发明名称 Determining source of side-loaded software
摘要 A source of side-loaded software is determined. An action may be performed in response to the determination of the source. In one case, the handling of an application on a mobile device may be based on whether the source of the application is trusted or untrusted. If a software application being newly-installed on a mobile device of a user is determined to be untrusted, installation or execution is blocked. In one approach, the determination of the source includes: determining whether a first source identifier of a first application matches a white list of source identifiers or a black list of source identifiers; and sending the first source identifier and a first application identifier for the first application to a different computing device.
申请公布号 US9589129(B2) 申请公布日期 2017.03.07
申请号 US201514731273 申请日期 2015.06.04
申请人 LOOKOUT, INC. 发明人 Richardson David;Farrakha Ahmed Mohamed;Robinson William Neil;Buck Brian James
分类号 G06F21/50;H04L29/06 主分类号 G06F21/50
代理机构 Greenberg Traurig, LLP 代理人 Greenberg Traurig, LLP
主权项 1. A non-transitory computer-readable storage medium storing computer-readable instructions, which when executed, cause a first computing device to: store, in memory, a device state of the first computing device, the device state to vary between states comprising trusted, untrusted, and unknown; determine, by at least one processor of the first computing device, whether a first source identifier of a first application matches a first list of source identifiers; in response to determining that the first source identifier does not match the first list: set the device state to unknown, and send, by the at least one processor, over a network to a second computing device, at least one message comprising the first source identifier and a first application identifier for the first application; receive, over the network, a first message from the second computing device, the first message comprising a value of a first state designation for the first application, wherein the first state designation can be set to values including trusted and untrusted, and the second computing device is configured to set the value for the first state designation; and in response to receiving the first message, change, in the memory, the device state from unknown to the value of the first state designation received in the first message.
地址 San Francisco CA US