Access control list for applications on mobile devices during a remote control session
First Claim
1. A method of implementing access restrictions on mobile devices during a remote control session comprising the steps of:
- connecting a mobile device to a remote support technician providing said remote support technician remote access to the mobile device;
pushing a policy to said device during a remote session that includes a list of applications that need to be allowed by a user of the mobile device to be shared with remote support technician;
accessing an application during the remote section that is in the list of restricted applications in the policy and comparing the application to be accessed with the names in the policy list;
displaying a message to the user to obtain consent to allow the remote technician to view the application.
5 Assignments
0 Petitions
Accused Products
Abstract
A method of implementing access restrictions on mobile devices during a remote control session Network based restrictions; User controlled restrictions, or User controlled access list restrictions. A remote support technician connects to a mobile device to perform remote access to the mobile device. As part of the remote control session a policy can be pushed to the device that would have a list of applications that would need to be allowed by the user to be shared with remote technician. Alternatively no policy is pushed and the user must allow remote support technician access.
-
Citations
10 Claims
-
1. A method of implementing access restrictions on mobile devices during a remote control session comprising the steps of:
-
connecting a mobile device to a remote support technician providing said remote support technician remote access to the mobile device; pushing a policy to said device during a remote session that includes a list of applications that need to be allowed by a user of the mobile device to be shared with remote support technician; accessing an application during the remote section that is in the list of restricted applications in the policy and comparing the application to be accessed with the names in the policy list; displaying a message to the user to obtain consent to allow the remote technician to view the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification