Verifying requests to remove applications from a device
First Claim
1. A method comprising:
- receiving a request to remove a first application from a first device, the removal request being received at a verification platform adapted for communication with the first device, the first application comprising a first watcher application configured to monitor a status of a second application on the first device;
identifying, at the verification platform, one or more verification rules previously established by a user of the first device for processing of the removal request;
sending a notification regarding said one or more verification rules from the verification platform;
receiving, at the verification platform, verification input responsive to the notification; and
granting or denying, at the verification platform, the removal request based at least in part on the received verification input;
wherein protected application data associated with the second application is removed from the first device responsive to denial of the removal request.
10 Assignments
0 Petitions
Accused Products
Abstract
A method comprises receiving a request to remove a given application from a first device, identifying one or more verification rules previously established by a user of the first device for processing of the removal request, sending a notification regarding said one or more verification rules, receiving verification input responsive to the notification, and granting or denying the removal request based at least in part on the received verification input. Denying the removal request comprises removing protected application data from the first device. Receiving the removal request, identifying one or more verification rules, sending the notification, receiving the verification input, and granting or denying the removal request may be implemented in a verification platform adapted for communication with the first device.
50 Citations
20 Claims
-
1. A method comprising:
-
receiving a request to remove a first application from a first device, the removal request being received at a verification platform adapted for communication with the first device, the first application comprising a first watcher application configured to monitor a status of a second application on the first device; identifying, at the verification platform, one or more verification rules previously established by a user of the first device for processing of the removal request; sending a notification regarding said one or more verification rules from the verification platform; receiving, at the verification platform, verification input responsive to the notification; and granting or denying, at the verification platform, the removal request based at least in part on the received verification input; wherein protected application data associated with the second application is removed from the first device responsive to denial of the removal request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
receiving a request to remove a given application from a first device, the removal request being received at a verification platform adapted for communication with the first device; identifying, at the verification platform, one or more verification rules previously established by a user of the first device for processing of the removal request; sending a notification regarding said one or more verification rules from the verification platform; receiving, at the verification platform, verification input responsive to the notification; and granting or denying, at the verification platform, the removal request based at least in part on the received verification input; wherein protected application data is removed from the first device responsive to denial of the removal request; and wherein the given application comprises a first watcher application configured to monitor requests to stop or remove a second watcher application.
-
-
11. An article of manufacture comprising a processor-readable storage medium having embodied therein one or more software programs, wherein the one or more software programs when executed by at least one processing device cause the at least one processing device:
-
to receive a request to remove a first application from a first device, the removal request being received at a verification platform adapted for communication with the first device, the first application comprising a first watcher application configured to monitor a status of a second application on the first device; to identify, at the verification platform, one or more verification rules previously established by a user of the first device for processing of the removal request; to send a notification regarding said one or more verification rules from the verification platform; to receive, at the verification platform, verification input responsive to the notification; and to grant or deny, at the verification platform, the removal request based at least in part on the received verification input; wherein protected application data associated with the second application is removed from the first device responsive to denial of the removal request.
-
-
12. An apparatus comprising:
-
a verification platform comprising at least one processing device having a processor coupled to a memory, the verification platform being adapted for communication with a first device; wherein the verification platform is configured; to receive a request to remove a first application from the first device, the first application comprising a first watcher application configured to monitor a status of a second application on the first device; to identify one or more verification rules previously established by a user of the first device for processing of the removal request; to send a notification regarding said one or more verification rules; to receive verification input responsive to the notification; and to grant or deny the removal request based at least in part on the received verification input; wherein protected application data associated with the second application is removed from the first device responsive to denial of the removal request. - View Dependent Claims (13, 14)
-
-
15. A method comprising:
-
receiving a request from a user to remove a first application from a first device, the first application comprising a first watcher application configured to monitor a status of a second application on the first device; sending the removal request to a verification platform; removing the given application responsive to the verification platform granting the removal request; and removing protected application data associated with the second application from the first device responsive to the verification platform denying the removal request; wherein the verification platform grants or denies the removal request based at least in part on verification input, the verification input being based on one or more verification rules previously established by a user of the first device for processing of the removal request. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification