joining by applying separate fastener
Abstract
The present invention provides safe and secure application distribution and execution by providing systems and methods that test an application to ensur e that it satisfies predetermined criteria associated with the environment in which it will execute. Furthermore, by using rules and permission lists, application removal, and a modification detection technique, such as digital signatures, the present invention provides mechanisms to safely distribute a nd execute tested, or untested, applications by determining whether the application has been modified, determining if it has permission to execute i n a given wireless device environment, and removing the application.
Claims (53)
1. A method for distributing and processing an application, comprising the steps of:
receiving the application and identification information;
certifying the application satisfies a predetermined criterion;
assigning a permission to the application;
transmitting the application, the permission and the identification information to the a device using a modification detection technique;
determining whether the application was modified during transmission;
storing a rule on the device;
determining if the application may be process using the permission and the rule; and removing the application from the device.
receiving the application and identification information;
certifying the application satisfies a predetermined criterion;
assigning a permission to the application;
transmitting the application, the permission and the identification information to the a device using a modification detection technique;
determining whether the application was modified during transmission;
storing a rule on the device;
determining if the application may be process using the permission and the rule; and removing the application from the device.
2. The method of claim 1 further comprising the steps of:
initiating the execution of the application on the device;
monitoring the execution of the application; and detecting the application attempting to make an improper operation.
initiating the execution of the application on the device;
monitoring the execution of the application; and detecting the application attempting to make an improper operation.
3. The method of claim 1, wherein the application is denied permission to be processed on the device.
4. The method of claim 1, wherein the identification information is retrieved by the device.
5. The method of claim 1 further comprising the step of detecting a modification in the application.
6. The method of claim 1 further comprising the step of detecting a modification in the permission.
7. The method of claim 1, wherein the modification detection technique uses a digital signature.
8. A method for distributing and processing an application, comprising the steps of:
receiving the application and identification information;
certifying the application satisfies a predetermined criterion;
assigning a permission to the application;
transmitting the application, the permission and the identification information to the a wireless device;
storing a rule on the device; and determining if the application may be processed on the device using the permission and the rule.
receiving the application and identification information;
certifying the application satisfies a predetermined criterion;
assigning a permission to the application;
transmitting the application, the permission and the identification information to the a wireless device;
storing a rule on the device; and determining if the application may be processed on the device using the permission and the rule.
9. The method of claim 8 further comprising the steps of:
initiating the execution of the application on the wireless device;
monitoring the execution of the application;
detecting the application attempting to make an improper operation; and removing the application from the wireless device.
initiating the execution of the application on the wireless device;
monitoring the execution of the application;
detecting the application attempting to make an improper operation; and removing the application from the wireless device.
10. The method of claim 8, wherein the application was denied permission to be processed on the wireless device and further comprising the step of removing the application from the device.
11. The method of claim 8, wherein the identification information is determined by the wireless device.
12. The method of claim 8, wherein a modification detection technique is used to transmit the application, the permission and the identification information.
13. The method of claim 12, wherein the modification detection technique uses a digital signature.
14. The method of claim 12 further comprising the steps of:
detecting a modification in the application transmitted to the device; and removing the application from the device.
detecting a modification in the application transmitted to the device; and removing the application from the device.
15. The method of claim 12 further comprising the steps of:
detecting a modification in the permission transmitted to the device; and removing the application from the device.
detecting a modification in the permission transmitted to the device; and removing the application from the device.
16. A method for distributing and processing an application, comprising the steps of:
receiving the application and identification information;
assigning a permission to the application;
transmitting the application, the permission and the identification information to the a device using a modification detection technique;
determining whether the application was modified during transmission;
storing a rule on the device;
determining if the application may be process using the permission and the rule; and removing the application from the device.
receiving the application and identification information;
assigning a permission to the application;
transmitting the application, the permission and the identification information to the a device using a modification detection technique;
determining whether the application was modified during transmission;
storing a rule on the device;
determining if the application may be process using the permission and the rule; and removing the application from the device.
17. The method of claim 16 further comprising the steps of:
initiating the execution of the application on the wireless device;
monitoring the execution of the application;
detecting the application attempting to make an improper operation; and removing the application from the wireless device.
initiating the execution of the application on the wireless device;
monitoring the execution of the application;
detecting the application attempting to make an improper operation; and removing the application from the wireless device.
18. The method of claim 16, wherein the application was denied permission to be processed on the wireless device and further comprising the step of removing the application from the device.
19. The method of claim 16, wherein the identification information is determined by the wireless device.
20. The method of claim 16, wherein a modification detection technique is used to transmit the application, the permission and the identification information.
21. The method of claim 20, wherein the modification detection technique uses a digital signature.
22. The method of claim 20 further comprising the steps of:
detecting a modification in the application transmitted to the device; and removing the application from the device;
detecting a modification in the application transmitted to the device; and removing the application from the device;
23. The method of claim 12 further comprising the steps of:
detecting a modification in the permission transmitted to the device; and removing the application from the device.
detecting a modification in the permission transmitted to the device; and removing the application from the device.
24. A system for distributing an executing an application on a wireless device, comprising:
a central server operable to receive the application and developer identification, to assign a permission associated with the application and to transmit the application information to the wireless device;
a server operable to certify the application satisfies a predefined criterion;
and the wireless device operable to receive the application and developer identification, and to evaluate the assigned permission.
a central server operable to receive the application and developer identification, to assign a permission associated with the application and to transmit the application information to the wireless device;
a server operable to certify the application satisfies a predefined criterion;
and the wireless device operable to receive the application and developer identification, and to evaluate the assigned permission.
25. The system of claim 24, wherein the central server is further operable to transmit the application to the wireless device using a modification detection technique.
26. The system of claim 24, wherein the central server is further operable to transmit the permission to the wireless device using a modification detection technique.
27. The system of claim 24, wherein the server is operable to certify the application is the central server.
28. The system of claim 24, wherein the wireless device is operable to evaluate the assigned permission using a rule stored in the wireless device.
29. A system for distributing and executing an application on a wireless device, comprising:
means for receiving the application and identification information;
means for assigning a permission to the application;
means for transmitting the application, the permission and the identification information to the device using a modification detection technique;
means for determining whether the application was modified during transmission;
means for storing a rule on the device;
means for determining if the application may be process using the permission and the rule; and means for removing the application from the device.
means for receiving the application and identification information;
means for assigning a permission to the application;
means for transmitting the application, the permission and the identification information to the device using a modification detection technique;
means for determining whether the application was modified during transmission;
means for storing a rule on the device;
means for determining if the application may be process using the permission and the rule; and means for removing the application from the device.
30. A method of processing application distribution, comprising the steps of:
receiving the application and identification information;
certifying the application satisfies a predetermined criterion;
assigning a permission to the application;
transmitting the application, the permission and the identification information to the device using a modification detection technique; and initiating a request to remove the application from a device.
receiving the application and identification information;
certifying the application satisfies a predetermined criterion;
assigning a permission to the application;
transmitting the application, the permission and the identification information to the device using a modification detection technique; and initiating a request to remove the application from a device.
31. The method of claim 30, further comprising the step of:
evaluating the received application and identification information to determine the identity of a developer of the application.
evaluating the received application and identification information to determine the identity of a developer of the application.
32. The method of claim 30, wherein the modification detection technique uses a digital signature.
33. A method of processing application distribution, comprising the steps of:
receiving the application and identification information;
assigning a permission to the application; and transmitting the application, the permission and the identification information to the device using a modification detection technique.
receiving the application and identification information;
assigning a permission to the application; and transmitting the application, the permission and the identification information to the device using a modification detection technique.
34. The method of claim 33 further comprising the step of initiating a request to remove the application from a device.
35 The method of claim 33 further comprising the step of certifying the application satisfies a predetermined criterion.
36. The method of claim 33, further comprising the step of:
evaluating the received application and identification information to determine the identity of a developer of the application.
evaluating the received application and identification information to determine the identity of a developer of the application.
37. The method of claim 33, wherein the modification detection technique uses a digital signature.
38. A system for application distribution, comprising:
a central server operable to receive application and identity information, assign a permission, and transmit the application using a modification detection technique; and a network connected to the central server to receive the application.
a central server operable to receive application and identity information, assign a permission, and transmit the application using a modification detection technique; and a network connected to the central server to receive the application.
39. The system of claim 38, wherein the central server is further operable to certify the application satisfies a predefined criterion.
40. A system for application distribution, comprising:
means for receiving the application and identification information;
means for certifying the application satisfies a predetermined criterion;
means for assigning a permission to the application; and means for transmitting the application, the permission and the identification information to the device using a modification detection technique.
means for receiving the application and identification information;
means for certifying the application satisfies a predetermined criterion;
means for assigning a permission to the application; and means for transmitting the application, the permission and the identification information to the device using a modification detection technique.
41. A computer-readable medium containing computer-executable instructions for distributing applications, comprising the steps of:
receiving the application and identification information;
certifying the application satisfies a predetermined criterion;
assigning a permission to the application; and transmitting the application, the permission and the identification information to the device using a modification detection technique.
receiving the application and identification information;
certifying the application satisfies a predetermined criterion;
assigning a permission to the application; and transmitting the application, the permission and the identification information to the device using a modification detection technique.
42. A method for executing an application on a wireless device, comprising the steps of:
storing a rule to evaluate a permission;
receiving information comprising the application, the permission and an identification using a modification detection technique;
receiving a request to execute the application on the wireless device;
evaluating the received information to determine if the received information was modified;
in the event the received information was not modified, evaluating the permission associated with the application; and in the event the permission is granted, executing the application.
storing a rule to evaluate a permission;
receiving information comprising the application, the permission and an identification using a modification detection technique;
receiving a request to execute the application on the wireless device;
evaluating the received information to determine if the received information was modified;
in the event the received information was not modified, evaluating the permission associated with the application; and in the event the permission is granted, executing the application.
43. The method of claim 42, wherein the modification detection technique uses a digital signature.
44. The method of claim 42 further comprising the step of monitoring the execution of the application to determine if an improper operation is attempted.
45. The method of claim 42 further comprising the step of removing the application from the wireless device.
46. A method for executing an application on a wireless device, comprising the steps of:
storing a rule to evaluate a permission;
receiving information comprising the application, the permission and an identification using a modification detection technique;
receiving a request to execute the application on the wireless device; and evaluating the permission associated with an application; and in the event the information was modified, removing the application from the wireless device.
storing a rule to evaluate a permission;
receiving information comprising the application, the permission and an identification using a modification detection technique;
receiving a request to execute the application on the wireless device; and evaluating the permission associated with an application; and in the event the information was modified, removing the application from the wireless device.
47. The method of claim 46, further comprising the steps of:
in the event the received information was not modified, evaluating the permission associated with the application; and in the event the permission is granted, executing the application.
in the event the received information was not modified, evaluating the permission associated with the application; and in the event the permission is granted, executing the application.
48. The method of claim 46, wherein the modification detection technique uses a digital signature.
49. The method of claim 46 further comprising the step of monitoring the execution of the application to determine if an improper operation is attempted.
50. The method of claim 46 further comprising the step of removing the application from the wireless device in the event the improper operation is attempted.
51. A wireless device for executing an application, comprising:
a input to receive an application and a permission;
a rule contained in storage to evaluate the permission; and a key contained in storage to evaluate a digital signature, wherein the wireless device is operable to execute the application upon evaluation of the permission and digital signature.
a input to receive an application and a permission;
a rule contained in storage to evaluate the permission; and a key contained in storage to evaluate a digital signature, wherein the wireless device is operable to execute the application upon evaluation of the permission and digital signature.
52. A wireless device for executing an application, comprising:
means for storing a rule to evaluate a permission;
means for receiving information comprising the application, the permission and an identification using a modification detection technique;
means for receiving a request to execute the application on the wireless device;
means for evaluating the received information to determine if the received information was modified;
means for, in the event the received information Was not modified, evaluating the permission associated with the application; and means for, in the event the permission is granted, executing the application.
means for storing a rule to evaluate a permission;
means for receiving information comprising the application, the permission and an identification using a modification detection technique;
means for receiving a request to execute the application on the wireless device;
means for evaluating the received information to determine if the received information was modified;
means for, in the event the received information Was not modified, evaluating the permission associated with the application; and means for, in the event the permission is granted, executing the application.
53. A computer-readable medium containing computer-executable instructions for distributing applications, comprising the steps of:
storing a rule to evaluate a permission;
receiving information comprising the application, the permission and an identification using a modification detection technique;
receiving a request to execute the application on the wireless device;
evaluating the received information to determine if the received information was modified;
in the event the received information was not modified, evaluating the permission associated with the application; and in the event the permission is granted, executing the application.
storing a rule to evaluate a permission;
receiving information comprising the application, the permission and an identification using a modification detection technique;
receiving a request to execute the application on the wireless device;
evaluating the received information to determine if the received information was modified;
in the event the received information was not modified, evaluating the permission associated with the application; and in the event the permission is granted, executing the application.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/872,418 US7099663B2 (en) | 2001-05-31 | 2001-05-31 | Safe application distribution and execution in a wireless environment |
US09/872,418 | 2001-05-31 | ||
PCT/US2002/016485 WO2002097620A2 (en) | 2001-05-31 | 2002-05-23 | Safe application distribution and execution in a wireless environment |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2448979A1 true CA2448979A1 (en) | 2002-12-05 |
CA2448979C CA2448979C (en) | 2011-03-01 |
Family
ID=25359530
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2448979A Expired - Lifetime CA2448979C (en) | 2001-05-31 | 2002-05-23 | Safe application distribution and execution in a wireless environment |
Country Status (20)
Country | Link |
---|---|
US (5) | US7099663B2 (en) |
EP (2) | EP2163986B1 (en) |
JP (2) | JP4795636B2 (en) |
KR (1) | KR100634773B1 (en) |
CN (1) | CN1258141C (en) |
AR (1) | AR036043A1 (en) |
AT (1) | ATE447739T1 (en) |
AU (1) | AU2002312041B2 (en) |
BR (1) | BRPI0209741B1 (en) |
CA (1) | CA2448979C (en) |
DE (1) | DE60234267D1 (en) |
ES (1) | ES2334336T3 (en) |
HK (1) | HK1069451A1 (en) |
IL (1) | IL159117A0 (en) |
MX (1) | MXPA03010890A (en) |
NZ (1) | NZ529867A (en) |
PE (1) | PE20030021A1 (en) |
RU (1) | RU2295753C2 (en) |
TW (1) | TWI252701B (en) |
WO (1) | WO2002097620A2 (en) |
Families Citing this family (131)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IL133584A (en) * | 1999-12-19 | 2010-02-17 | Enco Tone Ltd | Method for the acoustic encodification of dynamic identification codes |
US7099663B2 (en) | 2001-05-31 | 2006-08-29 | Qualcomm Inc. | Safe application distribution and execution in a wireless environment |
JP2003050641A (en) * | 2001-08-07 | 2003-02-21 | Nec Corp | Program management system, its program management method, and information management program |
US20030041125A1 (en) * | 2001-08-16 | 2003-02-27 | Salomon Kirk C. | Internet-deployed wireless system |
US8832754B2 (en) * | 2002-05-03 | 2014-09-09 | Tvworks, Llc | System and method for providing synchronized events to a television application |
JP2003337716A (en) * | 2002-05-20 | 2003-11-28 | Ntt Docomo Inc | Electronic device, data sharing method, program, and recording medium |
US6965674B2 (en) * | 2002-05-21 | 2005-11-15 | Wavelink Corporation | System and method for providing WLAN security through synchronized update and rotation of WEP keys |
GB0212314D0 (en) * | 2002-05-28 | 2002-07-10 | Symbian Ltd | Secure mobile wireless device |
US7965842B2 (en) * | 2002-06-28 | 2011-06-21 | Wavelink Corporation | System and method for detecting unauthorized wireless access points |
US7606242B2 (en) * | 2002-08-02 | 2009-10-20 | Wavelink Corporation | Managed roaming for WLANS |
US7522906B2 (en) | 2002-08-09 | 2009-04-21 | Wavelink Corporation | Mobile unit configuration management for WLANs |
US20080313282A1 (en) | 2002-09-10 | 2008-12-18 | Warila Bruce W | User interface, operating system and architecture |
US7139559B2 (en) * | 2002-12-09 | 2006-11-21 | Qualcomm Inc. | System and method for handshaking between wireless devices and servers |
US7793355B2 (en) | 2002-12-12 | 2010-09-07 | Reasearch In Motion Limited | System and method of owner control of electronic devices |
US7088237B2 (en) | 2003-02-14 | 2006-08-08 | Qualcomm Incorporated | Enhanced user privacy for mobile station location services |
CA2516580C (en) * | 2003-02-21 | 2011-01-25 | Research In Motion Limited | System and method of multiple-level control of electronic devices |
US8156558B2 (en) | 2003-05-17 | 2012-04-10 | Microsoft Corporation | Mechanism for evaluating security risks |
US7203967B2 (en) * | 2003-09-10 | 2007-04-10 | Qualcomm Incorporated | Methods and apparatus for content protection in a wireless network |
US8549166B2 (en) | 2004-03-01 | 2013-10-01 | Qualcomm Incorporated | Execution of unverified programs in a wireless, device operating environment |
CN100465889C (en) * | 2004-04-29 | 2009-03-04 | 杭州斯达康通讯有限公司 | Method for downloading computer data to mobile phone |
US7546956B2 (en) | 2004-04-30 | 2009-06-16 | Research In Motion Limited | System and method of operation control on an electronic device |
CN1311341C (en) * | 2004-05-10 | 2007-04-18 | 杭州斯达康通讯有限公司 | Method for conducting digital signature when downloading computer data to mobile phone |
US7979706B1 (en) * | 2004-09-29 | 2011-07-12 | Rockwell Automation Technologies, Inc. | Systems and methods for queuing an action in industrial automation systems |
US20060093149A1 (en) * | 2004-10-30 | 2006-05-04 | Shera International Ltd. | Certified deployment of applications on terminals |
US7877744B2 (en) * | 2004-11-05 | 2011-01-25 | Qualcomm Incorporated | Method, software and apparatus for activating resident applications |
US20060107327A1 (en) * | 2004-11-16 | 2006-05-18 | Sprigg Stephen A | Methods and apparatus for enforcing application level restrictions on local and remote content |
DE102004058882A1 (en) * | 2004-12-06 | 2006-06-08 | Giesecke & Devrient Gmbh | Generating program code in a load format and providing executable program code |
US20060149741A1 (en) * | 2005-01-04 | 2006-07-06 | Oracle International Corporation | Efficient Approach to Implement Applications on Server Systems in a Networked Environment |
JP4232767B2 (en) * | 2005-03-14 | 2009-03-04 | セイコーエプソン株式会社 | Software authentication system, software authentication program, and software authentication method |
JP4727278B2 (en) * | 2005-04-05 | 2011-07-20 | 株式会社エヌ・ティ・ティ・ドコモ | Application program verification system, application program verification method, and computer program |
US7770785B2 (en) * | 2005-06-13 | 2010-08-10 | Qualcomm Incorporated | Apparatus and methods for detection and management of unauthorized executable instructions on a wireless device |
US8238352B2 (en) * | 2005-09-02 | 2012-08-07 | Cisco Technology, Inc. | System and apparatus for rogue VoIP phone detection and managing VoIP phone mobility |
US20070078907A1 (en) * | 2005-10-05 | 2007-04-05 | Ming-Tsung Chiang | Method for updating function of handheld apparatus through plug-and play (PnP) storage device |
US9573067B2 (en) * | 2005-10-14 | 2017-02-21 | Microsoft Technology Licensing, Llc | Mass storage in gaming handhelds |
US8045958B2 (en) | 2005-11-21 | 2011-10-25 | Research In Motion Limited | System and method for application program operation on a wireless device |
EP1788505A1 (en) * | 2005-11-21 | 2007-05-23 | Research In Motion Limited | System and method for application program operation on a wireless device |
EP1826944B1 (en) | 2006-02-27 | 2009-05-13 | Research In Motion Limited | Method of customizing a standardized IT policy |
US8117441B2 (en) * | 2006-06-20 | 2012-02-14 | Microsoft Corporation | Integrating security protection tools with computer device integrity and privacy policy |
TW201251496A (en) | 2006-12-28 | 2012-12-16 | Interdigital Tech Corp | Efficient uplink operation with high instantaneous data rates |
US10045327B2 (en) | 2007-01-17 | 2018-08-07 | Eagency, Inc. | Mobile communication device monitoring systems and methods |
US8126456B2 (en) * | 2007-01-17 | 2012-02-28 | Eagency, Inc. | Mobile communication device monitoring systems and methods |
US8712396B2 (en) * | 2007-01-17 | 2014-04-29 | Eagency, Inc. | Mobile communication device monitoring systems and methods |
US9324074B2 (en) | 2007-01-17 | 2016-04-26 | Eagency, Inc. | Mobile communication device monitoring systems and methods |
US8875266B2 (en) * | 2007-05-16 | 2014-10-28 | Vmware, Inc. | System and methods for enforcing software license compliance with virtual machines |
US10181055B2 (en) | 2007-09-27 | 2019-01-15 | Clevx, Llc | Data security system with encryption |
US10778417B2 (en) | 2007-09-27 | 2020-09-15 | Clevx, Llc | Self-encrypting module with embedded wireless user authentication |
US10783232B2 (en) | 2007-09-27 | 2020-09-22 | Clevx, Llc | Management system for self-encrypting managed devices with embedded wireless user authentication |
US11190936B2 (en) | 2007-09-27 | 2021-11-30 | Clevx, Llc | Wireless authentication system |
US20090273438A1 (en) * | 2008-05-01 | 2009-11-05 | Delphi Technologies, Inc. | Remote monitoring, interrogation and control apparatus for stationary and mobile systems |
EP2248366A4 (en) * | 2008-01-29 | 2014-04-09 | Qualcomm Inc | Secure application signing |
JP2009253565A (en) * | 2008-04-04 | 2009-10-29 | Hitachi Ltd | Mobile terminal apparatus and radio communication system management method in mobile terminal apparatus |
US9076176B2 (en) * | 2008-05-05 | 2015-07-07 | Apple Inc. | Electronic submission of application programs for network-based distribution |
US9342287B2 (en) | 2008-05-05 | 2016-05-17 | Apple Inc. | Software program ratings |
US9237070B2 (en) | 2008-07-22 | 2016-01-12 | Siemens Industry, Inc. | Development, test, and demonstration of automation solutions using web-based virtual computers and VPN tunneling |
US9531836B2 (en) * | 2008-12-18 | 2016-12-27 | Telefonaktiebolaget Lm Ericsson (Publ) | Distributing an application via a network node |
CN105338106B (en) * | 2008-12-18 | 2019-03-12 | 爱立信电话股份有限公司 | Distribution application |
FR2943482B1 (en) * | 2009-03-18 | 2011-05-27 | Bouygues Telecom Sa | METHOD AND SYSTEM FOR SECURING APPLICATIONS |
US8505084B2 (en) * | 2009-04-06 | 2013-08-06 | Microsoft Corporation | Data access programming model for occasionally connected applications |
JP5332838B2 (en) * | 2009-04-07 | 2013-11-06 | ソニー株式会社 | Information processing apparatus and execution control method |
US9197417B2 (en) | 2009-04-24 | 2015-11-24 | Microsoft Technology Licensing, Llc | Hosted application sandbox model |
US8850211B2 (en) | 2009-04-27 | 2014-09-30 | Qualcomm Incorporated | Method and apparatus for improving code and data signing |
US8433296B2 (en) | 2009-05-01 | 2013-04-30 | Ryan Hardin | Exclusive delivery of content within geographic areas |
US8522343B2 (en) * | 2009-12-21 | 2013-08-27 | Palm, Inc. | Removing an active application from a remote device |
DE102010006572A1 (en) * | 2010-02-02 | 2011-08-04 | Giesecke & Devrient GmbH, 81677 | Method for executing an application |
US8924461B2 (en) * | 2010-02-03 | 2014-12-30 | Symantec Corporation | Method, system, and computer readable medium for remote assistance, support, and troubleshooting |
US8315920B2 (en) * | 2010-03-09 | 2012-11-20 | At&T Intellectual Property I, L.P. | Method for automating onboarding of user generated ringback tones to sales distribution channel |
US8359284B2 (en) | 2010-05-13 | 2013-01-22 | Bank Of America Corporation | Organization-segment-based risk analysis model |
US8533537B2 (en) | 2010-05-13 | 2013-09-10 | Bank Of America Corporation | Technology infrastructure failure probability predictor |
US8230268B2 (en) * | 2010-05-13 | 2012-07-24 | Bank Of America Corporation | Technology infrastructure failure predictor |
JP5560110B2 (en) * | 2010-06-16 | 2014-07-23 | Kddi株式会社 | Mobile terminal and program |
EP2609538B1 (en) * | 2010-08-25 | 2016-10-19 | Lookout Inc. | System and method for server-coupled malware prevention |
US20120053994A1 (en) * | 2010-08-30 | 2012-03-01 | Bank Of America | Organization resource allocation based on forecasted change outcomes |
US9342381B2 (en) | 2011-02-03 | 2016-05-17 | Symantec Corporation | Method and system for establishing a DLP-compliant environment |
US9880604B2 (en) | 2011-04-20 | 2018-01-30 | Microsoft Technology Licensing, Llc | Energy efficient location detection |
EP2742473B1 (en) * | 2011-08-08 | 2022-07-13 | Bloomberg Finance L.P. | System and method for electronic distribution of software and data |
US8776040B2 (en) | 2011-08-19 | 2014-07-08 | International Business Machines Corporation | Protection for unauthorized firmware and software upgrades to consumer electronic devices |
US8856771B2 (en) * | 2011-08-19 | 2014-10-07 | International Business Machines Corporation | Protection for unauthorized firmware and software upgrades to consumer electronic devices |
US9443258B2 (en) | 2011-08-26 | 2016-09-13 | Apple Inc. | Mass ingestion of content related metadata to an online content portal |
US8898459B2 (en) | 2011-08-31 | 2014-11-25 | At&T Intellectual Property I, L.P. | Policy configuration for mobile device applications |
US8918841B2 (en) * | 2011-08-31 | 2014-12-23 | At&T Intellectual Property I, L.P. | Hardware interface access control for mobile applications |
US9161225B2 (en) * | 2011-09-23 | 2015-10-13 | Blackberry Limited | Authentication procedures for managing mobile device applications |
US10135613B2 (en) | 2012-01-13 | 2018-11-20 | Qualcomm Incorporated | Method and apparatus for generating a privilege-based key |
KR101308351B1 (en) * | 2012-02-24 | 2013-09-17 | 주식회사 팬택 | Terminal and method for assigning a permission to application |
KR101900047B1 (en) * | 2012-03-12 | 2018-09-18 | 삼성전자주식회사 | Method and Apparatus to Evaluate Required Permissions for Application |
CA2870283C (en) | 2012-04-13 | 2021-07-06 | Ologn Technologies Ag | Apparatuses, methods and systems for computer-based secure transactions |
EP3561714B1 (en) | 2012-04-13 | 2022-05-04 | OLogN Technologies AG | Secure zone for digital communications |
EP2839400A4 (en) * | 2012-04-16 | 2016-01-06 | Intel Corp | Trusted user interaction |
US9432348B2 (en) | 2012-04-20 | 2016-08-30 | Ologn Technologies Ag | Secure zone for secure purchases |
GB201207816D0 (en) * | 2012-05-04 | 2012-06-13 | Vodafone Ip Licensing Ltd | Telecommunication networks |
US9349015B1 (en) * | 2012-06-12 | 2016-05-24 | Galois, Inc. | Programmatically detecting collusion-based security policy violations |
CN103491056B (en) * | 2012-06-12 | 2017-12-26 | 中兴通讯股份有限公司 | The control method and device of application permission |
US20140006781A1 (en) * | 2012-06-23 | 2014-01-02 | Pomian & Corella, Llc | Encapsulating the complexity of cryptographic authentication in black-boxes |
US9141783B2 (en) | 2012-06-26 | 2015-09-22 | Ologn Technologies Ag | Systems, methods and apparatuses for the application-specific identification of devices |
US8862892B2 (en) * | 2012-07-31 | 2014-10-14 | Adobe Systems Incorporated | System and method for detecting a security compromise on a device |
US9619653B2 (en) | 2012-07-31 | 2017-04-11 | Adobe Systems Incorporated | System and method for detecting a security compromise on a device |
US8875303B2 (en) | 2012-08-02 | 2014-10-28 | Google Inc. | Detecting pirated applications |
WO2014051597A1 (en) * | 2012-09-28 | 2014-04-03 | Hewlett-Packard Development Company, L.P. | Application security testing |
US8938053B2 (en) * | 2012-10-15 | 2015-01-20 | Twilio, Inc. | System and method for triggering on platform usage |
CN104508673B (en) * | 2012-10-23 | 2019-04-02 | 惠普发展公司,有限责任合伙企业 | The distribution and use of control developer application in a network environment |
CN104956326A (en) | 2013-02-01 | 2015-09-30 | 惠普发展公司,有限责任合伙企业 | Test script creation based on abstract test user controls |
WO2014141202A1 (en) | 2013-03-15 | 2014-09-18 | Ologn Technologies Ag | Systems, methods and apparatuses for securely storing and providing payment information |
US9998866B2 (en) | 2013-06-14 | 2018-06-12 | Microsoft Technology Licensing, Llc | Detecting geo-fence events using varying confidence levels |
US9820231B2 (en) * | 2013-06-14 | 2017-11-14 | Microsoft Technology Licensing, Llc | Coalescing geo-fence events |
US9948640B2 (en) | 2013-08-02 | 2018-04-17 | Ologn Technologies Ag | Secure server on a system with virtual machines |
JP6069160B2 (en) * | 2013-10-07 | 2017-02-01 | 株式会社日立製作所 | Control system and authentication device |
CN110717178A (en) | 2013-10-18 | 2020-01-21 | 诺基亚技术有限公司 | Method and system for operating and monitoring permissions for applications in an electronic device |
US10783254B2 (en) * | 2014-10-02 | 2020-09-22 | Massachusetts Institute Of Technology | Systems and methods for risk rating framework for mobile applications |
KR20160080118A (en) * | 2014-12-02 | 2016-07-07 | 주식회사 수산아이앤티 | Method for embedding start application in a mobile device and user's terminal and computer program for performing embedment of start application in a mobile device |
CN104484608A (en) * | 2014-12-16 | 2015-04-01 | 北京奇虎科技有限公司 | Application-based message processing method and application-based message processing device |
KR20160098912A (en) * | 2015-02-11 | 2016-08-19 | 한국전자통신연구원 | Method for Re-adjusting Application Permission and User terminal for performing the same Method |
GB2580549B (en) * | 2016-01-04 | 2020-12-23 | Clevx Llc | Data security system with encryption |
US10275183B2 (en) | 2016-02-24 | 2019-04-30 | Bank Of America Corporation | System for categorical data dynamic decoding |
US10275182B2 (en) | 2016-02-24 | 2019-04-30 | Bank Of America Corporation | System for categorical data encoding |
US10366337B2 (en) | 2016-02-24 | 2019-07-30 | Bank Of America Corporation | Computerized system for evaluating the likelihood of technology change incidents |
US10216798B2 (en) | 2016-02-24 | 2019-02-26 | Bank Of America Corporation | Technical language processor |
US10019486B2 (en) | 2016-02-24 | 2018-07-10 | Bank Of America Corporation | Computerized system for analyzing operational event data |
US10366338B2 (en) | 2016-02-24 | 2019-07-30 | Bank Of America Corporation | Computerized system for evaluating the impact of technology change incidents |
US10223425B2 (en) | 2016-02-24 | 2019-03-05 | Bank Of America Corporation | Operational data processor |
US10366367B2 (en) | 2016-02-24 | 2019-07-30 | Bank Of America Corporation | Computerized system for evaluating and modifying technology change events |
US10067984B2 (en) | 2016-02-24 | 2018-09-04 | Bank Of America Corporation | Computerized system for evaluating technology stability |
US10430743B2 (en) | 2016-02-24 | 2019-10-01 | Bank Of America Corporation | Computerized system for simulating the likelihood of technology change incidents |
US10387230B2 (en) | 2016-02-24 | 2019-08-20 | Bank Of America Corporation | Technical language processor administration |
KR101782539B1 (en) | 2016-08-19 | 2017-09-28 | 주식회사 수산아이앤티 | Method for embedding start application in a mobile device and user’s terminal and computer program for performing embedment of start application in a mobile device |
US10467124B2 (en) * | 2016-12-19 | 2019-11-05 | General Electric Company | Certification process for cloud platform |
JP6691085B2 (en) * | 2017-09-20 | 2020-04-28 | ファナック株式会社 | Application security management system and edge server |
US10861600B2 (en) * | 2017-09-28 | 2020-12-08 | General Electric Company | Method and system for user-verifiable certification of software for medical devices |
US10747525B2 (en) * | 2018-03-09 | 2020-08-18 | International Business Machines Corporation | Distribution of a software upgrade via a network |
GB201805429D0 (en) * | 2018-04-03 | 2018-05-16 | Palantir Technologies Inc | Security system and method |
EP3712789A1 (en) * | 2019-03-22 | 2020-09-23 | Siemens Aktiengesellschaft | Method and administration device for administrating code artifacts for an industrial system |
JP2021099693A (en) * | 2019-12-23 | 2021-07-01 | グローリー株式会社 | Valuable medium processor |
JPWO2021260753A1 (en) * | 2020-06-22 | 2021-12-30 |
Family Cites Families (82)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS5684841A (en) | 1979-12-13 | 1981-07-10 | Denki Kagaku Kogyo Kk | Electron gun |
US4919545A (en) | 1988-12-22 | 1990-04-24 | Gte Laboratories Incorporated | Distributed security procedure for intelligent networks |
US5276876A (en) * | 1990-05-16 | 1994-01-04 | International Business Machines Corporation | Registration of resources for commit procedures |
FR2662879B1 (en) | 1990-05-30 | 1994-03-25 | Alcatel Cit | CENTRALIZED MAINTENANCE METHOD FOR A WIRELESS TELEPHONE NETWORK. |
US6694359B1 (en) * | 1991-08-21 | 2004-02-17 | Unova, Inc. | Data collection and dissemination system |
ES2128393T3 (en) | 1992-05-15 | 1999-05-16 | Addison M Fischer | METHOD AND APPARATUS FOR COMPUTER SYSTEMS WITH INFORMATION DATA STRUCTURES FOR AUTHORIZATION PROGRAMS. |
FR2698510B1 (en) | 1992-11-26 | 1994-12-23 | Schlumberger Ind Sa | Communication network. |
WO1995014345A1 (en) * | 1993-11-15 | 1995-05-26 | Qualcomm Incorporated | A method for handling unrecognizable commands in a wireless environment |
SE502433C2 (en) * | 1994-02-11 | 1995-10-16 | Nobelpharma Ab | Spacer for dental implants |
US5521958A (en) | 1994-04-29 | 1996-05-28 | Harris Corporation | Telecommunications test system including a test and trouble shooting expert system |
NO942031L (en) | 1994-06-01 | 1995-12-04 | Ericsson As Creative Engineeri | System for monitoring telephone networks and / or data communication networks, especially mobile telephone networks |
US5724425A (en) * | 1994-06-10 | 1998-03-03 | Sun Microsystems, Inc. | Method and apparatus for enhancing software security and distributing software |
US5987134A (en) | 1996-02-23 | 1999-11-16 | Fuji Xerox Co., Ltd. | Device and method for authenticating user's access rights to resources |
US5838910A (en) | 1996-03-14 | 1998-11-17 | Domenikos; Steven D. | Systems and methods for executing application programs from a memory device linked to a server at an internet site |
US5825877A (en) * | 1996-06-11 | 1998-10-20 | International Business Machines Corporation | Support for portable trusted software |
US5862474A (en) * | 1996-08-08 | 1999-01-19 | Qualcomm Incorporated | Programmable wireless modem |
US6026293A (en) * | 1996-09-05 | 2000-02-15 | Ericsson Inc. | System for preventing electronic memory tampering |
US5953654A (en) | 1996-11-01 | 1999-09-14 | Harris Corporation | Wireless communications system for identifying unauthorized mobile units |
US6167520A (en) * | 1996-11-08 | 2000-12-26 | Finjan Software, Inc. | System and method for protecting a client during runtime from hostile downloadables |
US5892904A (en) | 1996-12-06 | 1999-04-06 | Microsoft Corporation | Code certification for network transmission |
US6061346A (en) | 1997-01-17 | 2000-05-09 | Telefonaktiebolaget Lm Ericsson (Publ) | Secure access method, and associated apparatus, for accessing a private IP network |
US6167522A (en) * | 1997-04-01 | 2000-12-26 | Sun Microsystems, Inc. | Method and apparatus for providing security for servers executing application programs received via a network |
JPH10301772A (en) | 1997-04-30 | 1998-11-13 | Sony Corp | Information processor and method therefor and recording medium |
US5940590A (en) | 1997-05-31 | 1999-08-17 | International Business Machines Corporation | System and method for securing computer-executable program code using task gates |
US6496979B1 (en) * | 1997-10-24 | 2002-12-17 | Microsoft Corporation | System and method for managing application installation for a mobile device |
US6125447A (en) | 1997-12-11 | 2000-09-26 | Sun Microsystems, Inc. | Protection domains to provide security in a computer system |
US6163693A (en) | 1997-12-16 | 2000-12-19 | Ericsson, Inc. | Automated warranty registration |
GB2333864B (en) | 1998-01-28 | 2003-05-07 | Ibm | Distribution of software updates via a computer network |
US6259791B1 (en) * | 1998-02-26 | 2001-07-10 | Motorola, Inc. | Method and apparatus in a wireless messaging system for controlling a hierarchical provision of service |
US6493870B1 (en) * | 1998-03-20 | 2002-12-10 | Sun Microsystems, Inc. | Methods and apparatus for packaging a program for remote execution |
US6421781B1 (en) * | 1998-04-30 | 2002-07-16 | Openwave Systems Inc. | Method and apparatus for maintaining security in a push server |
US6339826B2 (en) | 1998-05-05 | 2002-01-15 | International Business Machines Corp. | Client-server system for maintaining a user desktop consistent with server application user access permissions |
WO1999059058A1 (en) | 1998-05-14 | 1999-11-18 | Sega Enterprises, Ltd. | Information processor, information processing method, information recorded medium, and information processing system |
IL124571A0 (en) | 1998-05-21 | 1998-12-06 | Miki Mullor | Method of restricting software operation within a licensed limitation |
JP3995338B2 (en) | 1998-05-27 | 2007-10-24 | 富士通株式会社 | Network connection control method and system |
US6256393B1 (en) | 1998-06-23 | 2001-07-03 | General Instrument Corporation | Authorization and access control of software object residing in set-top terminals |
SE9802423D0 (en) * | 1998-07-06 | 1998-07-06 | Pascal Medical Ab | Device for the treatment of Meniere's disease and similar ailments |
US6141010A (en) * | 1998-07-17 | 2000-10-31 | B. E. Technology, Llc | Computer interface method and apparatus with targeted advertising |
US6587684B1 (en) * | 1998-07-28 | 2003-07-01 | Bell Atlantic Nynex Mobile | Digital wireless telephone system for downloading software to a digital telephone using wireless data link protocol |
US6256493B1 (en) * | 1998-07-31 | 2001-07-03 | Motorola, Inc. | Selective call receiver and method for programming a selective call receiver |
JP3777092B2 (en) * | 1998-08-01 | 2006-05-24 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Method and system for running distributed applications |
JP2002526830A (en) | 1998-09-28 | 2002-08-20 | アーガス システムズ グループ,インク. | Compartmentalized trust computer operating system |
US6609199B1 (en) | 1998-10-26 | 2003-08-19 | Microsoft Corporation | Method and apparatus for authenticating an open system application to a portable IC device |
US6158010A (en) | 1998-10-28 | 2000-12-05 | Crosslogix, Inc. | System and method for maintaining security in a distributed computer network |
US6052600A (en) * | 1998-11-23 | 2000-04-18 | Motorola, Inc. | Software programmable radio and method for configuring |
FI990461A0 (en) | 1999-03-03 | 1999-03-03 | Nokia Mobile Phones Ltd | Procedure for loading programs from a server to a subscriber terminal |
FI990601A0 (en) | 1999-03-17 | 1999-03-17 | Sonera Oy | Method and system in a telecommunications system |
JP2001028572A (en) | 1999-03-19 | 2001-01-30 | Sanyo Electric Co Ltd | Information distribution system |
US6463534B1 (en) | 1999-03-26 | 2002-10-08 | Motorola, Inc. | Secure wireless electronic-commerce system with wireless network domain |
AU4674300A (en) | 1999-05-25 | 2000-12-12 | Motorola, Inc. | Pre-verification of applications in mobile computing |
US6334056B1 (en) * | 1999-05-28 | 2001-12-25 | Qwest Communications Int'l., Inc. | Secure gateway processing for handheld device markup language (HDML) |
US6263434B1 (en) | 1999-09-21 | 2001-07-17 | Sun Microsystems, Inc. | Signed group criteria |
US6775536B1 (en) * | 1999-11-03 | 2004-08-10 | Motorola, Inc | Method for validating an application for use in a mobile communication device |
US7213247B1 (en) | 2000-01-10 | 2007-05-01 | Wind River Systems, Inc. | Protection domains for a computer operating system |
US6782527B1 (en) | 2000-01-28 | 2004-08-24 | Networks Associates, Inc. | System and method for efficient distribution of application services to a plurality of computing appliances organized as subnets |
US6615038B1 (en) * | 2000-04-28 | 2003-09-02 | Samsung Electronics Co., Ltd. | System and method for automatically creating and updating a mobile station configuration database in a wireless network |
US6728536B1 (en) | 2000-05-02 | 2004-04-27 | Telefonaktiebolaget Lm Ericsson | Method and system for combined transmission of access specific access independent and application specific information over public IP networks between visiting and home networks |
US6862696B1 (en) * | 2000-05-03 | 2005-03-01 | Cigital | System and method for software certification |
US20020107809A1 (en) | 2000-06-02 | 2002-08-08 | Biddle John Denton | System and method for licensing management |
US7051366B1 (en) | 2000-06-21 | 2006-05-23 | Microsoft Corporation | Evidence-based security policy manager |
US7131143B1 (en) | 2000-06-21 | 2006-10-31 | Microsoft Corporation | Evaluating initially untrusted evidence in an evidence-based security policy manager |
US6981281B1 (en) | 2000-06-21 | 2005-12-27 | Microsoft Corporation | Filtering a permission set using permission requests associated with a code assembly |
US7076557B1 (en) | 2000-07-10 | 2006-07-11 | Microsoft Corporation | Applying a permission grant set to a call stack during runtime |
US7350204B2 (en) | 2000-07-24 | 2008-03-25 | Microsoft Corporation | Policies for secure software execution |
US6628938B1 (en) * | 2000-08-14 | 2003-09-30 | Koninklijke Philips Electronics N.V. | Wireless system, a method of selecting an application while receiving application specific messages and user location method using user location awareness |
US6931545B1 (en) | 2000-08-28 | 2005-08-16 | Contentguard Holdings, Inc. | Systems and methods for integrity certification and verification of content consumption environments |
WO2002021413A2 (en) * | 2000-09-05 | 2002-03-14 | Zaplet, Inc. | Methods and apparatus providing electronic messages that are linked and aggregated |
EP1340167A2 (en) * | 2000-11-28 | 2003-09-03 | 4thPass Inc. | Method and system for maintaining and distributing wireless applications |
US20020078380A1 (en) * | 2000-12-20 | 2002-06-20 | Jyh-Han Lin | Method for permitting debugging and testing of software on a mobile communication device in a secure environment |
US7174534B2 (en) * | 2001-01-22 | 2007-02-06 | Symbol Technologies, Inc. | Efficient system and method for running and analyzing multi-channel, multi-modal applications |
TWI270270B (en) * | 2001-05-14 | 2007-01-01 | Ntt Docomo Inc | System for managing program |
US7099663B2 (en) | 2001-05-31 | 2006-08-29 | Qualcomm Inc. | Safe application distribution and execution in a wireless environment |
US7120429B2 (en) * | 2001-08-13 | 2006-10-10 | Qualcomm Inc. | System and method for licensing applications on wireless devices over a wireless network |
CN1975751B (en) * | 2001-08-15 | 2010-05-19 | 高通股份有限公司 | Test enabled application execution |
US6999748B2 (en) * | 2002-12-19 | 2006-02-14 | Cingular Wireless Ii, Llc | Automated device behavior management based on network charging and rating conditions |
US6941134B2 (en) * | 2002-12-19 | 2005-09-06 | Cingular Wireless Ii, Llc | Automated device behavior management based on preset preferences |
US7735120B2 (en) | 2003-12-24 | 2010-06-08 | Apple Inc. | Server computer issued credential authentication |
EP2020797B1 (en) | 2007-08-02 | 2016-06-15 | Apple Inc. | Client-server Opaque token passing apparatus and method |
US8701172B2 (en) | 2008-08-13 | 2014-04-15 | Apple Inc. | System and method for facilitating user authentication of web page content |
US8837716B2 (en) | 2009-02-02 | 2014-09-16 | Apple Inc. | Sensor derived authentication for establishing peer-to-peer networks |
WO2014208209A1 (en) | 2013-06-25 | 2014-12-31 | 日産自動車株式会社 | Control device and control method for hybrid vehicle |
KR102032857B1 (en) | 2015-03-22 | 2019-10-16 | 애플 인크. | Methods and apparatus for user authentication and human intent verification in mobile devices |
-
2001
- 2001-05-31 US US09/872,418 patent/US7099663B2/en not_active Expired - Lifetime
-
2002
- 2002-05-23 EP EP09174958.0A patent/EP2163986B1/en not_active Expired - Lifetime
- 2002-05-23 EP EP02739391A patent/EP1438657B1/en not_active Expired - Lifetime
- 2002-05-23 IL IL15911702A patent/IL159117A0/en unknown
- 2002-05-23 DE DE60234267T patent/DE60234267D1/en not_active Expired - Lifetime
- 2002-05-23 WO PCT/US2002/016485 patent/WO2002097620A2/en active Application Filing
- 2002-05-23 AU AU2002312041A patent/AU2002312041B2/en not_active Expired
- 2002-05-23 CA CA2448979A patent/CA2448979C/en not_active Expired - Lifetime
- 2002-05-23 ES ES02739391T patent/ES2334336T3/en not_active Expired - Lifetime
- 2002-05-23 CN CNB028149742A patent/CN1258141C/en not_active Expired - Lifetime
- 2002-05-23 JP JP2003500736A patent/JP4795636B2/en not_active Expired - Lifetime
- 2002-05-23 RU RU2003137835/09A patent/RU2295753C2/en active
- 2002-05-23 NZ NZ529867A patent/NZ529867A/en not_active IP Right Cessation
- 2002-05-23 KR KR1020037002109A patent/KR100634773B1/en active IP Right Grant
- 2002-05-23 AT AT02739391T patent/ATE447739T1/en not_active IP Right Cessation
- 2002-05-23 MX MXPA03010890A patent/MXPA03010890A/en active IP Right Grant
- 2002-05-23 BR BRPI0209741A patent/BRPI0209741B1/en active IP Right Grant
- 2002-05-30 AR ARP020102027A patent/AR036043A1/en active IP Right Grant
- 2002-05-30 PE PE2002000459A patent/PE20030021A1/en active IP Right Grant
- 2002-05-31 TW TW091111721A patent/TWI252701B/en not_active IP Right Cessation
-
2005
- 2005-03-02 HK HK05101823A patent/HK1069451A1/en not_active IP Right Cessation
-
2006
- 2006-08-28 US US11/467,877 patent/US7684792B2/en not_active Expired - Lifetime
-
2008
- 2008-09-17 JP JP2008238450A patent/JP4440983B2/en not_active Expired - Lifetime
-
2010
- 2010-03-22 US US12/728,904 patent/US8112076B2/en not_active Expired - Fee Related
-
2012
- 2012-02-07 US US13/368,056 patent/US8588766B2/en not_active Ceased
-
2015
- 2015-11-18 US US14/945,210 patent/USRE48001E1/en not_active Expired - Lifetime
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2448979A1 (en) | Safe application distribution and execution in a wireless environment | |
CN110162009B (en) | Fault diagnosis method, information determination method, corresponding device and equipment | |
CN109766700A (en) | Access control method and device, the storage medium, electronic device of file | |
CN113689588B (en) | Inspection verification method and device and electronic equipment | |
US9251367B2 (en) | Device, method and program for preventing information leakage | |
CN104346566A (en) | Method, device, terminal, server and system for detecting privacy authority risks | |
CN106778342B (en) | Trusted execution environment security authentication method, device and equipment | |
CN108092970B (en) | Wireless network maintenance method and equipment, storage medium and terminal thereof | |
KR20130094522A (en) | Mobile terminal and method for security diagnostics | |
CN105814861B (en) | Apparatus and method for transmitting data | |
CN111935095A (en) | Source code leakage monitoring method and device and computer storage medium | |
GB2609359A (en) | Privacy centric data security in cloud environment | |
CN103888465B (en) | A kind of webpage kidnaps detection method and device | |
CN102957673A (en) | Method, device and system for processing information | |
CN109598146B (en) | Privacy risk assessment method and device | |
CN110619022A (en) | Node detection method, device, equipment and storage medium based on block chain network | |
CN110276193B (en) | Risk feature output method, application operation control method, system and device | |
US8095980B2 (en) | Detecting malicious behavior in data transmission of a de-duplication system | |
CN113922952B (en) | Access request response method, device, computer equipment and storage medium | |
KR101835319B1 (en) | Attack sensing system using user behavior analysis and method thereof | |
US11677582B2 (en) | Detecting anomalies on a controller area network bus | |
WO2020228564A1 (en) | Application service method and device | |
CN106022171A (en) | External storage device access control method and device for Android terminal | |
CN107612763B (en) | Metadata management method, application server, service system, medium and controller | |
KR101294940B1 (en) | System for protecting information on mobile platform and method for the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKEX | Expiry |
Effective date: 20220524 |