Monitoring and controlling electronic activity using third party rule submission and validation
First Claim
Patent Images
1. A method comprising:
- receiving, at a policy server, a first rule comprising a variable and a value specified for the variable;
generating, at the policy server, a policy based upon the first rule, wherein the policy defines electronic activity allowed at a device;
storing, by the policy server, the policy at a policy repository in communication with the policy server;
receiving, by the policy server, a second rule from a third party device;
determining, by the policy server, if third party rule submissions are enabled;
in response to determining that the third party rule submissions are enabled,validating, by the policy server, the second rule to determine if the second rule is legitimate,updating, by the policy server, the policy based upon the second rule to obtain an updated policy, andstoring, by the policy server, the updated policy at the policy repository;
detecting, by the policy server, electronic activity associated with the device;
identifying, by the policy server, a policy rule that relates to the electronic activity detected; and
determining, by the policy server, if the policy rule allows the electronic activity detected.
1 Assignment
0 Petitions
Accused Products
Abstract
Concepts and technologies are disclosed herein for monitoring and controlling electronic activity. A policy service can be called for policies for controlling electronic activity occurring at one or more managed devices. The policies can include a number of rules, each of which can include a number of variables. The rules can be defined by a manager device and/or received from third parties. Third party rule submissions can be validated. If electronic activity at the managed device deviates from a rule, the manager device can be notified and the electronic activity can be blocked. The manager device can update the policy and/or issue exceptions, if desired.
-
Citations
18 Claims
-
1. A method comprising:
-
receiving, at a policy server, a first rule comprising a variable and a value specified for the variable; generating, at the policy server, a policy based upon the first rule, wherein the policy defines electronic activity allowed at a device; storing, by the policy server, the policy at a policy repository in communication with the policy server; receiving, by the policy server, a second rule from a third party device; determining, by the policy server, if third party rule submissions are enabled; in response to determining that the third party rule submissions are enabled, validating, by the policy server, the second rule to determine if the second rule is legitimate, updating, by the policy server, the policy based upon the second rule to obtain an updated policy, and storing, by the policy server, the updated policy at the policy repository; detecting, by the policy server, electronic activity associated with the device; identifying, by the policy server, a policy rule that relates to the electronic activity detected; and determining, by the policy server, if the policy rule allows the electronic activity detected. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer storage medium having computer executable instructions stored thereon that, when executed by a processor, cause the processor to perform operations comprising:
-
receiving a first rule comprising a variable and a value specified for the variable; generating a policy based upon the first rule, wherein the policy defines electronic activity allowed at a device; storing the policy at a policy repository; receiving a second rule from a third party device; determining if third party rule submissions are enabled for the policy; in response to determining that the third party rule submissions are enabled, validating the second rule to determine if the second rule is legitimate; in response to determining that the second rule is legitimate, updating the policy based upon the second rule to obtain an updated policy; storing the updated policy at the policy repository; detecting electronic activity associated with the device; identifying a policy rule that relates to the electronic activity detected; and determining if the policy rule allows the electronic activity detected. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
receiving, at a policy server, a plurality of rules, each of the plurality of rules having a variable and a value specified for the variable; generating, by the policy server, a policy based upon the plurality of rules, wherein the policy defines electronic activity allowed at a managed device; receiving, by the policy server, a further rule from a third party device; determining, by the policy server, if third party rule submissions are enabled; and in response to determining that the third party rule submissions are enabled, validating the further rule to determine if the further rule is legitimate, updating the policy based upon the further rule to obtain an updated policy, and storing the updated policy at a policy repository; detecting, by the policy server, an attempt to conduct the electronic activity, the attempt associated with the managed device; identifying, by the policy server, the policy as being associated with the managed device; identifying, by the policy server, a policy rule that is relevant to the electronic activity, wherein the policy rule is included in the updated policy; and determining, by the policy server, if the policy rule permits the electronic activity based upon the variable and the value specified for the variable. - View Dependent Claims (15, 16, 17, 18)
-
Specification