Remote device filter
First Claim
1. A method, comprising:
- installing a first application on a device;
monitoring the installation;
generating a report describing the first application that was installed;
connecting to a censored network;
sending the report to a censored server that is associated with the censored network;
receiving instructions regarding the first application from the censored server;
based on the instructions, uninstalling the first application;
the censored server comparing the description of the first application in the report to a list of banned or allowed applications;
based on the comparison, sending instructions to the device to uninstall the first application, wherein the application is a banned application;
executing a second application on the device;
generating a second report describing the second application as being executed;
connecting to the censored network while the second application is being executed;
sending the second report to the censored server that is associated with the censored network;
receiving second instructions regarding the second application from the censored server;
based on the second instructions, stopping the execution of the second application, wherein the second application is neither a banned application nor an allowed application;
executing a third application on the device;
generating a third report describing the third application as being executed;
connecting to the censored network while the third application is being executed;
sending the third report to the censored server that is associated with the censored network;
receiving third instructions regarding the third application from the censored server; and
based on the third instructions, allowing the third application to continue to execute.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and devices for connecting a mobile device with different data storage devices located either locally or remotely are provided. The device may apply one or more rules to create a hierarchical virtualization of the several data storage devices. The virtualization may then be provided to the user as a single, hierarchical file system. Further, a monitoring system may monitor the file system to determine if any new applications have been installed or if applications are currently being executed. If a connection is made to a secure network, the system may provide the information derived from the monitoring to the secure network. The secure network can then analyze the information to determine if any of the applications should be uninstalled from the device or should be stopped while the device is connected to the network.
128 Citations
20 Claims
-
1. A method, comprising:
-
installing a first application on a device; monitoring the installation; generating a report describing the first application that was installed; connecting to a censored network; sending the report to a censored server that is associated with the censored network; receiving instructions regarding the first application from the censored server; based on the instructions, uninstalling the first application; the censored server comparing the description of the first application in the report to a list of banned or allowed applications; based on the comparison, sending instructions to the device to uninstall the first application, wherein the application is a banned application; executing a second application on the device; generating a second report describing the second application as being executed; connecting to the censored network while the second application is being executed; sending the second report to the censored server that is associated with the censored network; receiving second instructions regarding the second application from the censored server; based on the second instructions, stopping the execution of the second application, wherein the second application is neither a banned application nor an allowed application; executing a third application on the device; generating a third report describing the third application as being executed; connecting to the censored network while the third application is being executed; sending the third report to the censored server that is associated with the censored network; receiving third instructions regarding the third application from the censored server; and based on the third instructions, allowing the third application to continue to execute. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A device, comprising:
-
a first screen, the first screen including a first gesture capture region; a second screen, wherein the second screen faces an opposite direction from the first screen when the device is closed, and wherein an image capture lens is associated with the second screen; a memory; a processor in communication with the memory, the first screen, and the second screen, the processor operable to; install a first, second, and third application on a device; monitor the installation of the first, second, and third application; generate a first report describing the first application that was installed; connect to a censored network; send the first report to a censored server that is associated with the censored network; receive first instructions regarding the first application from the censored server; based on the first instructions, uninstall the first application, wherein the application is a banned application; after install, execute the second and the third applications on the device; generate a second report describing the second application as being executed; generate a third report describing the third application as being executed; connect to the censored network while the second application is being executed; connect to the censored network while the third application is being executed; send the second report and the third report to the censored server that is associated with the censored network; receive second instructions regarding the second application from the censored server; based on the second instructions, stop the execution of the second application, wherein the second application is neither a banned application nor an allowed application; receive third instructions regarding the third application from the censored server; and based on the third instructions, allow the third application to continue to execute, wherein third application is an allowed application. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A non-transitory computer readable medium having stored thereon computer-executable instructions, the computer executable instructions causing a processor of a device to execute a method for providing a remote device filter, the computer-executable instructions comprising:
-
instructions to connect a censored server that is associated with a censored network with a device; instructions to receive a report describing an application that was installed on the device; instructions to compare the description of the application in the report to a list of banned or allowed applications; and based on the comparison, sending instructions to the device to uninstall the application, wherein the application is a banned application; after install, instructions to execute the second and the third applications on the device; instructions to generate a second report describing the second application as being executed; instructions to generate a third report describing the third application as being executed; instructions to connect to the censored network while the second application is being executed; instructions to connect to the censored network while the third application is being executed; instructions to send the second report and the third report to the censored server that is associated with the censored network; instructions to receive second instructions regarding the second application from the censored server; based on the second instructions, sending instructions to the device to stop the execution of the second application, wherein the second application is neither a banned application nor an allowed application; instructions to receive third instructions regarding the third application from the censored server; and based on the third instructions, instructions to allow the third application to continue to execute, wherein third application is an allowed application. - View Dependent Claims (17, 18, 19, 20)
-
Specification