Methods and systems for blocking potentially harmful communications to improve the functioning of an electronic device
First Claim
1. A method for blocking, by an electronic device, a communication from an application, the communication transmitted to the electronic device using a first network connection, the method comprising:
- receiving, by a security component, a policy configured by an administrator, the policy pertaining to the processing of communications by the security component and based on answers of the administrator to a set of questions;
receiving over the first network connection or a second network connection, by the security component according to the policy and from a local device proxy on the electronic device after the communication is received by the local device proxy, information pertaining to the communication from the application;
comparing, by the security component according to the policy, the obtained information to information associated with potentially harmful applications;
determining, by the security component from the comparison according to the policy, that the communication is from a potentially harmful application; and
instructing, by the security component as a result of the determination that the communication is from a potentially harmful application according to the policy, the local device proxy on the electronic device to block the communication from proceeding past the local device proxy to the remainder of the electronic device.
7 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for sharing information and improving the functioning of devices by blocking potentially harmful communications. In the methods and systems disclosed, a security component on an electronic device may receive a policy. The security component may also receive, from a local device proxy on the electronic device, information pertaining to a communication. The security component may compare the information pertaining to the communication to the policy. The comparison may result in a determination that the communication is potentially harmful. The security component may then instruct the local device proxy to block the communication from proceeding past the local device proxy.
312 Citations
36 Claims
-
1. A method for blocking, by an electronic device, a communication from an application, the communication transmitted to the electronic device using a first network connection, the method comprising:
-
receiving, by a security component, a policy configured by an administrator, the policy pertaining to the processing of communications by the security component and based on answers of the administrator to a set of questions; receiving over the first network connection or a second network connection, by the security component according to the policy and from a local device proxy on the electronic device after the communication is received by the local device proxy, information pertaining to the communication from the application; comparing, by the security component according to the policy, the obtained information to information associated with potentially harmful applications; determining, by the security component from the comparison according to the policy, that the communication is from a potentially harmful application; and instructing, by the security component as a result of the determination that the communication is from a potentially harmful application according to the policy, the local device proxy on the electronic device to block the communication from proceeding past the local device proxy to the remainder of the electronic device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for blocking, by an electronic device, a communication from an application installed on the electronic device, the application attempting to transmit the communication using a first network connection, the method comprising:
-
receiving, by a security component, a policy configured by an administrator, the policy pertaining to the processing of communications by the security component and based on answers of the administrator to a set of questions; receiving over the first network connection or a second network connection, by the security component according to the policy and from a local device proxy on the electronic device after the communication is received by the local device proxy, information pertaining to the communication from the application; comparing, by the security component according to the policy, the obtained information to information associated with potentially harmful applications; determining, by the security component from the comparison according to the policy, that the communication is from a potentially harmful application; and instructing, by the security component as a result of the determination that the communication is from a potentially harmful application according to the policy, the local device proxy on the electronic device to block the communication from proceeding past the local device proxy to the remainder of the electronic device. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A method for blocking, by an electronic device, a communication from a first application installed on the electronic device to a second application installed on the electronic device, the method comprising:
-
receiving, by a security component, a policy configured by an administrator, the policy pertaining to the processing of communications by the security component and based on answers of the administrator to a set of questions; receiving over the first network connection or a second network connection, by the security component according to the policy and from a local device proxy on the electronic device after the communication is received by the local device proxy, information pertaining to the communication; comparing, by the security component according to the policy, the obtained information to information associated with potentially harmful applications; determining, by the security component from the comparison, that the communication is from a potentially harmful application; and instructing, by the security component as a result of the determination that the communication is from a potentially harmful application, the local device proxy to block the communication from proceeding to the second application. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A non-transitory, computer-readable storage medium having stored thereon a plurality of instructions, which, when executed by a processor of an electronic device, cause the electronic device to perform actions for blocking a communication from an application, the communication transmitted to the electronic device using a first network connection, the actions comprising:
-
receiving, by a security component, a policy configured by an administrator, the policy pertaining to the processing of communications by the security component and based on answers of the administrator to a set of questions; receiving, over the first network connection or a second network connection, by the security component according to the policy and from a local device proxy on the electronic device after the communication is received by the local device proxy, information pertaining to the communication from the application; comparing, by the security component according to the policy, the obtained information to information associated with potentially harmful applications; determining, by the security component from the comparison according to the policy, that the communication is from a potentially harmful application; and instructing, by the security component as a result of the determination that the communication is from a potentially harmful application according to the policy, the local device proxy on the electronic device to block the communication from proceeding past the local device proxy to the remainder of the electronic device. - View Dependent Claims (22, 23)
-
-
24. A non-transitory, computer-readable storage medium having stored thereon a plurality of instructions, which, when executed by a processor of an electronic device, cause the electronic device to perform actions for blocking a communication from an application installed on the electronic device, the application attempting to transmit the communication using a first network connection, the actions comprising:
-
receiving, by a security component, a policy configured by an administrator, the policy pertaining to the processing of communications by the security component and based on answers of the administrator to a set of questions; receiving over the first network connection or a second network connection, by the security component according to the policy and from a local device proxy on the electronic device after the communication is received by the local device proxy, information pertaining to the communication from the application; comparing, by the security component according to the policy, the obtained information to information associated with potentially harmful applications; determining, by the security component from the comparison according to the policy, that the communication is from a potentially harmful application; and instructing, by the security component as a result of the determination that the communication is from a potentially harmful application according to the policy, the local device proxy on the electronic device to block the communication from proceeding past the local device proxy to the remainder of the electronic device.
-
-
25. A non-transitory, computer-readable storage medium having stored thereon a plurality of instructions, which, when executed by a processor of an electronic device, cause the electronic device to perform actions for blocking a communication from a first application installed on the electronic device to a second application installed on the electronic device, the actions comprising:
-
receiving, by a security component, a policy configured by an administrator, the policy pertaining to the processing of communications by the security component and based on answers of the administrator to a set of questions; receiving over the first network connection or a second network connection, by the security component according to the policy and from a local device proxy on the electronic device after the communication is received by the local device proxy, information pertaining to the communication; comparing, by the security component according to the policy, the obtained information to information associated with potentially harmful applications; determining, by the security component from the comparison, that the communication is from a potentially harmful application; and instructing, by the security component as a result of the determination that the communication is from a potentially harmful application, the local device proxy to block the communication from proceeding to the second application. - View Dependent Claims (26, 27, 28)
-
-
29. A system, comprising an electronic device with at least one processor and memory and instructions that when executed by the at least one processor cause the electronic device to perform actions for blocking a communication from an application, the communication transmitted to the electronic device using a first network connection, the actions comprising:
-
receiving, by a security component, a policy configured by an administrator, the policy pertaining to the processing of communications by the security component and based on answers of the administrator to a set of questions; receiving, over the first network connection or a second network connection, by the security component according to the policy and from a local device proxy on the electronic device after the communication is received by the local device proxy, information pertaining to the communication from the application; comparing, by the security component according to the policy, the obtained information to information associated with potentially harmful applications; determining, by the security component from the comparison according to the policy, that the communication is from a potentially harmful application; and instructing, by the security component as a result of the determination that the communication is from a potentially harmful application according to the policy, the local device proxy on the electronic device to block the communication from proceeding past the local device proxy to the remainder of the electronic device. - View Dependent Claims (30, 31)
-
-
32. A system, comprising an electronic device with at least one processor and memory and instructions that when executed by the at least one processor cause the electronic device to perform actions for blocking a communication from an application installed on the electronic device, the application attempting to transmit the communication using a first network connection, the actions comprising:
-
receiving, by a security component, a policy configured by an administrator, the policy pertaining to the processing of communications by the security component and based on answers of the administrator to a set of questions; receiving over the first network connection or a second network connection, by the security component according to the policy and from a local device proxy on the electronic device after the communication is received by the local device proxy, information pertaining to the communication from the application; comparing, by the security component according to the policy, the obtained information to information associated with potentially harmful applications; determining, by the security component from the comparison according to the policy, that the communication is from a potentially harmful application; and instructing, by the security component as a result of the determination that the communication is from a potentially harmful application according to the policy, the local device proxy on the electronic device to block the communication from proceeding past the local device proxy to the remainder of the electronic device.
-
-
33. A system, comprising an electronic device with at least one processor and memory and instructions that when executed by the at least one processor cause the electronic device to perform actions for blocking a communication from a first application installed on the electronic device to a second application installed on the electronic device, the actions comprising:
-
receiving, by a security component, a policy configured by an administrator, the policy pertaining to the processing of communications by the security component and based on answers of the administrator to a set of questions; receiving over the first network connection or a second network connection, by the security component according to the policy and from a local device proxy on the electronic device after the communication is received by the local device proxy, information pertaining to the communication; comparing, by the security component according to the policy, the obtained information to information associated with potentially harmful applications; determining, by the security component from the comparison, that the communication is from a potentially harmful application; and instructing, by the security component as a result of the determination that the communication is from a potentially harmful application, the local device proxy to block the communication from proceeding to the second application. - View Dependent Claims (34, 35, 36)
-
Specification