System and method for privilege management and revocation
DCFirst Claim
1. A computer-implemented method for managing privileges associated with applications, the method comprising:
- monitoring a plurality of electronic devices within a system;
detecting a change in privileges associated with one or more applications resident on the plurality of electronic devices, wherein one or more privileges that are to be revoked are identified; and
in response to a detection of the change in privileges, revoking the one or more privileges, such that each of the one or more applications resident on the plurality of electronic devices no longer has access to the one or more privileges,wherein the one or more privileges comprises enabling the injection of browser filters.
2 Assignments
Litigations
1 Petition
Accused Products
Abstract
The present disclosure relates generally to the management of privileges associated with certain applications that are accessible by users of electronic equipment, such as, for example, networked computers, mobile wireless communications devices, and the like. In a broad aspect, a method for managing privileges associated with applications comprises: monitoring a plurality of electronic devices within a system; detecting a change in privileges associated with one or more applications resident on the plurality of electronic devices, wherein one or more privileges that are to be revoked are identified; and in response to a detection of the change in privileges, revoking the one or more privileges, such that each of the one or more applications resident on the plurality of electronic devices no longer has access to the one or more privileges.
234 Citations
20 Claims
-
1. A computer-implemented method for managing privileges associated with applications, the method comprising:
-
monitoring a plurality of electronic devices within a system; detecting a change in privileges associated with one or more applications resident on the plurality of electronic devices, wherein one or more privileges that are to be revoked are identified; and in response to a detection of the change in privileges, revoking the one or more privileges, such that each of the one or more applications resident on the plurality of electronic devices no longer has access to the one or more privileges, wherein the one or more privileges comprises enabling the injection of browser filters. - View Dependent Claims (3, 4, 5, 6, 7, 8)
-
-
2. A system for managing privileges associated with applications, the system comprising at least one processor configured to:
-
monitor a plurality of electronic devices within a system; detect a change in privileges associated with one or more applications resident on the plurality of electronic devices, wherein one or more privileges that are to be revoked are identified; and in response to a detection of the change in privileges, revoke the one or more privileges, such that each of the one or more applications resident on the plurality of electronic devices no longer has access to the one or more privileges, wherein the one or more privileges comprises enabling the injection of browser filters. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium storing instructions which, when executed by a processor of a computer system, result in:
-
monitoring a plurality of electronic devices within a system; detecting a change in privileges associated with one or more applications resident on the plurality of electronic devices, wherein one or more privileges that are to be revoked are identified; and in response to a detection of the change in privileges, revoking the one or more privileges, such that each of the one or more applications resident on the plurality of electronic devices no longer has access to the one or more privileges, wherein the one or more privileges comprises enabling the injection of browser filters. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification