Monitoring and Controlling Electronic Activity Using Third Party Rule Submission and Validation
First Claim
1. A method comprising:
- generating, at a policy server, a policy based on a rule, wherein the policy defines electronic activity that is allowed at a device, and wherein the rule comprises a variable and a value specified for the variable;
receiving, by the policy server, a further rule from a third party device, the further rule comprising a further value;
determining, by the policy server, that third party rule submissions are enabled;
validating, by the policy server, the further rule to determine that the further rule is legitimate; and
updating, by the policy server, the policy based on the further rule to obtain an updated policy.
1 Assignment
0 Petitions
Accused Products
Abstract
Concepts and technologies are disclosed herein for monitoring and controlling electronic activity. A policy service can be called for policies for controlling electronic activity occurring at one or more managed devices. The policies can include a number of rules, each of which can include a number of variables. The rules can be defined by a manager device and/or received from third parties. Third party rule submissions can be validated. If electronic activity at the managed device deviates from a rule, the manager device can be notified and the electronic activity can be blocked. The manager device can update the policy and/or issue exceptions, if desired.
-
Citations
20 Claims
-
1. A method comprising:
-
generating, at a policy server, a policy based on a rule, wherein the policy defines electronic activity that is allowed at a device, and wherein the rule comprises a variable and a value specified for the variable; receiving, by the policy server, a further rule from a third party device, the further rule comprising a further value; determining, by the policy server, that third party rule submissions are enabled; validating, by the policy server, the further rule to determine that the further rule is legitimate; and updating, by the policy server, the policy based on the further rule to obtain an updated policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer storage medium having computer executable instructions stored thereon that, when executed by a processor, cause the processor to perform operations comprising:
-
generating a policy based on a rule, wherein the policy defines electronic activity that is allowed at a device, and wherein the rule comprises a variable and a value specified for the variable; receiving a further rule from a third party device, the further rule comprising a further value; determining that third party rule submissions are enabled; validating the further rule to determine that the further rule is legitimate; and updating the policy based on the further rule to obtain an updated policy. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
a processor; and a memory that stores computer executable instructions that, when executed by the processor, cause the processor to perform operations comprising generating a policy based on a rule, wherein the policy defines electronic activity that is allowed at a device, and wherein the rule comprises a variable and a value specified for the variable, receiving a further rule from a third party device, the further rule comprising a further value, determining that third party rule submissions are enabled, validating the further rule to determine if the further rule is legitimate, and updating the policy based on the further rule to obtain an updated policy. - View Dependent Claims (17, 18, 19, 20)
-
Specification