Assessing application authenticity and performing an action in response to an evaluation result

作者: Timothy Strazzere , Matthew John Joseph LaMantia , Daniel Lee Evans , Emil Barker Ong , Brian James Buck

DOI:

关键词: Computer securityAction (philosophy)EngineeringEvaluation resultMobile device

摘要: Authenticity of a new application being installed on mobile device is evaluated to provide result. The evaluation uses plurality inputs. In response the result, an action performed (e.g., itself and/or server performing or assisting with evaluation). For example, evaluating may be done for that user desires install from marketplace. another sending notification device, and includes assessment authenticity application.

参考文章(521)
Oleg Makhotin, Igor Karpenko, Erick Wong, John Sheets, Glenn Powell, Kiushan Pirzadeh, Frederick Liu, Methods and systems for provisioning mobile devices with payment credentials ,(2014)
Feiyun Wang, Walter Wong, Bing Zhang, Zengxin Yu, Huan Zhu, Peng Lan, Jiang-Lilian Li, Lei Yang, Zhongxiong Jiang, Bing Dai, Remote control of a mobile device ,(2006)
Michael Chin-Hwan Pak, Jaehoon Jung, Ilwoong Jeong, Daeyoung Kim, Method and apparatus for application management in user device ,(2013)