Browse Prior Art Database

Fine grained application level access control for mobile devices

IP.com Disclosure Number: IPCOM000202079D
Publication Date: 2010-Dec-03
Document File: 4 page(s) / 70K

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed is a system and method which allows a user to select to which programs and features an installed application should have access. This provides users with a more fine-grained control over which applications an installed application can access.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 01 of 4

Fine grained application level access control for mobile devices

With mobile device applications today, the application developer alerts the user upon installation that the application will have access to a number of features of the phone such as: Internet, contact list, call history, etc. The user must agree or disagree; the current solution is to select all or receive nothing. (Figure 1) Users need a more fine-grained control over which applications an installed application can access.

Figure 1: Application screen on installation

(This page contains 00 pictures or other non-text object)

Current methods allow the use of permissions to allocate device resources to an application. [1] The same concept can be used to implement the disclosed invention with the exception that the user has placed certain requests for permission on an allowed list versus a disallow list.

Disclosed is a system and method which allows a user to select to which programs and features an installed application should have access. Upon installation of an application, the user acknowledges that there are select features to which they do not agree to allow access, and ensures that those features will not function. Rather than not installing an entire application, the user can activate it in partial functionality mode.

1


Page 02 of 4

Similar to the concept of Safe Mode on a computer, the user can experience an application without worrying about it having access to undesired information.

Implementation of the invention in a preferred embodiment follows:
1. A user attempts to install an application onto a device that requests access to various device permissions.

2. The user is prompted with a screen just as they are today.
a. The screen is modified to allow user interaction (Figure 2)
i. Each permission includes a checkbox to turn on/off the permission
ii. Each permission includes additiona...