Methods and systems for upgrade and synchronization of securely installed applications on a computing device
    21.
    发明授权
    Methods and systems for upgrade and synchronization of securely installed applications on a computing device 有权
    用于在计算设备上升级和同步安全安装的应用程序的方法和系统

    公开(公告)号:US08849717B2

    公开(公告)日:2014-09-30

    申请号:US12757009

    申请日:2010-04-08

    IPC分类号: G06F21/00 G06F21/12 H04L29/06

    摘要: Embodiments of the present disclosure provide for upgrades and synchronization of applications installed on a device, such as a mobile device. In one embodiment, a device may include applications purchased and downloaded via a content management system. The device maintains a list or database of applications that are authorized for each device. This list is also replicated in a remote cache that is maintained by an archive host. The device may then synchronize and upgrade these applications across multiple platforms, such as one or more computers that can be coupled to the device or the archive host. The archive host allows for files of the application be provided back to the device. Upon installation, the device can then confirm the authorization and identity of the newly installed application.

    摘要翻译: 本公开的实施例提供了安装在诸如移动设备的设备上的应用的升级和同步。 在一个实施例中,设备可以包括经由内容管理系统购买和下载的应用。 设备维护每个设备授权的应用程序的列表或数据库。 该列表也被复制在由归档主机维护的远程缓存中。 然后,设备可以跨多个平台(诸如可以耦合到设备或归档主机的一个或多个计算机)同步和升级这些应用。 归档主机允许将应用程序的文件提供给设备。 安装后,设备可以确认新安装的应用程序的授权和身份。

    RESTRICTION OF PROGRAM PROCESS CAPABILITIES
    22.
    发明申请
    RESTRICTION OF PROGRAM PROCESS CAPABILITIES 有权
    限制程序进程能力

    公开(公告)号:US20130055341A1

    公开(公告)日:2013-02-28

    申请号:US13591690

    申请日:2012-08-22

    IPC分类号: G06F21/22

    摘要: This document describes systems and methods for restricting program process capabilities. In some implementations, the capabilities are restricted by limiting the rights or privileges granted to an application. A plurality of rules may be established for a program, or for a group of programs, denying that program the right to take actions which are outside of the actions needed to implement its intended functionality. A security policy is implemented to test actions initiated in response to an application against the rules to enable decisions restricting the possible actions of the program. Embodiments are disclosed which process the majority of decisions regarding actions against a security profile through use of a virtual machine. In some embodiments, the majority of decisions are resolved within the kernel space of an operating system.

    摘要翻译: 本文档描述了限制程序进程能力的系统和方法。 在一些实现中,通过限制授予应用的权限或特权来限制这些能力。 可以为程序或一组程序建立多个规则,拒绝该程序采取超出执行其预期功能所需的动作的动作的权利。 实施安全策略来测试针对规则响应应用程序发起的操作,以便能够限制程序可能的动作的决策。 公开了通过使用虚拟机处理关于针对安全简档的动作的大多数决定的实施例。 在一些实施例中,大多数决定在操作系统的内核空间内被解决。

    MANAGING SECURELY INSTALLED APPLICATIONS
    23.
    发明申请
    MANAGING SECURELY INSTALLED APPLICATIONS 有权
    管理安全的安装应用程序

    公开(公告)号:US20100313196A1

    公开(公告)日:2010-12-09

    申请号:US12477775

    申请日:2009-06-03

    IPC分类号: G06F9/445 G06F21/00

    CPC分类号: G06F21/51 G06F8/61

    摘要: Embodiments of the present disclosure provide methods and systems for managing securely installed applications. After installation, an installation framework performs a bind process to correlate the randomly assigned identifier with the unique identifier of the application. The installation framework also manages the execution of the application. When an application is launched, the application framework performs a search for that application's randomly assigned identifier and locates the application's container. The application is then allowed to execute within its container. During execution, the software application may also be restricted in various ways by the installation framework to its dynamic containers. The installer may also work with a trusted operating system component, such as the kernel, to help enforce the container restrictions. In addition, if desired, the use of random identifiers for containers may be used in conjunction with other security mechanisms, such as the use of code signing.

    摘要翻译: 本公开的实施例提供了用于管理安全安装的应用的方法和系统。 安装后,安装框架执行绑定过程,将随机分配的标识符与应用程序的唯一标识相关联。 安装框架还管理应用程序的执行。 当应用程序启动时,应用程序框架执行搜索该应用程序的随机分配的标识符,并定位应用程序的容器。 然后允许应用程序在其容器内执行。 在执行期间,软件应用程序也可能以各种方式通过安装框架限制到其动态容器。 安装程序还可以使用可信操作系统组件(如内核)来帮助实施容器限制。 另外,如果需要,容器的随机标识符的使用可以与其他安全机制结合使用,例如使用代码签名。

    SYSTEM AND METHOD OF AUTHORIZING EXECUTION OF SOFTWARE CODE IN A DEVICE BASED ON ENTITLEMENTS GRANTED TO A CARRIER
    24.
    发明申请
    SYSTEM AND METHOD OF AUTHORIZING EXECUTION OF SOFTWARE CODE IN A DEVICE BASED ON ENTITLEMENTS GRANTED TO A CARRIER 审中-公开
    基于授予载体的文件授权软件代码执行的系统和方法

    公开(公告)号:US20090249075A1

    公开(公告)日:2009-10-01

    申请号:US12397676

    申请日:2009-03-04

    IPC分类号: H04L9/32

    CPC分类号: G06F21/51

    摘要: Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments based on at least one carrier profile. Carrier profiles may be issued by trusted entities to extend trust to other entities to allow those other entities to provide or control execution of applications in a secure operating environment such as on particular computing devices. The carrier profiles allow entities to add software code to a device without reauthorizing each distribution by the trusted authority, or to limited groups of devices controlled or authorized by the other entities.

    摘要翻译: 实施例包括用于基于至少一个载体简档来授权在安全操作环境中执行软件代码或访问能力的系统和方法。 运营商简档可以由可信实体发布以将信任扩展到其他实体,以允许这些其他实体在诸如特定计算设备的安全操作环境中提供或控制应用的执行。 运营商配置文件允许实体向设备添加软件代码,而不必由可信管理机构重新授权每个分发,或由其他实体控制或授权的有限的设备组。

    SYSTEM AND METHOD OF AUTHORIZING EXECUTION OF SOFTWARE CODE BASED ON A TRUSTED CACHE
    25.
    发明申请
    SYSTEM AND METHOD OF AUTHORIZING EXECUTION OF SOFTWARE CODE BASED ON A TRUSTED CACHE 审中-公开
    基于有效的高速缓存执行软件代码的系统和方法

    公开(公告)号:US20090249064A1

    公开(公告)日:2009-10-01

    申请号:US12397690

    申请日:2009-03-04

    IPC分类号: H04L9/32

    CPC分类号: G06F21/51

    摘要: Embodiments include systems and methods for authorizing software code to be executed on a device based on a trusted cache. When receiving a request to execute software, this software may be checked for a digital signature by at least one trusted authority. According, a digest value indicative of at least a portion of the software module may be determined. A cache stored in trusted space of the device is then accessed for a matching digest value. If an entry is found, the device may allow execution of the software module; if an entry is not found, then the device may continue with the cryptographic operations for verifying the software's digital signature, or may be configured to block execution of the software.

    摘要翻译: 实施例包括用于授权在基于可信缓存的设备上执行软件代码的系统和方法。 当接收到执行软件的请求时,可以由至少一个可信管理机构检查该软件的数字签名。 据此,可以确定指示软件模块的至少一部分的摘要值。 存储在设备的可信空间中的缓存然后被访问以获得匹配的摘要值。 如果找到条目,则该设备可以允许执行该软件模块; 如果未找到条目,则设备可以继续用于验证软件的数字签名的加密操作,或者可以被配置为阻止软件的执行。

    Secure software installation
    28.
    发明授权
    Secure software installation 有权
    安全的软件安装

    公开(公告)号:US08850135B2

    公开(公告)日:2014-09-30

    申请号:US13604586

    申请日:2012-09-05

    CPC分类号: G06F21/53

    摘要: Embodiments of the present disclosure provide methods and systems for securely installing software on a computing device, such as a mobile device. In one embodiment, the device executes an installer that securely installs the software. In order to perform installations securely, the installer configures one or more secure containers for the software and installs the software exclusively in these containers. In some embodiments, the installer randomly determines the identifiers for the containers. These identifiers remain unknown to the software to be installed. Instead, an installation framework maintains the correspondence between an application and its container. Other methods and apparatuses are also described.

    摘要翻译: 本公开的实施例提供了用于在诸如移动设备的计算设备上安全地安装软件的方法和系统。 在一个实施例中,设备执行安全地安装软件的安装程序。 为了安全地执行安装,安装程序为软件配置一个或多个安全容器,并将软件专门安装在这些容器中。 在一些实施例中,安装者随机地确定容器的标识符。 这些标识符对于要安装的软件仍然是未知的。 相反,安装框架保持应用程序与其容器之间的对应关系。 还描述了其它方法和装置。

    Methods and Systems for Archiving and Restoring Securely Installed Applications on a Computing Device
    29.
    发明申请
    Methods and Systems for Archiving and Restoring Securely Installed Applications on a Computing Device 有权
    在计算设备上存档和恢复安全安装的应用程序的方法和系统

    公开(公告)号:US20110010701A1

    公开(公告)日:2011-01-13

    申请号:US12757020

    申请日:2010-04-08

    IPC分类号: G06F9/445 H04L9/32

    摘要: Embodiments of the present disclosure provide methods and systems of backing up applications and their associated data installed on a device, such as a mobile device. In particular, data for a backed-up application is stored on a remote archive host and can be restored to dynamically managed containers of securely installed applications on the device. Upon request, the archive host may provide a package of files to the device. The device may then restore the application based on the contents of the package. The package may comprise all the files needed to install the application including the program code, data, and documents. Alternatively, the package may simply comprise just some of the files, such as just the data or documents for an application. After installation, a secure installer framework may be used to verify the applications and authorize the application's execution on the device.

    摘要翻译: 本公开的实施例提供备份安装在诸如移动设备的设备上的应用及其相关联的数据的方法和系统。 特别地,备份的应用程序的数据存储在远程归档主机上,并可以恢复到设备上安全安装的应用程序的动态管理容器。 根据要求,存档主机可以向设备提供一组文件。 然后,设备可以基于包的内容来恢复应用。 该软件包可以包括安装应用程序所需的所有文件,包括程序代码,数据和文档。 或者,包可以仅仅包括一些文件,例如仅仅是用于应用的数据或文档。 安装后,可以使用安全的安装程序框架来验证应用程序并授权应用程序在设备上的执行。

    SYSTEM AND METHOD OF AUTHORIZING EXECUTION OF SOFTWARE CODE BASED ON ACCESSIBLE ENTITLEMENTS
    30.
    发明申请
    SYSTEM AND METHOD OF AUTHORIZING EXECUTION OF SOFTWARE CODE BASED ON ACCESSIBLE ENTITLEMENTS 审中-公开
    基于可访问权限的软件授权执行系统和方法

    公开(公告)号:US20090254753A1

    公开(公告)日:2009-10-08

    申请号:US12397660

    申请日:2009-03-04

    IPC分类号: H04L9/32 H04L9/00

    CPC分类号: G06F21/51

    摘要: Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments. Profiles may be issued by trusted entities to extend trust to other entities to allow those other entities to provide or control execution of applications in a secure operating environment such as on particular computing devices. A request in a first program may be received from a second program. A profile is then identified. The profile includes at least one entitlement associated with the second program. The profile is authenticated based on a first digest indicative of the profile and the second program is authenticated based on a second digest indicative of the second program. The request is then executed based on the entitlement.

    摘要翻译: 实施例包括用于授权在安全操作环境中执行软件代码或访问能力的系统和方法。 配置文件可以由受信任的实体发布以将信任扩展到其他实体,以允许其他实体在安全操作环境(例如特定计算设备)中提供或控制应用的执行。 可以从第二程序接收第一程序中的请求。 然后识别配置文件。 该简档包括与第二程序相关联的至少一个授权。 基于指示简档的第一摘要来鉴定简档,并且基于指示第二程序的第二摘要对第二程序进行认证。 然后根据授权执行该请求。