System for Locking Down a Computing Device for Restricted Access to End Users
First Claim
1. A system for locking down the computing devices for restricted access to end users, the system comprises of:
- a) a lock down module which presents a user interface restricting user'"'"'s access to plurality of unallowed applications and restricting user'"'"'s access to modify a peripheral setting on a computing device;
b) a monitoring module monitors the plurality of applications running on the computing device and sends signal to operating system to terminate the application, when the monitoring module detects the unallowed application is being run by the user or external events;
c) a single application module allows a computer administrator to configure a single application to run on the computing device as a foreground application all the time; and
d) the single application module with the help of the monitoring module monitors and sends signal to operating system to terminate other applications and bring single application to foreground, when the other applications are attempted to run by the user or by external events on the computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention discloses system for locking down the computing devices for restricted access to end users. The system includes a lock down module, a monitoring module and a single application module. The system using these modules blocks a user'"'"'s access to at least one of a plurality of unallowed applications and restricts user'"'"'s access to modify a peripheral setting like GPS, Airplane Mode, Bluetooth®, etc. The system allows only the desired applications to run and no other application is visible on the device. If the user tries to access an unallowed application through any means, it is immediately terminated. Computing device peripheral settings are locked down to desired value so that the users cannot change the settings.
19 Citations
9 Claims
-
1. A system for locking down the computing devices for restricted access to end users, the system comprises of:
-
a) a lock down module which presents a user interface restricting user'"'"'s access to plurality of unallowed applications and restricting user'"'"'s access to modify a peripheral setting on a computing device; b) a monitoring module monitors the plurality of applications running on the computing device and sends signal to operating system to terminate the application, when the monitoring module detects the unallowed application is being run by the user or external events; c) a single application module allows a computer administrator to configure a single application to run on the computing device as a foreground application all the time; and d) the single application module with the help of the monitoring module monitors and sends signal to operating system to terminate other applications and bring single application to foreground, when the other applications are attempted to run by the user or by external events on the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification