Enforcing Centralized Communication Policies
First Claim
Patent Images
1. A method performed by a first computing device, the method comprising:
- (A) receiving a rule from a second computing device that differs from the first computing device;
(B) storing the rule;
(C) determining whether a message at the first computing device satisfies the rule; and
(D) taking an action specified by the rule if the message is determined to satisfy the rule.
1 Assignment
0 Petitions
Accused Products
Abstract
A system provides centralized policies to be applied in a distributed manner to all communication channels used by a set of mobile communication devices, including communication channels which do not pass through a centralized communication server, such PIN-to-PIN communication channels. Such policies may include address-based and content-based policies. The system also allows all such communications to be archived.
52 Citations
58 Claims
-
1. A method performed by a first computing device, the method comprising:
-
(A) receiving a rule from a second computing device that differs from the first computing device; (B) storing the rule; (C) determining whether a message at the first computing device satisfies the rule; and (D) taking an action specified by the rule if the message is determined to satisfy the rule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A computer-implemented method comprising:
-
(A) at a communication policy server, transmitting a first rule to first and second client communication devices; (B) at the first client communication device; (1) storing the first rule; (2) determining whether a first message at the first client communication device satisfies the first rule; (3) taking an action specified by the first rule if the first message is determined to satisfy the first rule; (C) at the second client communication device; (1) storing the first rule; (2) determining whether a second message at the second client communication device satisfies the first rule; and (3) taking the action specified by the first rule if the second message is determined to satisfy the first rule. - View Dependent Claims (37, 38, 39, 40, 41)
-
-
42. A method performed by a first computing device, the method comprising:
-
(A) detecting a first message at the first computing device, the first message having a second computing device as its sender or recipient; (B) creating an archiving message based on the first message; (C) storing the archiving message securely on a computer-readable medium in the first computing device; and (D) transmitting the archiving message to a third computing device for storage in an archive. - View Dependent Claims (43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58)
-
Specification