`
`(12) INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT)~
`
`(19) World Intellectual Property
`Organization
`International Bureau
`
`(43) International Publication Date
`28 May 2015 (28.05.2015)
`
`~~
`
`ANY
`
`WIPO! PCT
`
`(51)
`
`International Patent Classification:
`HO4W 8/18 (2009.01)
`H04W 12/08 (2009.01)
`HO4W 12/06 (2009.01)
`HO4AW 4/26 (2009.01)
`
`(8L
`
`(21)
`
`International Application Number:
`
`PCT/CA20 14/05 1109
`
`International Filing Date:
`20 November 2014 (20.1 1.2014)
`
`Filing Language:
`
`Publication Language:
`Priority Data:
`61/907,082
`21 November 2013 (21.11.2013)
`
`English
`
`English
`
`(84)
`
`US
`
`(22)
`
`(25)
`
`(26)
`
`(39)
`
`(71)
`
`(72)
`
`Applicant: GRAPHITE SOFTWARE CORPORATION
`[CA/CA]; 555 Legget Drive, Suite 740, Ottawa, Ontario
`K2K 2X3 (CA).
`
`James; 3590 Torwood
`Inventors: MAIN, Alexander
`Drive, Ottawa, Ontario KOA 1T0O (CA). VANDERGEEST,
`Ron; 221 Sunnyside Avenue, Ottawa, Ontario K1S OR4
`(CA). LITVA, Paul; 118 Marsh Sparrow Private, Ottawa,
`Ontario K2K 3P3 (CA).
`
`(74)
`
`Jason et al; Borden
`Agents: MUELLER-NEUHAUS,
`Ladner Gervais LLP, World Exchange Plaza, 100 Queen
`Street, Suite 1300, Ottawa, Ontario KTP 119 (CA).
`
`(10) International Publication Number
`WO 2015/074150 Al
`
`Designated States (unless otherwise indicated, for every
`kind o national protection available): AE, AG, AL, AM,
`AO, AT, AU, AZ, BA, BB, BG, BH, BN, BR, BW, BY,
`BZ, CA, CH, CL, CN, CO, CR, CU, CZ, DE, DK, DM,
`DO, DZ, EC, EE, EG, ES, FI, GB, GD, GE, GH, GM, GT,
`HN, HR, HU,ID, IL, IN, IR, IS, JP, KE, KG, KN, KP, KR,
`KZ, LA, LC, LK, LR, LS, LU, LY, MA, MD, ME, MG,
`MK, MN, MW, Mx, MY, MZ, NA, NG, NI, NO, NZ, OM,
`PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SA, SC,
`SD, SE, SG, SK, SL, SM, ST, SV, SY, TH, TJ, TM, TN,
`TR, TT, TZ, UA, UG, US, UZ, VC, VN, ZA, ZM, ZW.
`
`Designated States (unless otherwise indicated, for every
`kind od regional protection available): ARIPO (BW, GH,
`GM, KE, LR, LS, MW, MZ, NA, RW, SD, SL, ST, SZ,
`TZ, UG, ZM, ZW), Eurasian (AM, AZ, BY, KG, KZ, RU,
`TJ, TM), European (AL, AT, BE, BG, CH, CY, CZ, DE,
`DK, EE, ES, FI, FR, GB, GR, HR, HU,IE, IS, IT, LT, LU,
`LV, MC, MK, MT, NL, NO, PL, PT, RO, RS, SE, SI, SK,
`SM, TR), OAPI (BF, BJ, CF, CG, CI, CM, GA, GN, GQ,
`GW, KM, ML, MR, NE, SN, TD, TG).
`
`Declarations under Rule 4.17:
`
`d inventorship (Rule 4.17(iv))
`Published:
`
`with international search report (Art. 21(3))
`
`(54) Titles MANAGED DOMAINS FOR REMOTE CONTENT AND CONFIGURATION CONTROL ON MOBILE INFORMA-
`TION DEVICES
`
`ACO -—
`
`Domain Management
`Service
`
`:
`
`Fy
`
`430
`
`435
`
`Subscribing
`Mobiie Device
`Iniftate add
`managed domain
`
`
` “425
`
` Launch demain
`Validate request
`
`Determine domain
`
`Sendrequestto
`configuration
`add managed
`domain
`
`Send damain
`
`
`IT von
`
`(57) Abstract: A technique is disclosed for remotely managing isolated domains on mobile devices. A request is received from the
`mobile device to instantiate a managed domain. A managed domain configuration is determined and comprises a security policy con -
`trolling access to content of the managed domain of the subscribing mobile device, a content specification identifying the content to
`be downloaded by the subscribing mobile device into the managed domain, and a content configuration identifying a configuration
`of the content on the subscribing mobile device. The managed domain configuration is sent to the subscribing mobile device to in -
`stantiate a secure, managed domain whose policy, content and content configuration is remotely controlled. The technique is useful
`for advertising and brand promotion on mobile deviccs as it simultancously cnables detailed control over the presentation of content
`by a curator while ensuring privacy and security protection of the other apps, accounts and data on the mobile device.
`
`
`
`
`
`wo2015/7415A1|IMTIMNMNAILIATATAA
`
`
`Receive domain
`conf.guration
`
` Switch to
`445°|menaged domain
`
`
`
`
`Provision domain
`according to
`demain
`configuration
`
`FIGURE 4
`
`
`
`WO 2015/074150
`
`PCT/CA2014/051109
`
`MANAGED DOMAINS FOR REMOTE CONTENT AMD CONFIGURATION
`
`CONTROL_ON MOBILE INFORMATION DEVICES
`
`FIELD
`
`[0001]
`
`The present disclosure relates to advertising, brand promotion, and
`
`trusted content discovery and distribution on mobile information devices.
`
`BACKGROUND
`
`[0002]
`
`Online advertising and marketing currently employs
`
`a number
`
`of
`
`10
`
`different methods in connection with mobile and fixed electronic information devices.
`
`For example, web search engines such as Google™ , Yahoo!™, and Bing™ support
`
`ad placement based on search string key word searches as well as contextual
`
`
`
`advertisements. Web pages and emails may include banner ads, paid_links,
`
`advertiser sponsorship content,
`
`links to social media websites, and the like. Social
`
`15
`
`media websites such as Facebook™ and Linkedin™ are commonly used for brand
`
`and product promotion.
`
`[0003]
`
`One challenge faced by advertisers in general
`
`is
`
`the overwhelming
`
`volume of advertising messages and media that compete for consumer attention.
`
`Consumer attention is a scarce resource and attracting consumer attention and
`
`20
`
`disseminating
`
`information to consumers
`
`is a fundamental
`
`challenge faced by
`
`advertisers generally.
`
`In online advertising,
`
`this has spawned the use of rich media
`
`advertising formats such asfloating ads, expandable ads, video ads,
`
`interactive ads,
`
`expandable banner ads, and so forth, to capture the interest of consumers.
`
`[0004]
`
`A relatively new segment of online advertising is mobile advertising.
`
`25
`
`The increased capabilities (for example, high resolution displays, touch screens, app
`
`support, and so forth), high adoption rates, and large installed base of smartphones,
`
`tablets,
`
`and other mobile devices have resulted in
`
`the rapid growth of mobile
`
`advertising. For example,
`
`spending on mobile advertising increased 83% from
`
`US$5.3 billion in 201 1
`
`to $8.9 billion in 2012: see IAB Global Mobile Advertising
`
`30
`
`Revenue Report, http:/Avww.iab.net/globalmobile. Mobile advertising has typically
`
`-1-
`
`
`
`WO 2015/074150
`
`PCT/CA2014/051109
`
`taken the form of display ads, text messaging ads, paid search ads, mobile apps, and
`
`banners within mobile apps.
`
`[0005]
`
`In this connection,
`
`the model of online advertising and marketing is
`
`changing with respect to mobile device usage. The number of mobile apps is growing
`
`rapidly (for example,
`
`there are currently over
`
`1 million apps available on Google
`
`Play™,
`
`the largest app store for Android devices) and consumers already spend
`
`much more time using mobile apps than they spend browsing the web via mobile
`
`browsers. Mobile apps have become or are quickly becoming the principal means for
`
`consumers
`
`to find, discover, package,
`
`and present
`
`information,
`
`services,
`
`and
`
`10
`
`experiences on mobile devices.
`
`[0006]
`
`In keeping with this trend, companies are increasingly leveraging apps
`
`for mobile advertising and marketing. For example,
`
`in most developed nations,
`
`consumers are more likely to receive mobile advertising via apps than via a mobile
`
`browser. Additionally companies may develop and distribute multiple apps for the
`
`15
`
`purpose of mobile advertising and marketing,
`
`and mobile advertising
`
`is also
`
`distributed to consumers via banner ads within apps, such as games, video apps, or
`
`social networking apps,
`
`such as those developed by Facebook™. LinkedIn™,
`
`Instagram™ , TumbIr™, Twitter™, and YouTube™. Each social network app hasits
`
`own user interfaces which have been optimized for the particular information being
`
`20
`
`displayed (e.g. short messages, pictures, videos, etc.).
`
`[0007] While advertisers and companies that provide apps to consumers for
`
`the
`
`purposes of mobile advertising and marketing often promote the apps on websites,
`
`consumers are more likely to use an app, such as Google Play™,
`
`to discover and
`
`download apps on mobile devices. With millions of mobile apps available on various
`
`25
`
`app stores,
`
`it
`
`is difficult for consumers to discover apps and to recognize the apps
`
`that are authentic (meaning they were developed and distributed by the corporation
`
`of
`
`interest to the consumer rather than some potentially illegitimate third party). A
`
`number of app recommendation and aggregation services have emerged that
`
`attempt to filter, rank and recommend apps to consumers, but these are often based
`
`30
`
`either on user supplied ratings, which are sparse or oversimplified recommendations
`
`-2-
`
`
`
`WO 2015/074150
`
`PCT/CA2014/051109
`
`based on user profiles and previously downloaded apps. Similar
`
`issues exist
`
`in
`
`connection with social media apps: that
`
`is the problem of finding desirable brands,
`
`channels, or feeds, for example. Another approach taken by some original equipment
`
`manufacturers to overcome the app discovery problem is to provide pre-loaded apps
`
`or "bloatware".
`
`[0008]
`
`In addition to the above challenges facing advertisers is the increasing
`
`consumer concern and desire for privacy of personal
`
`information. Until
`
`recently,
`
`online advertising was typically viewed by consumers via web browsers on personal
`
`computers or laptops. Participants in the online advertising industry have been able
`
`10
`
`to collect and store a wealth of personal information about such consumers including,
`
`for example,
`
`Internet Protocol
`
`(IP) addresses, web sites visited,
`
`search words
`
`entered,
`
`and so forth, and use this
`
`information for
`
`the purposes
`
`of
`
`targeted
`
`advertising. Such information may also be sold to another advertiser.
`
`[0009]
`
`In
`
`response to the increasing concern of consumers over personal
`
`15
`
`privacy, some national governments have implemented privacy legislation, and some
`
`web browsers provide mechanisms to control
`
`the ‘leakage’ of personal
`
`information
`
`{e.g. private browsing modes). Moreover, efforts have been made to improve the
`
`transparency of how personal
`
`information is collected and used by corporations
`
`engaged in online advertising (e.g. website privacy policies).
`
`20
`
`[001 0]
`
`As such, personal privacy is also a pressing issue in connection with
`
`the use of personal electronic devices such as laptops, smartphones, personal digital
`
`assistants (PDA's), and the like. Concerns regarding consumer privacy are especially
`
`acute with
`
`respect
`
`to mobile devices because, as compared to a workplace
`
`workstation, or even a home PC, for example, users tend to store large amounts of
`
`25
`
`personal
`
`information
`
`on their mobile devices, mobile devices
`
`are constantly
`
`connected and mobile devices tend to be with consumers for the majority of their
`
`waking hours. No other device is more personal and linked to an individual
`
`than a
`
`personal mobile device. While users of such devices generally desire unimpeded and
`
`effortless access to online content,
`
`it
`
`is becoming increasingly desirable to control
`
`30
`
`and/or
`
`limit
`
`the collection of personal
`
`information
`
`in
`
`the process. While there
`
`-3-
`
`
`
`WO 2015/074150
`
`PCT/CA2014/051109
`
`presently exists means to preventor limit the collection of personal information while
`
`accessing online content,
`
`they typically involve some interference with ready and
`
`effortless access to the online content, and are thus undesirable.
`
`[0011]
`
`Moreover,
`
`the increase in mobile advertising on mobile devices raises
`
`additional
`
`issues resulting from technological differences from online advertising on
`
`personal computers. For example.
`
`= personal computers personal
`
`information is
`
`typically better segregated than it
`
`is on mobile devices and internet browsers have
`
`features that address some privacy issues. Browsers typically operate in a security
`
`‘sandbox’ which limits the access of the browser to system resources and/or files
`
`10
`
`which may contain personal
`
`information on the persona! computer.
`
`In a browser
`
`environment, for a web page to obtain additional permissions generally requires the
`
`installation of
`
`‘plug-ins’ which then can have lower-level access to the operating
`
`system services than the sandbox. One of the issues with such plug-ins is that they
`
`can be very invasive and change the configuration of your browser and/or the
`
`15
`
`underlying operating system itself (e.g. change the default media player or search
`
`engine). As a result, users have become reluctant to download and install plug-ins.
`
`[0012]
`
`Mobile operating systems have simplified app development (compared
`
`to the PC environment), by providing standardized operating system services for
`
`apps to access contact
`
`information, device owner information, account
`
`information
`
`20
`
`(e.g. email account),
`
`location, e-mails, messaging,
`
`telephony services and payment
`
`services (e.g. various payment "wallets"). These services may also be accessed by
`
`apps used for mobile advertising and marketing. This further exacerbates user
`
`privacy concerns on mobile devices.
`
`[0013]
`
`In order to address concerns with respect to information privacy and
`
`25
`
`security,
`
`some operating systems,
`
`such as Android™, provide a permissions
`
`framework (or discretionary access control) whereby a consumer must grant
`
`the
`
`permissions requested by an app prior to installation (e.g. Internet access, access to
`
`contacts, global positioning system (GPS) location data, etc.). The permissions are
`
`not granular, however -
`
`for example,
`
`the user must either accept
`
`the requested
`
`30
`
`permissions or refrain from installing the app - and many mobile device users do not
`-4-
`
`
`
`WO 2015/074150
`
`PCT/CA2014/051109
`
`understand the
`
`implications
`
`of granting such permissions or combinations
`
`of
`
`permissions to a mobile app.
`
`[0014]
`
`The permissions requested by apps may also be leveraged by in-app
`
`ad libraries that are incorporated into many free apps as a means for the developer to
`
`monetize their app. Certain in-app ad libraries have been found invasively to collect
`
`personal
`
`information such as a user's call
`
`logs, account
`
`information, and phone
`
`number: see, e.g. M. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi., "Analysis of
`
`Mobile In-App Advertisements", Proceedings of the 5th ACM Conference on Security
`
`and Privacy in Wireless and Mobile Networks, WiSec 12, 2012. Also see:
`
`10
`
`http:/Awww.symantecxom/content/en/us/enterprise/media/security_response/whitepa
`
`pers/madware_and_malware_analysis.pcf.
`
`[0015]
`
`Compounding these concerns associated with personal
`
`information
`
`privacy are general issues with app security. Developing applications that cannot be
`
`exploited by malware or hackers (secure applications) is a challenging task even for
`
`15
`
`experienced application security experts. Mobile app development
`
`is a relatively new
`
`field and there is a shortage of skilled programmers and mobile application security
`
`experts. The increasing use of apps for mobile marketing purposes combined with
`
`the large increase in mobile malware (including substantially on the Android™
`
`platform), make it more likely that apps developed by (or for) an advertiser or
`
`20
`
`company may contain vulnerabilities
`
`that can be leveraged by another app or
`
`malware to obtain private information; this may then affect consumer confidence in
`
`the company.
`
`[0016]
`
`Nevertheless,
`
`a_
`
`significant
`
`proportion
`
`of consumers
`
`tend to be
`
`accepting of advertising if
`
`it
`
`is engaging,
`
`low cost and if
`
`it originates from a trusted
`
`25
`
`brand, and are further content
`
`to provide personal
`
`information in order to receive
`
`custom advertising which matchestheir interests.
`
`[0017]
`
`A yet further issue with current methods concerns the overcrowding of
`
`mobile device homescreens.
`
`It
`
`is generally appreciated that
`
`there is value to a
`
`company in having content related to the company, such as an app, present on the
`
`30
`
`homescreen of a mobile device given that a user's attention is most often directed to
`-5-
`
`
`
`WO 2015/074150
`
`PCT/CA2014/051109
`
`the homescreen.
`
`In practice, therefore, app developers and brand managers seek to
`
`have their content reside on device homescreens. Given the limited space on device
`
`homescreens (typically there is room for about 20 icons), however, overcrowding and
`
`message dilution is a problem. Some companies have attempted to overcome this
`
`home screen crowding by developing custom launchers that control
`
`the mobile
`
`device homescreen (e.g. equivalent to the desktop on a personal computer) including
`
`the placement of apps on the homescreen. Such efforts (e.g. Facebook™ Home™)
`
`have failed due to consumer concerns over privacy {e.g. the launcher can be used to
`
`gather information on which apps the consumer uses and how often they use them}
`
`10
`
`and the invasiveness of such efforts.
`
`[0018]
`
`There is
`
`thus an ongoing and pressing need for
`
`techniques which
`
`enable the effective provision of desired advertising, marketing, and other selected
`
`content
`
`to personal mobile devices, while minimizing security risks and providing
`
`maximal user control over the disclosure of private information that may be stored on
`
`15
`
`the device.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0019]
`
`Embodiments of the present disclosure will now be described, by way
`
`of example only, with reference to the attached drawings,
`
`asfollows.
`
`20
`
`[0020]
`
`FIG.
`
`1
`
`is a schematic diagram of an operating system configured to
`
`provide secure,
`
`isolated domains.
`
`[0021]
`
`FIG. 2 is a schematic diagram of an alternative operating system
`
`configured to provide secure,
`
`isolated domains using application containers.
`
`[0022]
`
`FIG. 3 is a schematic diagram of a system for providing domains
`
`25
`
`managed by a third party on subscribing mobile devices.
`
`[0023]
`
`FIG. 4 is a flowchart
`
`illustrating a method of adding a domain managed
`
`by a third party on a subscribing mobile device.
`
`[0024]
`
`FIG. 5 is a schematic diagram showing user interfaces of a subscribing
`
`mobile device for adding a domain managed by athird party on a subscribing mobile
`
`30
`
`device.
`
`-6-
`
`
`
`WO 2015/074150
`
`PCT/CA2014/051109
`
`[0025]
`
`FIG. 6 is a flowchart
`
`illustrating a method of creating a managed
`
`domain policy including content and configuration.
`
`[0026]
`
`FIG. 7 is a flowchart
`
`illustrating a method of updating a managed
`
`domain policy with real-time information.
`
`[0027]
`
`FIG.
`
`8 is a flowchart
`
`illustrating
`
`a method of
`
`selecting
`
`access
`
`permissions of a managed domain ona subscribing mobile device.
`
`[0028]
`
`FIG. 9 is a flowchart
`
`illustrating a method of updating a managed
`
`domain on a subscribing mobile device.
`
`10
`
`DETAILED DESCRIPTION
`
`[0029]
`
`The inventive embodiments overcome the defects or disadvantages of
`
`conventional means of mobile advertising and marketing described above, provide
`
`further abilities or advantages, or provide alternatives to conventional means, by
`
`enabling the creation of secure,
`
`isolated domains on mobile devices, and by enabling
`
`15
`
`the provisioning and maintenance of
`
`the content of such isolated domains by an
`
`external
`
`third party. A user of
`
`the mobile device containing such an externally
`
`managed domain can be confident that any content added to the domain does not
`
`compromise the security or privacy of personal or other data that may exist outside of
`
`the externally managed domain on the device, and is thus comfortable with ceding
`
`20
`
`control over the content within that externally managed domain to a third party.
`
`In
`
`turn, by having such full or maximal content control over the externally managed
`
`domain, the third party is able to tailor the user experience of the content as precisely
`
`as desired,
`
`that
`
`is the content
`
`is presented to user in a manner which follows as
`
`closely as possible the intention of the third party.
`
`25
`
`[0030]
`
`[0031]
`
`Overview
`
`Techniques for providing multiple isolated domains on mobile devices
`
`are described in World
`
`Intellectual Property Organization
`
`International Patent
`
`Application Number PCT/CA20 14/050761 and United States Patent and Trademark
`
`Office application number 61/864,899 (the “domain isolation applications”), which are
`
`30
`
`incorporated herein by reference in their entireties. These techniques enable the
`
`-7y-
`
`
`
`WO 2015/074150
`
`PCT/CA2014/051109
`
`creation of multiple secure,
`
`isolated domains on a mobile device wherein user
`
`processes
`
`run on the device within associated domains, and access by the
`
`processes to resources on the device (e.g. data, applications, services) is segregated
`
`by domain and controlled by a security policy associated with the domain. Control
`
`over the security policy, content, and content configuration of a particular domain can
`
`be exercised substantially or entirely by an external
`
`third party agent, such as a
`
`remote server, without compromising the security or information privacy of the other
`
`domains and the personal information that may reside in those other domains on the
`
`device.
`
`10
`
`[0032]
`
`By using
`
`the
`
`techniques described
`
`above,
`
`access
`
`to personal
`
`information stored on the mobile device in a first isolated domain by apps running ina
`
`second isolated domain can bereliably prevented.
`
`In view of this ability, a user of the
`
`device can confidently cede control over the security policy and content of
`
`the
`
`second domain to an external third party agent such as a remote server. Moreover,
`
`15
`
`given the reliable isolation of the second domain from other domains on the mobile
`
`device, the user can confidently grant control over content which is unrestricted or
`
`minimally restricted, and thus enables the third party maximum control over the
`
`content and presentation of content in the second domain.
`
`In addition, the user can
`
`readily delete the second domain if
`
`it becomes desirable to do so, without
`
`leaving
`
`20
`
`any artifacts on the device; this is in contrast to current techniques, such as browser
`
`plug-ins, for example, which often reconfigure the personal computer, and thus leave
`
`artifacts even after deletion.
`
`[0033]
`
`In such conditions,
`
`the second domain may be termed an ‘externally
`
`managed domain’. Similarly, the external agent may be termed the ‘external domain
`
`25
`
`manager’ or, where the functions of the external domain manager are performed by a
`
`server or other device, an ‘external managing server’ or ‘external managing device’,
`
`respectively. Since the content of the externally managed domain is selected by the
`
`external domain manager, who thus functions as a curator of
`
`the content,
`
`the
`
`externally managed domain may also be termed a ‘curated domain’. Where the
`
`30
`
`content is selected on the basis of a company or organization brand, for example, to
`-8-
`
`
`
`WO 2015/074150
`
`PCT/CA2014/051109
`
`present information and/or apps relevant to a brand and the advertisement of goods
`
`and services associated with the brand, then the externally managed domain may be
`
`termed a ‘branded domain’, and the function of external domain manager may be
`
`performed by a ‘brand manager’.
`
`[0034]
`
`By using secure,
`
`isolated domains in
`
`this way, an external domain
`
`manager is provided maximum ability to tailor, update, and in general control a user's
`
`experience with respect to content provided by the external domain manager within
`
`the externally managed domain.
`
`[0035]
`
`For example, a mobile device user may be interested in a particular
`
`10
`
`topic, such as Formula 1™ car racing. Currently,
`
`the user can download Formula 1
`
`apps and information feeds, but
`
`this requires the user to engage in a discovery
`
`process to find the official version of the app within the millions of available apps,
`
`navigate to an official Formula 1 Facebook™ page, for example, or find and follow
`
`the Formula 1 Twitter™ feed. By using isolated domains, selected content such as
`
`15
`
`apps, videos,
`
`information feeds, pictures can be aggregated, distributed and made to
`
`reside in an externally managed domain. The user can select a desired content topic
`
`based on a brand or other topic of interest (e.g. Formula 1 racing, an NFL™ team, a
`
`particular celebrity, etc.) from a web site, bill board, or other media, and all of the
`
`pertinent content including apps,
`
`information feeds such as social networking or news
`
`20
`
`feeds,
`
`and other content associated with the topic would be downloaded or
`
`streamed into an externally managed domain on the mobile device. Common social
`
`networking apps can be pre-configured by the external domain manager based on
`
`the topic (e.g. a Formula 1™ Facebook™ page, Twitter™ feed, YouTube™ channel,
`
`or the like), enabling the device owner to use the best and most relevant content. The
`
`25
`
`external domain manager can also aggregate the apps for each Formula 1™ team,
`
`manufacturers, photos, wallpapers,
`
`theme songs, etc. When the user navigates to
`
`the externally managed domain,
`
`the notifications and alerts would pertain to the
`
`specific theme or topic or event, etc. notifications or real simple syndication (RSS)
`
`feeds could be used to promote certain events, such as live streaming, or other
`
`30
`
`offers, such as discounted items or sales.
`
`-9-
`
`
`
`WO 2015/074150
`
`PCT/CA2014/051109
`
`[0036]
`
`Thus, ‘content’, as used herein with respect to managed domains, may
`
`be understood as designating a collection
`
`of
`
`resources
`
`such as data files,
`
`applications, and services, and may include,
`
`for example, pictures, videos,
`
`icons,
`
`apps,
`
`links to information sources,
`
`links for recommended apps and the like.
`
`In other
`
`words,
`
`‘content’ may be understood generally as including ail of the types of user
`
`resources ordinarily contained on a mobile information device. As used herein,
`
`‘content
`
`configuration’ may be understood as
`
`including
`
`any aspects
`
`of
`
`the
`
`configuration of the content which influence or affect a user's interaction with the
`
`content, and may include configuration aspects related to presentation of the content
`
`10
`
`{such as an arrangement of icons on the homepage or other screen, a wallpaper, a
`
`background , a lock screen, a font, a user interface behavior, the launcher app and so
`
`forth} or aspects relating to the function of the content (Such as a default webpage of
`
`a browser app, a default Facebook™ page, Twitter™ feed, YouTube™ channel, or
`
`the like).
`
`In general,
`
`‘content configuration’ may be understood to include any
`
`15
`
`aspects of the configuration of content on a mobile information device which a user,
`
`outside of a managed domain, can typically modify.
`
`[0037]
`
`Thus, use of externally managed domains enables an external domain
`
`manager to create, distribute, manage, and update an externally managed domain in
`
`order to provide a rich and tailored experience to the device user.
`
`20
`
`[0038]
`
`At the same time, users can confidently add such externally managed
`
`domains to their mobile devices because they know that
`
`the external domain
`
`manager and the apps within such an externally managed domain cannot access
`
`data in other domains on their mobile device which may contain personal information .
`
`Even if an app in the externally managed domain wants permissions to access
`
`25
`
`personal information (e.g. contacts or credentials),
`
`the user can be confident that the
`
`app cannot access any personal
`
`information stored in a different domain. The user
`
`does not have to compromise with respect to the value of the content as against the
`
`value of
`
`their personal
`
`information as is often the case for apps downloaded to
`
`mobile devices. Even if an external domain manager unknowingly includes malware
`
`30
`
`{e.g.
`
`that may target e-mail addresses to sell
`-10-
`
`to spammers or premium SMS
`
`
`
`WO 2015/074150
`
`PCT/CA2014/051109
`
`services), the apps and file system on the device are completely isolated from the
`
`apps in the externally managed domain due to the domain isolation technology used.
`
`[0039]
`
`[0040]
`
`Secure, isolated Domains
`
`A ‘domain’ may be considered herein to stand for a relationship
`
`between a set of similarly trusted resources - data files, applications, and services,
`
`for example - and a rule set, or ‘security policy’, whereby access by processes to the
`
`resources is controlled at least in part by the security policy. For example, a particular
`
`domain may be considered to include or contain a number of data files which are
`
`associated with that domain, and access to those data files is controlled at least in
`
`10
`
`part by a security policy defined in association with that domain. Similarly, an
`
`application may be installed or otherwise associated with a particular domain, and
`
`access to that application,
`
`including the ability to execute the application,
`
`for
`
`example,
`
`is controlled at least in part by a security policy defined in association with
`
`that domain.
`
`15
`
`[0041]
`
`At any given time, a domain will have associated with it a corresponding
`
`security policy and contain content having a corresponding content configuration, all
`
`as defined above. Accordingly, each domain may be characterized by a ‘domain
`
`configuration’
`
`including the security policy, the content, and the content configuration
`
`corresponding to that domain.
`
`20
`
`[0042]
`
`It
`
`is sometimes desirable in a single-user device to be able to provide
`
`multiple domains having different
`
`security policies providing different access to
`
`selected applications and other resources.
`
`In one case,
`
`it may be desirable to provide
`
`a restricted domain which requires user authentication for access and contains data
`
`or applications which are intended to be inaccessible to children or otherthird parties,
`
`25
`
`and an open, or ‘kids mode’, domain which does not require authentication and is
`
`intended to be accessible to children (to play games, for example). When operating in
`
`the open domain, therefore,
`
`it is desirable for the data or applications of the restricted
`
`domain to be inaccessible to processes associated with the open domain.
`
`[0043]
`
`In some embodiments, domain awareness is provided via modification
`
`30
`
`to existing components or services of the operating system or the introduction of new
`-11-
`
`
`
`WO 2015/074150
`
`PCT/CA2014/051109
`
`components or services.
`
`In some embodiments, at
`
`least some of the components
`
`and services are provided in the operating system outside of the kernel, that is in the
`
`middleware {used herein to mean the operating system outside of the kernel, and
`
`between the kernel and user applications).
`
`In some embodiments, at least some of
`
`the components and services are provided in the operating system kernel.
`
`In some
`
`embodiments, domain creation and management
`
`is enabled by modified or new
`
`components
`
`or
`
`services
`
`of
`
`the operating
`
`system middleware,
`
`and
`
`domain
`
`enforcement
`
`is performed by the operating system kernel, and modified or new
`
`kernel modules, or kernel modifications, are provided for this purpose.
`
`10
`
`[0044]
`
`Accordingly, an exemplary system 100 for providing isolated domains is
`
`now described with reference to FIG.
`
`1. The system may be implemented in any
`
`computing device including a mobile information device such as a smartphone,
`
`tablet,
`
`laptop, or a desktop, or any other electronic device having a volatile memory
`
`and a processor,
`
`the volatile memory containing computer code executable by the
`
`15
`
`processor to provide an operating system and software applications (or ‘applications’
`
`or ‘apps'). The computing device may further include an interface, which may include
`
`a user input device such as a keyboard, pointing device,
`
`touchscreen,
`
`and may
`
`further
`
`include a communications
`
`interface such as a radio and associated control
`
`circuitry for communicating over a wired or wireless communications network, which
`
`20
`
`may be the Internet and/or a cellular or WiFi
`
`link or Bluetooth, or near
`
`field
`
`communication (NFC).
`
`[0045]
`
`The operating system may be characterized as including a kernel,
`
`which manages and provides input/output (I/O) services to software applications from
`
`the processor and other hardware components of the device, and middleware which
`
`25
`
`provides services additional to those provided by the kernel.
`
`[0046]
`
`In general, the system 100 includes modifications to operating-system -
`
`level protocols to enable domain-awareness. A plurality of domains may be created
`
`on the mobile device.
`
`In some embodiments
`
`the operating system is Android™,
`
`although such selection should not be construed as limiting; Android is used only as
`
`-12-
`
`
`
`WO 2015/074150
`
`PCT/CA2014/051109
`
`an example and is
`
`similar
`
`to other multi-user operating systems {e.g. QNX™.,
`
`Microsoft Windows™).
`
`[0047]
`
`Thus, as shown in FIG. 1, the system 100 includes a kernel, which is
`
`the Linux™ kernel 110 when the system 100 is
`
`implemented in a mobile device
`
`running the Android™ operating system. The kernel 100 includes: a secure data
`
`store 112, a Domain Kerne! Module 116, and a Linux Security Module 114, which in
`
`one embodiment
`
`is an Enhanced Linux Security Module, whose respective functions
`
`will be discussed further below.
`
`It will be understood by persons of ordinary skill
`
`in
`
`the art that the kernel 110 may further have further conventional components (e.g.
`
`10
`
`drivers), or other comp

Accessing this document will incur an additional charge of $.
After purchase, you can access this document again without charge.
Accept $ ChargeStill Working On It
This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.
Give it another minute or two to complete, and then try the refresh button.
A few More Minutes ... Still Working
It can take up to 5 minutes for us to download a document if the court servers are running slowly.
Thank you for your continued patience.

This document could not be displayed.
We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.
You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.
Set your membership
status to view this document.
With a Docket Alarm membership, you'll
get a whole lot more, including:
- Up-to-date information for this case.
- Email alerts whenever there is an update.
- Full text search for other cases.
- Get email alerts whenever a new case matches your search.

One Moment Please
The filing “” is large (MB) and is being downloaded.
Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!
If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document
We are unable to display this document, it may be under a court ordered seal.
If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.
Access Government Site