Distribution of variably secure resources in a networked environment
First Claim
1. A method comprising:
- receiving a request from an application executing on a client device to access a first set of resources and a second set of resources;
determining that the first set of resources is associated with a first distribution rule that permits the first set of resources being rendered while the client device is not in communication with a distribution service;
determining that the second set of resources is associated with a second distribution rule that prohibits the second set of resources being rendered while the client device is not in communication with the distribution service;
detecting whether the client device is in communication with the distribution service; and
in response to receiving the request and detecting that the client device is not in communication with the distribution service;
denying the application access to the second set of resources according to the second distribution rule; and
permitting the application access to the first set of resources according to the first distribution rule.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of receiving a request to access a plurality of resources and determining whether a first resource of the plurality of resources is associated with a different authorization requirement than at least one second resource of the plurality of resources. In response to determining that the first resource of the plurality of resources is associated with a different authorization requirement than the at least one second resource of the plurality of resources, determining whether the request includes the authorization requirement for the first resource and the authorization requirement for the second resource. In response to determining that the request includes the authorization requirement for the first resource and the authorization requirement for the second resource, providing access to the first resource and the at least one second resource.
188 Citations
18 Claims
-
1. A method comprising:
-
receiving a request from an application executing on a client device to access a first set of resources and a second set of resources; determining that the first set of resources is associated with a first distribution rule that permits the first set of resources being rendered while the client device is not in communication with a distribution service; determining that the second set of resources is associated with a second distribution rule that prohibits the second set of resources being rendered while the client device is not in communication with the distribution service; detecting whether the client device is in communication with the distribution service; and in response to receiving the request and detecting that the client device is not in communication with the distribution service; denying the application access to the second set of resources according to the second distribution rule; and permitting the application access to the first set of resources according to the first distribution rule. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method, comprising:
-
receiving a request from an application executing on a client device to access a first resource and a second resource; identifying a first authorization requirement associated with the first resource, wherein the first authorization requirement permits the first resource being rendered when the client device is not in communication with a distribution service; identifying a second authorization requirement associated with the second resource, wherein the second authorization requirement prohibits the second resource being rendered when the client device is not in communication with the distribution service; detecting whether the client device is in communication with the distribution service; and in response to receiving the request and detecting that the client device is not in communication with the distribution service, permitting the application access to the first resource according to the first authorization requirement and prohibiting the application access to the second resource according to the second authorization requirement. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable medium encoded with software that, when executed by a computing device, causes the computing device to at least:
-
receive a request from an application executing on a client device to access a first set of resources and a second set of resources; identify a first distribution rule associated with the first set of resources, wherein the first distribution rule permits the first set of resources being rendered while the computing device is not in communication with a distribution service; identify a second distribution rule associated with the second set of resources, wherein the second distribution rule prohibits the second set of resources being rendered while the computing device is not in communication with the distribution service; detect whether the computing device is in communication with the distribution service; and in response to receiving the request and detecting that the computing device is not in communication with the distribution service, permitting the application access to the first set of resources according to the first distribution rule and denying the application access to the second set of resources according to the second distribution rule. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification