Patent handed in by a renown company for safe installation of apps

As per the US Patent and Trademark office, an application for new patent indicates that a famous technology company has been making efforts to make the installation of software safer on the devices. The structure of this disclosure shows systems and methods to install software on devices like a mobile. In one particular embodiment, it shows an execution by the device to install the software safely.

To make the installation safe, the installer gets more safe containers for software and gets the same installed only in such containers. With regard to some embodiments, these installers find out the identifiers for the installers. The software that should be installed is not aware of these identifiers. The connection between the container and the application is maintained by the installation framework. The remaining instruments and methods are also defined.

The following paragraphs contain the reason for the famous tech company taking such a measure. There is an increasing requirement for security of software in devices such as mobile. Devices such as mobile have turned out to be more open. To quote an example, the mobile devices permit installation of latest applications so that the functionality is more. Just like personal computers, the risk of security like malware increases in the devices.

Many newer attacks of security target the mobile devices. Fraudulent activities are seen more on the mobile platform than on personal computers. The companies should be worried about such risks and take necessary actions to prevent them. Any company which allows its employees to get the devices to the work spot run more risk.

In order to handle such risks, the platforms of mobile devices have started getting in more safety measures. The platform of these mobile devices secure itself by permitting software according to the code signing. The decision of the access control to permit privileges of software processes is based on signing of code, approval of explicit user, or combining both.

But the cost involved in getting signatures or catering to the quality requirements strictly prevents many companies from taking part or helping in application development. When particular software does not carry the authorized signature, the device can permit the user to decide if the software should get the privileges.

It will be very tiresome to design the interaction of the user without affecting the security and usability. Moreover, when users get permission to permit particular privileges to software, there is not enough information to understand the consequences of such an action.