Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identifying manner of usage for software assets in applications on user devices

a software asset and application technology, applied in software maintainance/management, instruments, data switching networks, etc., can solve the problems of corrupted developer's authentic applications, android system will not install or run an application, and the author's identity and the trust of users are compromised,

Inactive Publication Date: 2015-06-18
LOOKOUT MOBILE SECURITY
View PDF31 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The Android system will not install or run an application that is not signed appropriately.
If the developer allows someone to use its key, or if the developer leaves its keystore and passwords in an unsecured location such that a third-party could find and use them, the developer's authoring identity and the trust of the user are compromised.
If a third party should manage to take a developer's key without its knowledge or permission, that person could sign and distribute applications that maliciously replace the developer's authentic applications or corrupt them.
Such a person could also sign and distribute applications under the developer's identity that attack other applications or the system itself, or corrupt or steal user data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identifying manner of usage for software assets in applications on user devices
  • Identifying manner of usage for software assets in applications on user devices
  • Identifying manner of usage for software assets in applications on user devices

Examples

Experimental program
Comparison scheme
Effect test

casee

[0056]In this embodiment, the Ad Network Detector application provides information to the user to about practices supporting mobile advertising. The application may detect many ad networks. Some of the ad networks detected may include the following examples:[0057]Lead Bolt[0058]AdFonic[0059]AdKnowledge[0060]AdMob[0061]BuzzCity[0062]Casee[0063]Everbadge[0064]JumpTap

[0065]Regarding ad network capabilities and privacy, in this embodiment the capabilities and information collection methods specific to each ad network may be investigated. Based on this investigation, the Ad Network Detector application details what identifying information is collected by each ad network, and how it is collected. This may include personal information directly linkable to an individual user, such as an email address, and device and network information that is specific to an individual device or network, rather than to the user.

[0066]FIG. 3 shows a screen 300 presented by an installed application 304 (e.g. ...

first embodiment

[0076]Various other embodiments are now described below. In a first embodiment, a computer-readable storage medium stores computer-readable instructions (e.g., instructions of an Ad Network Detector), which when executed, cause a computing apparatus (e.g., a mobile device of a user) to, for an application installed on the mobile device of the user, determine components of the application; identify, via at least one processor of the mobile device, at least one behavior associated with each of the components, including a first behavior (e.g., ad display in a notification bar) associated with a first component; present results from the identifying to the user, the results to include a list of behaviors including the first behavior; and receive a selection from the user of at least one behavioral preference. Further information regarding determining the components of an application is discussed in greater detail below in the section titled “Analyzing Components of an Application”.

[0077]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An identification of software assets and a defined manner of usage for the software assets are received over a network. Software applications previously or currently being installed on a plurality of user devices are monitored. From this monitoring, at least one of the software assets that is being used in one or more of the applications inconsistently with the defined manner of usage is identified. A report is sent over the network to a developer regarding the inconsistent usage determined from the monitoring.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]The present application is a continuation application of U.S. Non-Provisional application Ser. No. 14 / 105,950, filed Dec. 13, 2013, entitled “ASSESSING APPLICATION AUTHENTICITY AND PERFORMING AN ACTION IN RESPONSE TO AN EVALUATION RESULT,” the entire content of which application is hereby incorporated by reference as if fully set forth herein.[0002]The present application is related to U.S. Non-Provisional application Ser. No. 14 / 253,702, filed Apr. 15, 2014, entitled “MONITORING INSTALLED APPLICATIONS ON USER DEVICES,” the entire content of which application is hereby incorporated by reference as if fully set forth herein.[0003]The present application is related to U.S. Non-Provisional application Ser. No. 13 / 786,210, filed Mar. 5, 2013, entitled “EXPRESSING INTENT TO CONTROL BEHAVIOR OF APPLICATION COMPONENTS,” by Wyatt et al., U.S. Non-Provisional application Ser. No. 13 / 692,806, filed Dec. 3, 2012, entitled “COMPONENT ANALYSIS OF SOFT...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L12/26
CPCH04L43/06H04L43/04G06F8/60G06Q30/0241G06F21/57G06F8/70G06F21/44H04L9/3247G06F21/577G06F11/3604
Inventor MAHAFFEY, KEVIN PATRICKWYATT, TIMOTHY MICHEALEVANS, DANIEL LEEONG, EMIL BARKERSTRAZZERE, TIMOTHYLAMANTIA, MATTHEW JOHN JOSEPHBUCK, BRIAN JAMES
Owner LOOKOUT MOBILE SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products