The ways in which users may gain access to executable code (e.g., software) for execution by a computing device is ever increasing. For example, users traditionally ventured to a “bricks-and-mortar” store to locate and purchase applications that were then installed manually by the users. Consequently, the users could typically trust the software due to the reputation of the store itself as well as the reputation of the developers of the software.
However, with the advent of application marketplaces users may have access to thousands of different types of applications from hundreds and even thousands of different developers. Therefore, a user may install a multitude of applications on a computing device from a wide variety of sources, some of which may even result in one application compromising another application. Consequently, it may be difficult to determine by the user and even by the marketplace itself as to whether the applications are trustworthy and therefore should be permitted to access functionality of a user's computing device. This difficulty may be further exacerbated by malicious parties that may attack the applications to access functionality supported by the application, such as access to sensitive data, even for applications that originated from a trustworthy source.
Per process networking capability techniques are described. In one or more implementations, a determination is made as to whether access to a network capability is permitted for a process that is executed on the computing device based on a token that is associated with the process. The token has one or more security identifiers that reference one or more network capabilities described in a manifest. The access to the network capability is managed based on the determination.
In one or more implementations, a network is probed to identify proxy servers, subnets, or remote accessible networks. Access of a process executed on the computing device to network capabilities of the network is managed based on the identification of the proxy servers or subnets and an examination of a token that is associated with the process. The token has one or more security identifiers that reference network capabilities, described in a manifest, that are permitted for use by the process. This may be performed in a secure fashion that is not configured to be affected by the process.
In one or more implementations, one or more computer-readable storage media comprise instructions stored thereon that, responsive to execution on a computing device, causes the computing device to execute an operating system to form a token having one or more security identifiers that reference network capabilities described in a manifest that corresponds to a process formed through execution of executable code by the computing device, the executable code and the manifest installed on the computing device from a package, the token usable by the operating system to manage access of the process to the network capabilities.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
The detailed description is described with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The use of the same reference numbers in different instances in the description and the figures may indicate similar or identical items.
Traditionally, applications that were executed on a computing device were given access to most if not all of the functionality of the computing device, even regardless of whether this access was desired. This may include unfettered access to a network. However, in some instances these same applications may be exploited by malicious parties. The unfettered access may therefore be used by these malicious parties to access resources on an internet, receive unsolicited connections, access web-connected functionality, and so on. Consequently, the broad access given to these applications may now present a significant risk to the user's computing device as well as to devices that are accessible to the computing device.
Per process network capability techniques are described. In one or more implementations, a capabilities model is utilized to ensure that applications have access to developer-defined network resources and cannot access other network resources that are not defined by the developer. The capabilities model may therefore prevent exploited applications from taking advantage of network resources that are not normally utilized by the application. In this way, the model may be used to ensure that compromised applications are limited to access the defined network capabilities and limit exploitation of network capabilities that were defined by the developer as inaccessible to the application. A variety of other examples are also contemplated, further discussion of which may be found in relation to the following sections.
In the following discussion, an example environment is first described that may employ the network capability techniques described herein. Example procedures are then described which may be performed in the example environment as well as other environments. Consequently, performance of the example procedures is not limited to the example environment and the example environment is not limited to performance of the example procedures.
The computing device 102 also includes an operating system 108 that is illustrated as being executed on the processing system 104 and is storable in memory 106. The computing device 102 further includes applications 110 that are illustrated as being stored in the memory 106 and are also executable on the processing system 104. The operating system 108 is representative of functionality of the computing device 102 that may abstract underlying hardware and software resources for use by the applications 110. For example, the operating system 108 may abstract functionality of how data is displayed on the display device 112 without the applications 110 having to “know” how this display is achieved. A variety of other examples are also contemplated, such as to abstract the processing system 104 and memory 106 resources of the computing device 102, network resources, and so on.
The computing device 102 is also illustrated as including a process manager module 114. The process manager module 114 is representative of functionality of the computing device 102 to manage access of executable code to capabilities of the computing device 102. For example, the computing device 102 may receive a package 116 having executable code 118 (e.g., an application) for installation on the computing device 102. The package 116 may also include a manifest 120 generated by a developer of the executable code 118 that describes one or more capabilities 122 of the computing device 102, which may include an ability of the computing device 102 to access a network 124. Thus, this description may describe which capabilities of the computing device 102 a process formed through execution of the executable code 118 is permitted and/or not permitted to access. For example, the manifest 120 may list a capability that is to be made accessible to the process and/or may list a capability that is to be made inaccessible to the process. In this way, a developer of the executable code 118 may specify capabilities in the manifest 120 to help reduce and even eliminate an ability of a malicious party to compromise the application to access capabilities that are not typically accessed by the executable code 118.
The process manager module 114, for instance, may leverage firewall functionality as part of the module itself or in communication with another module, e.g., a dedicated firewall module. This functionality may be used to permit or deny access to the network 124 as specified by the manifest of the package 116. Thus, the executable code 118 may function as contemplated by a developer of the code and thereby help reduce an opportunity to compromise the code by malicious parties.
The package 116 may be received for installation on the computing device 102 from a variety of different sources. For example, an application service 126 (e.g., an application store) may be access by the computing device 102 via the network 124, e.g., the Internet. Upon purchase, the package 116 that includes the executable code 118 and the manifest 120 may be communicated via the network 124 for installation on the computing device 102. In another example, a user may obtain computer-readable storage media (e.g., an optical disc) that contains the package 116. Further discussion of installation of the package 118 including the executable code 118 and the manifest on the computing device 102 may be found in relation to
Generally, any of the functions described herein can be implemented using software, firmware, hardware (e.g., fixed logic circuitry), or a combination of these implementations. The terms “module,” “functionality,” and “logic” as used herein generally represent software, firmware, hardware, or a combination thereof. In the case of a software implementation, the module, functionality, or logic represents program code that performs specified tasks when executed on a processor (e.g., CPU or CPUs). The program code can be stored in one or more computer readable memory devices. The features of the techniques described below are platform-independent, meaning that the techniques may be implemented on a variety of commercial computing platforms having a variety of processors.
For example, the computing device 102 may also include an entity (e.g., software) that causes hardware of the computing device 102 to perform operations, e.g., processors, functional blocks, and so on. For example, the computing device 102 may include a computer-readable medium that may be configured to maintain instructions that cause the computing device, and more particularly hardware of the computing device 102 to perform operations. Thus, the instructions function to configure the hardware to perform the operations and in this way result in transformation of the hardware to perform functions. The instructions may be provided by the computer-readable medium to the computing device 102 through a variety of different configurations.
One such configuration of a computer-readable medium is signal bearing medium and thus is configured to transmit the instructions (e.g., as a carrier wave) to the hardware of the computing device, such as via a network. The computer-readable medium may also be configured as a computer-readable storage medium and thus is not a signal bearing medium. Examples of a computer-readable storage medium include a random-access memory (RAM), read-only memory (ROM), an optical disc, flash memory, hard disk memory, and other memory devices that may use magnetic, optical, and other techniques to store instructions and other data.
For example, the executable code 118 may be installed for access via an applications directory 204. The capabilities 122 described in the manifest may be installed in a capabilities store 206 and associated with an identity of the package 116 and/or executable code 118 itself. In one or more implementations, the capabilities store 206 is configured to be tamper resistant (e.g., physically and/or electronically) such that malicious code cannot gain access to or modify the capabilities 122 described therein, such as to prevent access by the processes themselves.
During process creation 208 that results from execution of the executable code 118, an identifier is obtained that is usable by the process manager module 114 to locate capabilities described for the process 210, e.g., an identifier of the package 116, the executable code 118, and so on as described above. These capabilities 122 are then used as part of the process creation 208 to form a token 212 that may be used by the process manager module 114 to control access to the capabilities of the computing device 102.
The token 212, for instance, may include one or more security identifiers 214 that correspond to one or more of the capabilities 122 described in the capabilities store 206 for that process. In other words, the token 212 is populated with the relevant capabilities associated with the package 116, as security identifiers 214. Thus, the process manager module 114 may utilize the token 212 when access to a capability is requested by a process 210 to determine whether that access is to be permitted for that process 210.
In one or more implementations, the token 212 cannot be manipulated by the process 210. The token 212 may also allow the process 210 to participate in access verification checks for a capability (e.g., ACLs for a resource). Further, the process manager module 114 may also implement techniques that involve decisions based on the presence of a capability (or combination of capabilities) before granting access to a capability. Because the process 210 does not have direct access to the token, the process manager module 114 may function as a broker that leverages the immutability of the token 212 to ensure that appropriate access is granted to the process 210.
A variety of different capabilities 122 may be referenced by the security identifiers 214. Additionally, the security identifiers 214 may reference these capabilities in a variety of ways. For example, a developer may create executable code 118 (e.g., an application) and a manifest 120 that contains a set of declared capabilities for each of the processes in a package 116 that are implemented through execution of the executable code 118. This package 116 may also have a “strong identity,” in which network capabilities are registered with an operating system 108 using this identity when the package 116 is installed.
Therefore, when the process 210 is subsequently launched (and includes the package identity as a process creation parameter), the token 212 may be populated with a process identity and network capabilities may be populated as security identifiers 214. Further, the operating system 108 may prevent the process 210 from modifying the token 212. In one or more implementations, child processes may inherit the identity and a subset of the network capabilities, in which the subset is defined by the parent.
A variety of different capabilities 122 may be specified by the manifest 120 for use in managing access of the process 210, e.g., from pre-defined network capabilities to rich firewall-type rules. For example, an “internet-client” capability may be defined to manage access to outgoing connections to the network 124 (e.g., internet) by the process 210. In another example, an “internet client/server” capability may be defined to permit both incoming and outgoing network 124 connections. This capability, for instance, may be used to permit the process to accept unsolicited connections from the Internet as well as send and receive data through a firewall. In a further example, a “PrivateNetworkClientServer” capability may be defined to permit communication to or from computing devices on a same defined network 124, e.g., a home network, work network, intranet, and so on. A variety of other examples are also contemplated, such that rich firewall rules may be created that reference capabilities that may become even more specific and richer, e.g., access to specific ports. In this way, use of the security identifiers 214 in the token 212 may permit the process manager module 114 to manage access of the process 210 to network capabilities, an example of which is described in relation to the following figure.
In one or more implementations, an application may be permitted to access a full set of capabilities that are registered in the capabilities store 206. However, it may also be possible for a process 210 to create a child process where that is not to have the full set of access rights that are available to the parent.
As previously described, a variety of different capabilities may be declared. Further, the capabilities may be combined to give the process 210 internet and intranet (e.g., private network) access, for either outbound (e.g., client) or inbound and outbound connections (e.g., client & server).
The internet capability may also allow access to HTTP proxies. For example, the process manager module 114 may actively probe the network to determine if there are proxy servers or subnets, so networking capabilities that are tied to a private network (e.g., intranet) or internet may be leveraged correctly. If an Active Directory server contains specific information on the subnet definitions, the process manager module 114 may also leverage this information to help determine the edge of the subnet. Mechanisms may also be employed in which subnets and proxies are pre-specified through administrative management tools and thus probing is not involved. Without such specification through probing and/or use of the administrative management tools, some devices could be assigned to the incorrect network type, and therefore the process manager module 114 could then incorrectly allow or deny access. Thus, the process manager module 114 may correctly manage capabilities based on this identification, e.g., whether available via an intranet or Internet.
In one or more implementations, ports that are deemed critical are blocked from unsolicited inbound access to prevent common attack vectors using the same mechanisms. These setting may also be manually configured via policy. Loopbacks (e.g., connections to same machine, using 127.0.0.1) may also be protected, thereby preventing a process 210 from “working around” the capabilities defined for that process. For example, loopback may be tied to a “PrivateNetworkClientServer” capability described above, but it should be readily apparent that in another example this may be specified as a separate capability using the model.
Thus, these techniques may be used to support a mechanism to restrict network access per-process and offer varying degrees of granularity as described. As described above, per-process networking capabilities may be tied to a strong identity for the process. This identity may also be inherited by child processes, which ensures that a process is not able to circumvent the networking capabilities that have been granted to the process by a parent process. High-fidelity networking capabilities, which have the same flexibility as firewall rules may also be supported by the process manager module 114. The networking capabilities, for instance, may be registered at installation with a firewall, and can have flexibility as can be found for a firewall rule, which may include network type, connection type, and inbound/outbound connections. Traffic direction may also be associated with network profiles as fined by a firewall.
Further, declared networking capabilities may be combined, to provide access that is a union of the different capabilities. For example, network capabilities can be combined for a process 210 to provide a combination of different network access, such as private network (e.g., intranet) access, and outbound internet access. A variety of other examples are also contemplated, further discussion of which may be found in relation to the following procedures.
Yet further, firewall rules used to enforce capabilities may be modified or enforced or tweaked dynamically at run time, e.g., by a “high integrity” system to provide capabilities that may have increased usefulness. Capabilities that are defined may be isolated and/or passed to other firewall components in the system to also further manage the application in the network correctly.
The following discussion describes per process networking capability techniques that may be implemented utilizing the previously described systems and devices. Aspects of each of the procedures may be implemented in hardware, firmware, or software, or a combination thereof. The procedures are shown as a set of blocks that specify operations performed by one or more devices and are not necessarily limited to the orders shown for performing the operations by the respective blocks. In portions of the following discussion, reference will be made to the environment 100 of
The executable code is installed on the computing device for execution (block 404). The executable code 122, for instance, may be configured as an application to be installed on the computing device for access through an applications directory, a third-party plug-in module, and so forth.
The network capabilities described for the executable code by the manifest are saved in a capabilities store on the computing device, the saved capabilities usable to form a token to manage access of one or more processes, formed through execution of the executable code, to capabilities of the computing device (block 406). The capabilities store 206, for instance, may be configured to be tamper resistant, e.g., physically and/or electronically. In this way, capabilities described therein are not accessible by unauthorized entities, are not accessible by processes that are executed on the computing device 102, and so on. Thus, the description of the capabilities may be considered “trustworthy” and therefore used to form a token that may be used to manage access by the process.
An input may then be received to initiate execution of executable code installed on the computing device (block 408). The input, for instance, may be received through user selection of a representation of the code, e.g., an icon, tile, and so on. The input may also originate from the code itself (e.g., wake at predetermined intervals), from other code executed on the computing device 102, and so on.
A token is formed having one or more security identifiers that reference network capabilities described in a manifest for the executable code (block 410). As previously described, the security identifiers 122 may enumerate capabilities that are described in the capabilities store 206. The token 212, for instance, may include an identifier that matches an identifier of the executable code 118 and/or package 116, may be passed by the executable code 118 itself when requesting access to a capabilities (e.g., the token itself and/or an identifier usable to find the token 212), and so forth. The token 212 may then be used to manage access of the process 210 to one or more network capabilities of the computing device 102, an example of which may be found in relation to the following figure.
A token 212 may then be located by the process manager module 114, e.g., using a package 116 identifier, “strong types,” and so on as previously described. The token 212 may be formed to describe access that is permitted (e.g., reference the capabilities that are permitted) and/or describe access that is not permitted, e.g., reference capabilities that are not permitted to be access by a corresponding process 210.
Access to the network capability is managed based on the determination (block 504). The process manager module 114, for instance, may receive a request from the process 210 to access a network capability, such as to use an outgoing network connection. The process manager module 114 may then examine the token 212 to determine whether this network access is permitted, such as to locate a security identifier that references the outgoing network communication. Thus, the process manager module 114 may readily determine what access is permitted and reach accordingly. As previously described, a variety of other examples are also contemplated, such as to determine which access is not permitted based on enumeration by the token 212.
Access of a process executed on the computing device to network capabilities of the network is managed based on the identification of the proxy servers or subnets and an examination of a token that is associated with the process, the token having one or more security identifiers that reference network capabilities, described in a manifest, that are permitted for use by the process (block 604). As before, the access may be managed by the process manager module 114 through use of the token that “says” what capabilities are permitted to be access by a process associated with the token. Further, the probing may be used to ensure that access to a network is consistent with this enumeration, e.g., that access accurately reflects whether a device is accessible via a subnet or the Internet, and so on. A variety of other examples are also contemplated.
In the example system 700, multiple devices are interconnected through a central computing device. The central computing device may be local to the multiple devices or may be located remotely from the multiple devices. In one embodiment, the central computing device may be a cloud of one or more server computers that are connected to the multiple devices through a network, the Internet, or other data communication link. In one embodiment, this interconnection architecture enables functionality to be delivered across multiple devices to provide a common and seamless experience to a user of the multiple devices. Each of the multiple devices may have different physical requirements and capabilities, and the central computing device uses a platform to enable the delivery of an experience to the device that is both tailored to the device and yet common to all devices. In one embodiment, a class of target devices is created and experiences are tailored to the generic class of devices. A class of devices may be defined by physical features, types of usage, or other common characteristics of the devices.
In various implementations, the computing device 102 may assume a variety of different configurations, such as for computer 702, mobile 704, and television 706 uses. Each of these configurations includes devices that may have generally different constructs and capabilities, and thus the computing device 102 may be configured according to one or more of the different device classes. For instance, the computing device 102 may be implemented as the computer 702 class of a device that includes a personal computer, desktop computer, a multi-screen computer, laptop computer, netbook, and so on.
The computing device 102 may also be implemented as the mobile 704 class of device that includes mobile devices, such as a mobile phone, portable music player, portable gaming device, a tablet computer, a multi-screen computer, and so on. The computing device 102 may also be implemented as the television 706 class of device that includes devices having or connected to generally larger screens in casual viewing environments. These devices include televisions, set-top boxes, gaming consoles, and so on. The techniques described herein may be supported by these various configurations of the computing device 102 and are not limited to the specific examples the techniques described herein.
The cloud 708 includes and/or is representative of a platform 710 for content services 712. The platform 710 abstracts underlying functionality of hardware (e.g., servers) and software resources of the cloud 708. The content services 712 may include applications and/or data that can be utilized while computer processing is executed on servers that are remote from the computing device 102. Content services 712 can be provided as a service over the Internet and/or through a subscriber network, such as a cellular or Wi-Fi network.
The platform 710 may abstract resources and functions to connect the computing device 102 with other computing devices. The platform 710 may also serve to abstract scaling of resources to provide a corresponding level of scale to encountered demand for the content services 712 that are implemented via the platform 710. Accordingly, in an interconnected device embodiment, implementation of functionality of the functionality described herein may be distributed throughout the system 700. For example, the functionality may be implemented in part on the computing device 102 as well as via the platform 710 that abstracts the functionality of the cloud 708.
Device 800 also includes communication interfaces 808 that can be implemented as any one or more of a serial and/or parallel interface, a wireless interface, any type of network interface, a modem, and as any other type of communication interface. The communication interfaces 808 provide a connection and/or communication links between device 800 and a communication network by which other electronic, computing, and communication devices communicate data with device 800.
Device 800 includes one or more processors 810 (e.g., any of microprocessors, controllers, and the like) which process various computer-executable instructions to control the operation of device 800 and to implement embodiments of the techniques described herein. Alternatively or in addition, device 800 can be implemented with any one or combination of hardware, firmware, or fixed logic circuitry that is implemented in connection with processing and control circuits which are generally identified at 812. Although not shown, device 800 can include a system bus or data transfer system that couples the various components within the device. A system bus can include any one or combination of different bus structures, such as a memory bus or memory controller, a peripheral bus, a universal serial bus, and/or a processor or local bus that utilizes any of a variety of bus architectures.
Device 800 also includes computer-readable media 814, such as one or more memory components, examples of which include random access memory (RAM), non-volatile memory (e.g., any one or more of a read-only memory (ROM), flash memory, EPROM, EEPROM, etc.), and a disk storage device. A disk storage device may be implemented as any type of magnetic or optical storage device, such as a hard disk drive, a recordable and/or rewriteable compact disc (CD), any type of a digital versatile disc (DVD), and the like. Device 800 can also include a mass storage media device 816.
Computer-readable media 814 provides data storage mechanisms to store the device data 804, as well as various device applications 818 and any other types of information and/or data related to operational aspects of device 800. For example, an operating system 820 can be maintained as a computer application with the computer-readable media 814 and executed on processors 810. The device applications 818 can include a device manager (e.g., a control application, software application, signal processing and control module, code that is native to a particular device, a hardware abstraction layer for a particular device, etc.). The device applications 818 also include any system components or modules to implement embodiments of the techniques described herein. In this example, the device applications 818 include an interface application 822 and an input/output module 824 that are shown as software modules and/or computer applications. The input/output module 824 is representative of software that is used to provide an interface with a device configured to capture inputs, such as a touchscreen, track pad, camera, microphone, and so on. Alternatively or in addition, the interface application 822 and the input/output module 824 can be implemented as hardware, software, firmware, or any combination thereof. Additionally, the input/output module 824 may be configured to support multiple input devices, such as separate devices to capture visual and audio inputs, respectively.
Device 800 also includes an audio and/or video input-output system 826 that provides audio data to an audio system 828 and/or provides video data to a display system 830. The audio system 828 and/or the display system 830 can include any devices that process, display, and/or otherwise render audio, video, and image data. Video signals and audio signals can be communicated from device 800 to an audio device and/or to a display device via an RF (radio frequency) link, S-video link, composite video link, component video link, DVI (digital video interface), analog audio connection, or other similar communication link. In an embodiment, the audio system 828 and/or the display system 830 are implemented as external components to device 800. Alternatively, the audio system 828 and/or the display system 830 are implemented as integrated components of example device 800.
Although the invention has been described in language specific to structural features and/or methodological acts, it is to be understood that the invention defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as example forms of implementing the claimed invention.
Number | Name | Date | Kind |
---|---|---|---|
5974549 | Golan | Oct 1999 | A |
6101607 | Bachand et al. | Aug 2000 | A |
6117187 | Staelin | Sep 2000 | A |
6151643 | Cheng et al. | Nov 2000 | A |
6279111 | Jensenworth et al. | Aug 2001 | B1 |
6308173 | Glasser et al. | Oct 2001 | B1 |
6378071 | Sasaki et al. | Apr 2002 | B1 |
6604209 | Grucci et al. | Aug 2003 | B1 |
6697569 | Gomez et al. | Feb 2004 | B1 |
6725452 | Te'eni et al. | Apr 2004 | B1 |
6865659 | Montemayor | Mar 2005 | B2 |
7031276 | Inoue | Apr 2006 | B2 |
7069330 | McArdle et al. | Jun 2006 | B1 |
7151832 | Fetkovich et al. | Dec 2006 | B1 |
7152243 | Bourne et al. | Dec 2006 | B2 |
7337442 | VoBa et al. | Feb 2008 | B2 |
7392383 | Basibes et al. | Jun 2008 | B2 |
7398532 | Barber et al. | Jul 2008 | B1 |
7401235 | Mowers et al. | Jul 2008 | B2 |
7472377 | Anand et al. | Dec 2008 | B2 |
7475396 | Kapoor | Jan 2009 | B2 |
7478094 | Ho et al. | Jan 2009 | B2 |
7542988 | Cook et al. | Jun 2009 | B1 |
7607131 | Oe et al. | Oct 2009 | B2 |
7650501 | Brunette, Jr. et al. | Jan 2010 | B1 |
7650627 | Stancheva et al. | Jan 2010 | B1 |
7664924 | Safa | Feb 2010 | B2 |
7698393 | Milstein et al. | Apr 2010 | B2 |
7716734 | Birrell et al. | May 2010 | B2 |
7774753 | Reilly et al. | Aug 2010 | B1 |
7779265 | Dubhashi et al. | Aug 2010 | B2 |
7925875 | McAvoy | Apr 2011 | B2 |
7934087 | Carter | Apr 2011 | B2 |
8001528 | Bernabeu-Auban et al. | Aug 2011 | B2 |
8073442 | Frank et al. | Dec 2011 | B2 |
8185889 | Kinder et al. | May 2012 | B2 |
8468608 | Hernacki et al. | Jun 2013 | B1 |
8990561 | Sheehan et al. | Mar 2015 | B2 |
20010021926 | Schneck et al. | Sep 2001 | A1 |
20020019941 | Chan et al. | Feb 2002 | A1 |
20030084134 | Pace et al. | May 2003 | A1 |
20040030926 | Clark | Feb 2004 | A1 |
20040039924 | Baldwin et al. | Feb 2004 | A1 |
20040148514 | Fee et al. | Jul 2004 | A1 |
20040199787 | Hans et al. | Oct 2004 | A1 |
20050071641 | Basibes et al. | Mar 2005 | A1 |
20050091535 | Kavalam et al. | Apr 2005 | A1 |
20050091658 | Kavalam et al. | Apr 2005 | A1 |
20050132350 | Markley et al. | Jun 2005 | A1 |
20050154738 | Thomas et al. | Jul 2005 | A1 |
20050246762 | Girouard et al. | Nov 2005 | A1 |
20050256859 | Keohane et al. | Nov 2005 | A1 |
20050273841 | Freund | Dec 2005 | A1 |
20050289348 | Joy et al. | Dec 2005 | A1 |
20060048129 | Napier et al. | Mar 2006 | A1 |
20060080546 | Brannon et al. | Apr 2006 | A1 |
20060155986 | Kleinhuis et al. | Jul 2006 | A1 |
20060174252 | Besbris et al. | Aug 2006 | A1 |
20060174334 | Perlin et al. | Aug 2006 | A1 |
20060193467 | Levin | Aug 2006 | A1 |
20060259606 | Rogers et al. | Nov 2006 | A1 |
20060259980 | Field et al. | Nov 2006 | A1 |
20070027872 | Johnson et al. | Feb 2007 | A1 |
20070083655 | Pedersen | Apr 2007 | A1 |
20070157287 | Lim | Jul 2007 | A1 |
20070157302 | Ottamalika et al. | Jul 2007 | A1 |
20070192500 | Lum | Aug 2007 | A1 |
20070208857 | Danner et al. | Sep 2007 | A1 |
20070234412 | Smith et al. | Oct 2007 | A1 |
20070239981 | Lessing | Oct 2007 | A1 |
20070240194 | Hargrave et al. | Oct 2007 | A1 |
20080066148 | Lim | Mar 2008 | A1 |
20080092133 | Mantere | Apr 2008 | A1 |
20080120707 | Ramia | May 2008 | A1 |
20080162698 | Hopen et al. | Jul 2008 | A1 |
20080201705 | Wookey | Aug 2008 | A1 |
20080244723 | Brewster et al. | Oct 2008 | A1 |
20080282354 | Wobber et al. | Nov 2008 | A1 |
20080307491 | Duri et al. | Dec 2008 | A1 |
20090022325 | Naedele | Jan 2009 | A1 |
20090100421 | Flaming et al. | Apr 2009 | A1 |
20090113528 | Ananda et al. | Apr 2009 | A1 |
20090144659 | Do | Jun 2009 | A1 |
20090170431 | Pering et al. | Jul 2009 | A1 |
20090193507 | Ibrahim | Jul 2009 | A1 |
20090222659 | Miyabayashi et al. | Sep 2009 | A1 |
20090222894 | Kenny et al. | Sep 2009 | A1 |
20090249283 | Bourdon | Oct 2009 | A1 |
20090249436 | Coles et al. | Oct 2009 | A1 |
20090307360 | Ianchici et al. | Dec 2009 | A1 |
20090307684 | Best et al. | Dec 2009 | A1 |
20090327900 | Noll et al. | Dec 2009 | A1 |
20100037216 | Carcerano et al. | Feb 2010 | A1 |
20100058320 | Milligan et al. | Mar 2010 | A1 |
20100081375 | Rosenblatt | Apr 2010 | A1 |
20100107215 | Bechtel et al. | Apr 2010 | A1 |
20100153671 | Safa | Jun 2010 | A1 |
20100174599 | Rosenblatt | Jul 2010 | A1 |
20100192211 | Bono et al. | Jul 2010 | A1 |
20100221999 | Braun et al. | Sep 2010 | A1 |
20100229165 | Normington et al. | Sep 2010 | A1 |
20100287513 | Singh et al. | Nov 2010 | A1 |
20100287547 | Korkishko et al. | Nov 2010 | A1 |
20100293383 | Coughlin et al. | Nov 2010 | A1 |
20100318997 | Li et al. | Dec 2010 | A1 |
20110066851 | Bello et al. | Mar 2011 | A1 |
20110070827 | Griffin et al. | Mar 2011 | A1 |
20110098030 | Luoma | Apr 2011 | A1 |
20110125799 | Kandasamy et al. | May 2011 | A1 |
20110231836 | Wookey | Sep 2011 | A1 |
20110252417 | Cui et al. | Oct 2011 | A1 |
20120005674 | Larimore et al. | Jan 2012 | A1 |
20120194534 | Benno et al. | Aug 2012 | A1 |
20120240236 | Wyatt et al. | Sep 2012 | A1 |
20120297288 | Mansouri | Nov 2012 | A1 |
20120303818 | Thibeault et al. | Nov 2012 | A1 |
20130019233 | Pardehpoosh et al. | Jan 2013 | A1 |
20130054734 | Bond et al. | Feb 2013 | A1 |
20130062401 | Sheehan et al. | Mar 2013 | A1 |
20130065526 | Pottier et al. | Mar 2013 | A1 |
20130067459 | Sannidhanam | Mar 2013 | A1 |
20130263262 | Forristal | Oct 2013 | A1 |
20130283377 | Das et al. | Oct 2013 | A1 |
20140173071 | Hazen | Jun 2014 | A1 |
20140344667 | Risney et al. | Nov 2014 | A1 |
Number | Date | Country |
---|---|---|
1617101 | May 2005 | CN |
1633084 | Jun 2005 | CN |
1959631 | May 2007 | CN |
101017447 | Aug 2007 | CN |
101616719 | Dec 2009 | CN |
101622624 | Jan 2010 | CN |
102129364 | Jul 2011 | CN |
102938939 | Feb 2013 | CN |
2086206 | Aug 2009 | EP |
WO-0205184 | Jan 2002 | WO |
WO-03100581 | Dec 2003 | WO |
WO-2009047473 | Apr 2009 | WO |
WO-2013039528 | Mar 2013 | WO |
Entry |
---|
“Network Policy Settings Properties”, Retrieved at <<http://technet.microsoft.com/en-us/library/cc772474%28WS.10%29.aspx>>, Retrieved Date: Jul. 25, 2011, pp. 1. |
“Securing the Process Control Network”, Retrieved at <<http://www.enterasys.com/company/literature/threat-mgmt-process-control-wp.pdf>>, Retrieved Date: Jul. 11, 2011, pp. 6. |
“International Search Report”, Mailed Date: Sep. 3, 2012, Application No. PCT/US2011/055538, Filed Date: Oct. 9, 2011, pp. 8. |
“Access Control Lists in Linux”, Retrieved at <<http://users.suse.com/˜agruen/acl/chapter/fs—acl-en.pdf>>, (Jul. 18, 2003), 13 pages. |
“Android Developers and Permissions”, Retrieved from: <http://developer.android.com/guide/topics/security/security.html> on Jul. 18, 2011, 5 pages. |
“ClickOnce Security and Deployment”, Retrieved at <<http://msdn.microsoft.com/en-us/library/t71a733d%28d=printer%29.aspx>> on Mar. 15, 2013, 4 pages. |
“Dependency Resolution Rules”, retrieved from http://nuget.codeplex.com/wikipage?title=Dependency%20Resolution on Jul. 15, 2011, 3 pages. |
“LoKast shares media between iPhones and Android phones”, retrieved from <<http://venturebeat.com/2010/07/21/lokast-shares-media-between-iphones-and-android-phones/>>, (Jul. 21, 2010), 3 pages. |
“PCT Search Report and Written Opinion”, Application No. PCT/US2011/055741, (Sep. 12, 2012), 9 pages. |
“Security for Runtime Resources: Access Control Lists”, retrieved from <http://publib.boulder.ibm.com/infocenter/wmbhelp/v6r1m0/index.jsp?topic=/com.ibm.etools.mft.doc/ap01380—.htm> on Jul. 27, 2011, 3 pages. |
“Structural Analysis”, retrieved from http://www.headwaysoftware.com/products/structure101/structrual-analysis.php#deep-structural-analysis-section on Jul. 15, 2011, 10 pages. |
“User Accounts & Admin Privelages”, Retrieved at <http://www.techno-kitten.com/Changes—to—PowerBuilder/9—New—in—Power.—..—B111—New—-—User—Accounts—and—Aipb111—new—-—user—accounts—and—a.html>, Retrieved Date: Jul. 29, 2011,, 2 pages. |
Abadi, Martin et al., “Access Control in a World of Software Diversity”, HTOS '05, available at <http://research.microsoft.com/pubs/54665/accesscontrolwithdiversity.pdf>, (Jun. 2005), 6 pages. |
Burrows, Daniel “Modelling and Resolving Software Dependencies”, retrieved from http://people.debian.org/˜dburrows/model.pdf, (Jun. 15, 2005), pp. 1-16. |
Engelsma, Jonathan R., et al., “EncounterEngine: Integrating Bluetooth User Proximity Data into Social Applications”, IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, (2008), pp. 502-507. |
Esbensen, Morten et al., “Pour Images—An Interactive System for Sharing Images”, (2010), 9 pages. |
Galindo, Jose A., et al., “Debian Packages Repositories as Software Product Line Models. Towards Automated Analysis”, retrieved from http://www.isi.us.es/˜segura/files/papers/galindo10-acota.pdf; Proceedings of the First International Workshop on Automated Configuration and Tailoring of Applications, (2010), 6 pages. |
Kortuem, Gerd et al., “Sensing and Visualizing Spatial Relations of Mobile Devicse”, UIST '05 Proceedings of the 18th Annual ACM Symposium on User Interface Software and Technology,, (Oct. 2005),10 pages. |
Lange, Thomas “FAI Guide (Fully Automatic Installation)”, retrieved from http://debian.uni-duisburg-essen.de/misc/FAI/fai-guide—2.5.3.pdf, (Dec. 5, 2005), 70 pages. |
Manzoor, Umar et al., “Silent Unattended Installation Package Manager—SUIPM”, retrieved from http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5172599; International Conference on Computational Intelligence for Modelling Control & Automation, (Dec. 10-12, 2008), pp. 55-60. |
Rekimoto, Jun et al., “Proximal Interactions: A Direct Manipulation Technique for Wireless Networking”, (Aug. 2003), 8 pages. |
Rodriguez, Jamie “Windows Phone Capabilities Security Model”, Retrieved from: <http://blogs.msdn.com/b/jaimer/archive/2010/04/30/windows-phone-capabilities-security-model.aspx> on Jul. 18, 2011,(Apr. 30, 2010), 3 pages. |
Xing, Bo et al., “Proximeter: Enabling Mobile Proximity-Based Content Sharing on Portable Devices”, IEEE International Conference on Pervasive Computing and Communications, PerCom 2009, (Mar. 2009), 3 pages. |
“Foreign Office Action”, CN Application No. 201210326881.7, Sep. 3, 2014, 13 pages. |
“Foreign Office Action”, CN Application No. 201210335798.6, Sep. 23, 2014, 9 pages. |
“Non-Final Office Action”, U.S. Appl. No. 13/230,640, Oct. 21, 2014, 15 pages. |
“Final Office Action”, U.S. Appl. No. 13/229,446, Apr. 9, 2014, 19 pages. |
“Final Office Action”, U.S. Appl. No. 13/230,640, Mar. 25, 2015, 18 pages. |
“Foreign Office Action”, CN Application No. 201210335798.6, May 5, 2015, 15 pages. |
“Foreign Office Action”, CN Application No. 201210335798.6, Sep. 23, 2014, 13 pages. |
“International Search Report and Written Opinion”, Application No. PCT/US2012/053623, Dec. 10, 2012, 9 pages. |
“Non-Final Office Action”, U.S. Appl. No. 13/229,446, Oct. 22, 2013, 16 pages. |
“Non-Final Office Action”, U.S. Appl. No. 13/229,446, Oct. 23, 2014, 17 pages. |
Abadi,“A Logical Account of NGSCB”, Retrieved from <http://research.microsoft.com/apps/pubs/default.aspx?id=54445> Apr. 19, 2014, Sep. 2004, 13 pages. |
“Authorization API”, Overview, Cloud Make Developers Zone, retrieved Jul. 9, 2012 from http://developers.cloudmade.com/projects/show/auth, 3 pages. |
“CFUUID Reference”, Retrieved from <https://developer.apple.com/library/mac/documentation/CoreFoundation/Reference/CFUUIDRef/CFUUIDRef.pdf>, Jun. 11, 2012, 16 pages. |
“Class StreamSource”, Retrieved from <http://docs.oracle.com/javase/6/docs/api/javax/xml/transform/stream/StreamSource.html> on Mar. 12, 2013, 2011, 6 pages. |
“Customizing the Content, Look and Feel of XML Data”, Retrieved from <https://docs.tibco.com/pub/hawk/4.9.0—november—2010/html/tib—hawk—http—adapter—user—guide/wwhelp/wwhimpl/common/html/wwhelp.htm#context=tib—hawk—http—adapter—user—guide&file=httpAdap.3.05.htm> on Mar. 12, 2013, Nov. 9, 2010, 3 pages. |
“Extended European Search Report”, EP Application No. 11872101.8, Apr. 9, 2015, 6 pages. |
“Extended European Search Report”, EP Application No. 11872418.6, Apr. 29, 2015, 7 pages. |
“Extended European Search Report”, EP Application No. 12830755.0, Mar. 24, 2015, 6 pages. |
“Final Office Action”, U.S. Appl. No. 13/228,695, May 31, 2013, 14 pages. |
“Final Office Action”, U.S. Appl. No. 13/228,695, Sep. 22, 2014, 12 pages. |
“Foreign Office Action”, CN Application No. 201210326881.7, May 19, 2015, 13 pages. |
“Foreign Office Action”, CN Application No. 201210331181.7, Oct. 8, 2014, 11 pages. |
“Foreign Office Action”, CN Application No. 201210335798.6, May 5, 2015, 13 pages. |
“Identifying App Installations”, Retrieved from <http://android-developers.blogspotin/2011/03/identifying-app-installations.html>, Mar. 30, 2011, 4 pages. |
“Loading HTML Content from a Stream”, Retrieved from <http://msdn.microsoft.com/en-us/library/aa752047(v=vs.85).aspx> on Mar. 12, 2013, Apr. 10, 2010, 5 pages. |
“Manifest.permission”, Android Developers, Apr. 28, 2011, 16 pages. |
“Non-Final Office Action”, U.S. Appl. No. 13/228,695, Feb. 12, 2013, 9 pages. |
“Non-Final Office Action”, U.S. Appl. No. 13/228,695, Apr. 30, 2014, 9 pages. |
“Non-Final Office Action”, U.S. Appl. No. 13/714,389, Jan. 5, 2015, 9 pages. |
“SecureUDID”, Retrieved from <http://www.secureudid.org/> on Dec. 11, 2012, 3 pages. |
Beede,“MyShield: Protecting Mobile Device Data via Security Circles”, Technical Report CU-CS-1091-12, Retrieved from <https://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1091-12.pdf> on Jul. 9, 2012, Jan. 29, 2012, 14 pages. |
Bergemann,“UDID Replacement APIs in iOS 6”, Sep. 2012, 4 pages. |
Cutler,“Amid Privacy Concerns, Apple Has Started Rejecting Apps That Access UDIDs”, TechCrunch, Mar. 2012, 3 pages. |
Egele,“PiOS: Detecting Privacy Leaks in iOS Applications”, In 18th Annual Network and Distributed System Security Symposium, Retrieved from <https://www.seclab.tuwien.ac.at/papers/egele-ndss11.pdf>, Feb. 2011, 15 pages. |
Eno,“How to find serial number of Android device?”, Retrieved from <http://stackoverflow.com/questions/2322234/how-to-find-serial-number-of-android-device>, Feb. 23, 2012, 6 pages. |
Smith,“iPhone Applications & Privacy Issues: An Analysis of Application Transmission of iPhone”, Retrieved from <http://www.kompatscher.biz/phocadownload/iPhone-Applications-Privacy-Issues.pdf>, Oct. 1, 2010, 19 pages. |
Steinberg,“A Web Middleware Architecture for Dynamic Customization of Web Content for Wireless Clients”, Proceedings of the 11th International Conference on World Wide Web, Available at <http://www2002.org/CDROM/refereed/483/>, May 7, 2002, 21 pages. |
Number | Date | Country | |
---|---|---|---|
20130061309 A1 | Mar 2013 | US |