SYSTEM AND METHOD FOR PROFILE BASED FILTERING OF OUTGOING INFORMATION IN A MOBILE ENVIRONMENT
First Claim
1. A non-transitory computer-readable storage medium comprising logic that includes code for execution and when executed on a processor configures the processor to perform operations comprising:
- detecting an access request by an application to access information in a mobile device;
determining whether the information being requested by the access request matches a category of information described by at least one policy filter;
flagging the application as a potential threat in response to determining that the information being requested by the access request matches the category of information described by the at least one policy filter, wherein the application is allowed to access the information matching the category of information even though the application is flagged; and
in response to flagging the application, blocking send requests by the flagged application to send the information matching the category of information from the mobile device without user'"'"'s consent.
7 Assignments
0 Petitions
Accused Products
Abstract
A system and method in one embodiment includes modules for detecting an access request by an application to access information in a mobile device, determining that the application is a potential threat according to at least one policy filter, and blocking a send request by the application to send the information from the mobile device without a user'"'"'s consent. More specific embodiments include user selecting the information through a selection menu on a graphical user interface that includes information categories pre-populated by an operating system of the mobile device, and keywords that can be input by the user. Other embodiments include queuing the send request in a queue with other requests, and presenting an outbox comprising the queue to the user to choose to consent to the requests. The outbox includes graphical elements configured to permit the user to selectively consent to any requests in the queue.
9 Citations
20 Claims
-
1. A non-transitory computer-readable storage medium comprising logic that includes code for execution and when executed on a processor configures the processor to perform operations comprising:
-
detecting an access request by an application to access information in a mobile device; determining whether the information being requested by the access request matches a category of information described by at least one policy filter; flagging the application as a potential threat in response to determining that the information being requested by the access request matches the category of information described by the at least one policy filter, wherein the application is allowed to access the information matching the category of information even though the application is flagged; and in response to flagging the application, blocking send requests by the flagged application to send the information matching the category of information from the mobile device without user'"'"'s consent. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus comprising:
-
a memory configured to store data, and a processor operable to execute instructions associated with the data and configured, when executing the instructions, to; detect an access request by an application to access information in a mobile device; determine whether the information being requested by the access request matches a category of information described by at least one policy filter; flag the application as a potential threat in response to determining that the information being requested by the access request matches the category of information described by the at least one policy filter, wherein the application is allowed to access the information matching the category of information even though the application is flagged; and in response to flagging the application, block send requests by the flagged application to send the information matching the category of information from the mobile device without user'"'"'s consent. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A method comprising a processor performing steps of:
-
detecting an access request by an application to access information in a mobile device; determining whether the information being requested by the access request matches a category of information described by at least one policy filter; flagging the application as a potential threat in response to determining that the information being requested by the access request matches the category of information described by the at least one policy filter, wherein the application is allowed to access the information matching the category of information even though the application is flagged; and in response to flagging the application, blocking send requests by the flagged application to send the information matching the category of information from the mobile device without user'"'"'s consent. - View Dependent Claims (19, 20)
-
Specification