Method and system for automatically configuring access control
First Claim
1. In an access update module, a method of automatically configuring an access control point, the access control point allowing or blocking transmissions between network resources and an application on a user device based upon access rules, the method comprising the steps of:
- receiving and reading access control information associated with the application; and
setting the access control rules based upon said access control information.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for automatically configuring an access control point based upon the network resource requirements of an application. The installation of a new application on a mobile device or other user device is accompanied, before, during, or after installation, with the distribution of access control information. An access control point blocks communications based upon access rules. An access update module modifies or sets the access rules based upon the access control information. The access control point and the access update module may be located within the mobile device, within an associated wireless connector system, or in other locations within the mobile communication system. The setting or resetting of the access rules based upon the access control information may be triggered during installation, modification, or removal of the application.
73 Citations
18 Claims
-
1. In an access update module, a method of automatically configuring an access control point, the access control point allowing or blocking transmissions between network resources and an application on a user device based upon access rules, the method comprising the steps of:
-
receiving and reading access control information associated with the application; and
setting the access control rules based upon said access control information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program product having a computer-readable medium tangibly embodying computer executable instructions for automatically configuring an access control point, the access control point allowing or blocking transmissions between network resources and an application on a user device based upon access rules, the computer executable instructions creating an access update module and including:
-
computer executable instructions for receiving and reading access control information associated with the application; and
computer executable instructions for setting the access control rules based upon said access control information. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification