METHOD AND SYSTEM FOR AUTOMATICALLY CONFIGURING ACCESS CONTROL
First Claim
1. In an access update module, a method of automatically configuring an access control point, the access control point allowing or blocking transmissions between remote network resources and a new application on a user device based upon access rules, the method comprising the steps of:
- downloading the new application for installation on the user device, wherein the new application is configured to access the remote network resources during operation;
installing the new application on the user device;
receiving and reading access control information associated with the new application; and
setting the access control rules based upon said access control information in order to permit communications between the new application and the remote network resources.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for automatically configuring an access control point based upon the network resource requirements of an application. The installation of a new application on a mobile device or other user device is accompanied, before, during, or after installation, with the distribution of access control information. An access control point blocks communications based upon access rules. An access update module modifies or sets the access rules based upon the access control information. The access control point and the access update module may be located within the mobile device, within an associated wireless connector system, or in other locations within the mobile communication system. The setting or resetting of the access rules based upon the access control information may be triggered during installation, modification, or removal of the application.
27 Citations
18 Claims
-
1. In an access update module, a method of automatically configuring an access control point, the access control point allowing or blocking transmissions between remote network resources and a new application on a user device based upon access rules, the method comprising the steps of:
-
downloading the new application for installation on the user device, wherein the new application is configured to access the remote network resources during operation;
installing the new application on the user device;
receiving and reading access control information associated with the new application; and
setting the access control rules based upon said access control information in order to permit communications between the new application and the remote network resources. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product having a computer-readable medium tangibly embodying computer executable instructions for automatically configuring an access control point, the access control point allowing or blocking transmissions between remote network resources and an application on a user device based upon access rules, wherein the automatic configuration of the access point occurs in connection with downloading and installing the new application on the user device, and wherein the new application is configured to access the remote network resources during operation, the computer executable instructions creating an access update module comprising:
-
computer executable instructions for receiving and reading access control information associated with the application; and
computer executable instructions for setting the access control rules based upon said access control information in order to permit communications between the new application and the remote network resources. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A user device having an access control point, the access control point allowing or blocking transmissions between remote network resources and a new application on the user device based upon access rules, the user device comprising:
-
means for downloading the new application for installation on the user device, wherein the new application is configured to access the remote network resources during operation;
means for installing the new application on the user device;
means for receiving and reading access control information associated with the new application; and
means for setting the access control rules based upon said access control information in order to permit communications between the new application and the remote network resources. - View Dependent Claims (15, 16, 17, 18)
-
Specification