Methods and devices for controlling access to computing resources
First Claim
1. A method of transmitting data from a first computing device to an application server, the method comprising:
- executing an application at the first computing device, wherein an attempt to access a computing resource on the first computing device is made by the application;
determining that the application is not configured to access the computing resource, in response to the attempt;
displaying, in a user interface of the first computing device, a permission request to allow the application to access the computing resource; and
transmitting data from the first computing device to the application server, the data notifying the application server that the attempt to access the computing resource was made by the application when the application was not configured to access the computing resource, and the data being usable by the application server to determine a likelihood that a corresponding computing resource on at least one different second computing device will be accessed by the application when the application is executed on the at least one different second computing device is above a given threshold;
wherein the application server verifies that a number of first computing devices from which the data is transmitted meets or exceeds a predefined threshold before determining that the computing resource on the at least one different second computing device will be accessed by the application when the application is executed on the at least one different second computing device is above the given threshold.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods and devices for controlling access to resources are disclosed herein. In one example embodiment, the method comprises: executing an application at a first computing device, wherein an attempt to access a computing resource on the computing device is made by the application; determining that the application is not configured to access the computing resource, in response to the attempt; displaying, in a user interface of the computing device, a permission request to allow the application to access the computing resource; and transmitting data from the computing device to the application server, the data notifying the application server that the attempt to access the computing resource was made by the application when the application was not configured to access the computing resource, and the data being usable by the application server to determine whether a corresponding computing resource on at least one different computing device is likely to be accessed when the application is executed on the at least one different computing device.
-
Citations
24 Claims
-
1. A method of transmitting data from a first computing device to an application server, the method comprising:
-
executing an application at the first computing device, wherein an attempt to access a computing resource on the first computing device is made by the application; determining that the application is not configured to access the computing resource, in response to the attempt; displaying, in a user interface of the first computing device, a permission request to allow the application to access the computing resource; and transmitting data from the first computing device to the application server, the data notifying the application server that the attempt to access the computing resource was made by the application when the application was not configured to access the computing resource, and the data being usable by the application server to determine a likelihood that a corresponding computing resource on at least one different second computing device will be accessed by the application when the application is executed on the at least one different second computing device is above a given threshold; wherein the application server verifies that a number of first computing devices from which the data is transmitted meets or exceeds a predefined threshold before determining that the computing resource on the at least one different second computing device will be accessed by the application when the application is executed on the at least one different second computing device is above the given threshold. - View Dependent Claims (2, 3, 4)
-
-
5. A first computing device configured to transmit data to an application server, wherein the first computing device comprises a processor configured to:
-
execute an application, wherein an attempt to access a computing resource on the first computing device is made by the application; determine that the application is not configured to access the computing resource, in response to the attempt; display, in a user interface of the first computing device, a permission request to allow the application to access the computing resource; and transmit data to the application server, the data notifying the application server that the attempt to access the computing resource was made by the application when the application was not configured to access the computing resource, and the data being usable by the application server to determine a likelihood that a corresponding computing resource on at least one different second computing device will be accessed by the application when the application is executed on the at least one different second computing device is above a given threshold; wherein the application server verifies that a number of first computing devices from which the data is transmitted meets or exceeds a predefined threshold before determining that the computing resource on the at least one different second computing device will be accessed by the application when the application is executed on the at least one different second computing device is above the given threshold. - View Dependent Claims (6)
-
-
7. A non-transitory computer-readable medium comprising instructions which, when executed by a processor of a first computing device, cause the processor to perform a method of transmitting data from the first computing device to an application server, and wherein the method comprises:
-
executing an application at the first computing device, wherein an attempt to access a computing resource on the first computing device is made by the application; determining that the application is not configured to access the computing resource, in response to the attempt; displaying, in a user interface of the computing device, a permission request to allow the application to access the computing resource; and transmitting data from the computing device to the application server, the data notifying the application server that the attempt to access the computing resource was made by the application when the application was not configured to access the computing resource, and the data being usable by the application server to determine a likelihood that a corresponding computing resource on at least one different second computing device will be accessed by the application when the application is executed on the different second computing device is above a given threshold; wherein the application server verifies that a number of first computing devices from which the data is transmitted meets or exceeds a predefined threshold before determining that the computing resource on the at least one different second computing device will be accessed by the application when the application is executed on the at least one different second computing device is above the given threshold.
-
-
8. A method of indicating that a computing resource is accessed by an application, the method performed by a processor of an application server, the method comprising:
-
receiving, from a first computing device, data indicating that an attempt to access the computing resource on the first computing device was made by the application when the application was not configured to access the computing resource on the first computing device; verifying that a number of first computing devices from which the data is received meets or exceeds a predefined threshold; after the verifying, for the computing resource on at least one different second computing device that corresponds to the computing resource on the first computing device, determining that a likelihood that the computing resource on the at least one different second computing device will be accessed by the application when the application is executed on the at least one different second computing device is above a given threshold; and transmitting, to the at least one different second computing device, data indicating that the likelihood that the computing resource on the at least one different second computing device will be accessed by the application when the application is executed on the at least one different second computing device is above the given threshold. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A server device configured to indicate that a computing resource is accessed by an application, the server device comprising a processor configured to:
-
receive, from a first computing device, data indicating that an attempt to access the computing resource on the first computing device was made by the application when the application was not configured to access the computing resource on the first computing device; verify that a number of first computing devices from which the data is received meets or exceeds a predefined threshold; after the verifying, for the computing resource on at least one different second computing device that corresponds to the computing resource on the first computing device, determine that a likelihood that the computing resource on the at least one different second computing device will be accessed by the application when the application is executed on the at least one different second computing device is above a given threshold; and transmit, to the at least one different second computing device, data indicating that the likelihood that the computing resource on the at least one different second computing device will be accessed by the application when the application is executed on the at least one different second computing device is above the given threshold. - View Dependent Claims (14)
-
-
15. A non-transitory computer-readable medium comprising instructions which, when executed by a processor of a server device, cause the processor to perform a method of indicating that a computing resource is accessed by an application, wherein the method comprises:
-
receiving, from a first computing device, data indicating that an attempt to access the computing resource on the first computing device was made by the application when the application was not configured to access the computing resource on the first computing device; verifying that a number of first computing devices from which the data is received meets or exceeds a predefined threshold; after the verifying, for the computing resource on at least one different second computing device that corresponds to the computing resource on the first computing device, determining that a likelihood that the computing resource on the at least one different second computing device will be accessed by the application when the application is executed on the at least one different second computing device is above a given threshold; and transmitting, to the at least one different second computing device, data indicating that the likelihood that the computing resource on the at least one different second computing device will be accessed by the application when the application is executed on the at least one different second computing device is above the given threshold.
-
-
16. A method of managing access to a computing resource, the method comprising:
-
determining at least one computing resource on a second computing device that an application is configured to access when the application is executed; for a computing resource on the second computing device that the application is not configured to access when the application is executed; receiving, at the second computing device, data from an application server that indicates that a likelihood that the computing resource will be accessed by the application when the application is executed on the second computing device is above a given threshold, the application server having verified that a number of first computing devices, from which the application server received data indicating that an attempt to access the computing resource on each of the first computing devices was made, meets or exceeds a predefined threshold, and determining, based on the data, that the likelihood that the computing resource on the second computing device, that the application is not configured to access when the application is executed, will be accessed by the application when the application is executed on the second computing device is above the given threshold; and displaying, in a user interface of the second computing device, a first permission request to allow the application to access the computing resource on the second computing device that the application is not configured to access when the application is executed. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A second computing device configured to manage access to a computing resource, the second computing device comprising a processor configured to:
-
determine at least one computing resource on the second computing device that an application is configured to access when the application is executed; for a computing resource on the second computing device that the application is not configured to access when the application is executed; receive, at the second computing device, data from an application server that indicates that a likelihood that the computing resource will be accessed by the application when the application is executed on the second computing device is above a given threshold, the application server having verified that a number of first computing devices, from which the application server received data indicating that an attempt to access the computing resource on each of the first computing devices was made, meets or exceeds a predefined threshold, and determine, based on the data, that the likelihood that the computing resource on the second computing device, that the application is not configured to access when the application is executed, will be accessed by the application when the application is executed on the second computing device is above the given threshold; and display, in a user interface of the second computing device, a first permission request to allow the application to access the computing resource on the second computing device that the application is not configured to access when the application is executed. - View Dependent Claims (22)
-
-
23. A non-transitory computer-readable medium comprising instructions which, when executed by a processor of a second computing device, cause the processor to perform a method of managing access to a computing resource, wherein the method comprises:
-
determining at least one computing resource on the second computing device that an application is configured to access when the application is executed; for a computing resource on the second computing device that the application is not configured to access when the application is executed; receiving, at the second computing device, data from an application server that indicates that a likelihood that the computing resource will be accessed by the application when the application is executed on the second computing device is above a given threshold, the application server having verified that a number of first computing devices, from which the application server received data indicating that an attempt to access the computing resource on each of the first computing devices was made, meets or exceeds a predefined threshold, and determining, based on the data, that the likelihood that the computing resource on the second computing device, that the application is not configured to access when the application is executed, will be accessed by the application when the application is executed on the second computing device is above the given threshold; and displaying, in a user interface of the second computing device, a first permission request to allow the application to access the computing resource on the second computing device that the application is not configured to access when the application is executed.
-
-
24. A system for managing access to a computer resource, wherein the system comprises:
-
a first computing device configured to transmit data to an application server, wherein the first computing device comprises a first processor configured to; execute an application, wherein an attempt to access a computing resource on the first computing device is made by the application; determine that the application is not configured to access the computing resource, in response to the attempt; display, in a user interface of the first computing device, a permission request to allow the application to access the computing resource on the first computing device; and transmit data to the application server, the data notifying the application server that the attempt to access the computing resource was made by the application when the application was not configured to access the computing resource; the application server, comprising a second processor configured to; receive, from the first computing device, data indicating that the attempt to access the computing resource on the first computing device was made by the application when the application was not configured to access the computing resource on the first computing device; verify that a number of first computing devices from which the data is received meets or exceeds a predefined threshold; after the verifying, for the computing resource on at least one different second computing device that corresponds to the computing resource on the first computing device, determine that a likelihood that the computing resource on the at least one different second computing device will be accessed by the application when the application is executed on the at least one different second computing device is above a given threshold; and transmit, to the at least one different second computing device, data indicating that the likelihood that the computing resource on the at least one different second computing device will be accessed by the application when the application is executed on the at least one different second computing device is above the given threshold; and the different second computing device, comprising a third processor configured to; determine at least one computing resource on the different second computing device that the application is configured to access when the application is executed; for a computing resource on the different second computing device that the application is not configured to access when the application is executed; receive, at the different second computing device, application server data that indicates that the likelihood that the computing resource on the different second computing device will be accessed by the application when the application is executed on the different second computing device is above the given threshold, and determine, based on the application server data, that the likelihood that the computing resource on the different second computing device, that the application is not configured to access when the application is executed, will be accessed by the application when the application is executed on the different second computing device is above the given threshold; and display, in a user interface of the different second computing device, a permission request to allow the application to access the computing resource on the different second computing device that the application is not configured to access when the application is executed.
-
Specification