Claims
- 1. A method for running a file on a mobile device that may be authenticated or unauthenticated, comprising:
determining when the file is unauthenticated, and when: determining when to prompt a user to aid in determining when to accept the file; and determining whether the application is accepted; and when: running the file.
- 2. The method of claim 1, further comprising determining when the file is on a revocation list, and when the file is on the revocation list terminating the file.
- 3. The method of claim 2, further comprising determining when the file is self-authenticating.
- 4. The method of claim 2, wherein determining when to prompt the user further comprises checking a prompt exclusion list (PEL).
- 5. The method of claim 4, wherein the user is prompted when the unauthenticated file is not included in the PEL.
- 6. The method of claim 4, wherein the PEL includes information relating to unauthenticated files that have been accepted by a user.
- 7. The method of claim 5, further comprising determining when the user has accepted the file based on the prompt and adding the file to the PEL.
- 8. The method of claim 7, wherein adding the file to the PEL, further comprises creating a hash of the file.
- 9. The method of claim 2, further comprising checking an integrity of the file.
- 10. The method of claim 9, wherein checking the integrity of the file further comprises comparing a hash of the file with a stored hash.
- 11. A computer readable medium for performing an action associated with a file on a mobile device, comprising:
determining when to prompt a user to aid in determining when to accept the file; and when determined:
prompting a user to accept the file; determining a response to the prompt: and determining whether the application is accepted; and when: performing the action, otherwise terminating the action.
- 12. The computer readable medium of claim 11, further comprising determining when the file is on a revocation list, and when the file is on the revocation list terminating the action.
- 13. The computer readable medium of claim 12, wherein determining when to prompt the user further comprises checking a prompt exclusion list (PEL).
- 14. The computer readable medium of claim 13, wherein the PEL includes files that have been accepted by the user
- 15. The computer readable medium of claim 13, wherein the file is hashed and added to the PEL when accepted.
- 16. The computer readable medium of claim 11, further comprising checking an integrity of the file.
- 17. The computer readable medium of claim 16, wherein checking the integrity of the file further comprises comparing a hash of the file with a stored hash.
- 18. An apparatus for performing an action associated with a file, comprising:
a processor and a computer-readable medium; an operating environment stored on the computer-readable medium and executing on the processor; a wireless interface layer operating under the control of the operating environment and configured to connect with another device; and an authentication device operating under the control of the operating environment and operative to perform actions, including:
determining when to prompt a user to aid in determining when to accept the file; and when determined:
prompting a user to accept the file; determining a response to the prompt: and determining whether the application is accepted based on the response; and when the prompt indicates to accept the file: performing the action, otherwise terminating the action.
- 19. The apparatus of claim 18, further comprising determining when the file is on a revocation list, and when the file is on the revocation list terminating the action.
- 20. The apparatus of claim 19, wherein determining when to prompt the user further comprises checking a prompt exclusion list (PEL).
- 21. The apparatus of claim 20, wherein the PEL includes files that have been accepted by the user
- 22. The apparatus of claim 20, wherein the file is hashed and added to the PEL when accepted.
- 23. The apparatus of claim 21, further comprising checking an integrity of the file.
- 24. The apparatus of claim 23, wherein checking the integrity of the file further comprises comparing a hash of the file with a stored hash.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit of U.S. Provisional Application Serial No. 60/420,197, filed Oct. 21, 2002, the benefit of the earlier filing date of which is hereby claimed under 35 U.S.C. § 119 (e).
Provisional Applications (1)
|
Number |
Date |
Country |
|
60420197 |
Oct 2002 |
US |