Safe application distribution and execution in a wireless environment
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04M-001/68
H04M-001/66
H04Q-007/20
출원번호
UP-0467877
(2006-08-28)
등록번호
US-7684792
(2010-04-21)
발명자
/ 주소
Lundblade, Laurence
Phillips, Marc S.
Minear, Brian
Zhuang, Yan
Krishnan, Anand
Sprigg, Stephen A
Chmaytelli, Mazen
Oliver, Mitchell B.
Horel, Gerald Charles
Crossland, Karen
출원인 / 주소
Qualcomm Incorporated
대리인 / 주소
Fariba Yadegar-Bandar
인용정보
피인용 횟수 :
17인용 특허 :
20
초록▼
The present invention provides safe and secure application distribution and execution by providing systems and methods that test an application to ensure that it satisfies predetermined criteria associated with the environment in which it will execute. Furthermore, by using rules and permission list
The present invention provides safe and secure application distribution and execution by providing systems and methods that test an application to ensure that it satisfies predetermined criteria associated with the environment in which it will execute. Furthermore, by using rules and permission lists, application removal, and a modification detection technique, such as digital signatures, the present invention provides mechanisms to safely distribute and execute tested, or untested, applications by determining whether the application has been modified, determining if it has permission to execute in a given wireless device environment, and removing the application should it be desirable to do so.
대표청구항▼
What is claimed is: 1. A method for a server processing and distributing an application for use on a wireless device communicating over a wireless network, comprising: receiving the application and a first identification information associated with the application, said application being independen
What is claimed is: 1. A method for a server processing and distributing an application for use on a wireless device communicating over a wireless network, comprising: receiving the application and a first identification information associated with the application, said application being independent of any act for performing wireless communication between the wireless device and the wireless network, said first identification information being usable to confirm an identity of a source of the application; determining that the application satisfies each criterion in a set of predetermined criteria, wherein at least one criterion in the set of predetermined criteria is established by a managing authority for a managed environment; after said determining, assigning a set of permissions to the application, each permission in the set of permissions being associated with a respective criterion in said set of predetermined criteria; and transmitting the application and the set of permissions to the wireless device. 2. The method of claim 1, wherein said set of predetermined criteria comprises a first criterion associated with a generic wireless network and a second criterion associated with a specific wireless network. 3. The method of claim 2, wherein the first criterion is associated with operations the application is allowed to perform on the wireless device, and the second criterion is associated with an authorization needed for operation with the specific wireless network. 4. The method of claim 1, wherein in said step of transmitting, at least the application is transmitted using a modification detection technique. 5. The method of claim 4, wherein the modification detection technique uses a digital signature. 6. The method of claim 1, wherein the managed environment comprises the wireless network. 7. A system for processing and distributing an application for use on a wireless device communicating over a wireless network, comprising: a carrier network; an infrastructure for supporting the wireless network, coupled to said carrier network; and a server, coupled to said carrier network, and configured to: receive the application and a first identification information associated with the application, said application being independent of any act for performing wireless communication between the wireless device and the wireless network, said first identification information being usable to confirm an identity of a source of the application; determine that the application satisfies each criterion in a set of predetermined criteria, wherein at least one criterion in the set of predetermined criteria is established by a managing authority for a managed environment; after said determination, assign a set of permissions to the application, each permission in the set of permissions being associated with a respective criterion in said set of predetermined criteria; and transmit the application and the set of permissions to the wireless device. 8. The system of claim 7, wherein a modification detection technique is used in the step to transmit the application and the set of permissions to the wireless device. 9. The system of claim 7, wherein said server comprises: an inter-server network; a first server configured to receive the application; a second server configured to determine that the application satisfies the criteria; and a third server configured to assign the set of permissions and transmit the application, wherein said first, second, and third server are each coupled to said inter-server network, and said third server is coupled to said carrier network. 10. A system for processing and distributing an application for use on a wireless device communicating over a wireless network, comprising: a carrier network means; an infrastructure means for supporting the wireless network, coupled to said carrier network; and a server means, coupled to said carrier network means, the server means comprising: a means for receiving the application and a first identification information associated with the application, said application being independent of any act for performing wireless communication between the wireless device and the wireless network, said first identification information being usable to confirm an identity of a source of the application; a means for determining that the application satisfies each criterion in a set of predetermined criteria, wherein at least one criterion in the set of predetermined criteria is established by a managing authority for a managed environment; a means for assigning a set of permissions to the application, each permission in the set of permissions being associated with a respective criterion in said set of predetermined criteria; and a means for transmitting the application and the set of permissions to the wireless device. 11. A method of processing an application for execution on a wireless device communicating over a wireless network, comprising: receiving, from a server over the wireless network, a transmission comprising the application and a set of permissions; determining, based upon evaluating a rule previously stored in the wireless device on said set of permissions, whether to enable the application for execution on the wireless device; executing the application if the application has been enabled for execution; and disabling the application if the application has not been enabled for execution on the wireless device. 12. The method of claim 11, further comprising: repeating the determining step each time a request to execute the application occurs. 13. The method of claim 11, further comprising: determining whether the application has been modified; and if it is determined that the application has been modified, disabling the application from executing on the wireless device. 14. The method of claim 11, wherein disabling the application comprises disabling the application and leaving the application on the wireless device. 15. The method of claim 11, wherein disabling the application comprises disabling the application and deleting the application from the wireless device. 16. The method of claim 11, wherein determining whether to enable the application for execution on the wireless device comprises determining whether the application is enabled for execution in the wireless network. 17. A wireless device which communicates over a wireless network and is capable of executing an application, comprising: a wireless interface for receiving the application and a set of permissions, the application being independent of any act for performing wireless communication between the wireless device and the wireless network; and a computer platform coupled to said wireless interface, said computer platform comprising a first storage for storing a previously defined rule, and a second storage for storing the application, the set of permissions, and the identification information, wherein the computer platform is configured to determine, based upon evaluating one or more rules against the set of permissions: whether to enable the application for execution on the wireless device; and whether to enable the application for execution in the wireless network; the computer platform being further configured to: execute the application if the application has been enabled for execution; and remove the application if the application has not been enabled for execution. 18. The wireless device of claim 17, wherein the computer platform is further configured to remove the application by disabling the application and leaving the application on the wireless device. 19. The wireless device of claim 17, wherein the wireless interface is further operative for receiving identification information that identifies an originator of the application. 20. A wireless device which communicates over a wireless network and is capable of executing an application, comprising: a wireless interface means for receiving the application, a set of permissions, and an identification information, the application being independent of any act for performing wireless communication between the wireless device and the wireless network; and a computer platform means, coupled to said wireless interface, said computer platform means comprising: a first storage means for storing one or more previously defined rules; a second storage means for storing the application, the set of permissions, and the identification information; a means for determining, based upon evaluating at least one rule against the set of permissions whether to enable the application for execution on the wireless device and whether to enable the application for execution in the wireless network; a means for executing the application if the application has been enabled for execution on the wireless device and in the wireless network; and a means for disabling the application if the application has not been enabled for execution either on the wireless device or in the wireless network.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (20)
Hoyle, Martin David, Computer interface method and apparatus with portable network organization system and targeted advertising.
Geiger, Robert L.; Lin, Jyh-Han; Van Peursem, James E.; Palaniswamy, Avinash C.; Subramanian, Ambiga; Battenhouse, Anna, Method for validating an application for use in a mobile communication device.
Coleman Andrew (Vestal NY) Henry John A. (Endwell NY) Maslak Barbara A. M. (Endwell NY) Pruul Edmond A. (Afton NY) Showalter James M. (Endicott NY) Stone Richard L. (Johnson City NY) Szczygielski Tho, Registration of resources for commit procedures.
Moles, Bryan J.; Herle, Sudhindra P., System and method for automatically creating and updating a mobile station configuration database in a wireless network.
Rachabathuni, Sailesh; Griffiths, Jonathan; Rankin, Paul John, Wireless system, a method of selecting an application while receiving application specific messages and user location method using user location awareness.
Kephart, Aaron D.; Howie, Charles C.; Glover, DeAundra K.; Nutter, Darla; Lewis, Greg M.; Price, Jesse A., Computerized system for analyzing operational event data.
Kephart, Aaron D.; Howie, Charles C.; Glover, DeAundra K.; Nutter, Darla; Lewis, Greg M.; Price, Jesse A., Computerized system for evaluating technology stability.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.