×

System and method for resolving conflicts between application control rules

  • US 9,432,406 B2
  • Filed: 03/31/2015
  • Issued: 08/30/2016
  • Est. Priority Date: 06/28/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for configuring application control rules, comprising:

  • installing security software on a plurality of computing devices in a network, wherein the security software is configured to control execution of applications on the computing devices using a plurality of application control rules, each computing device being associated with one or more user accounts, each user account having a first unique identifier, and each application having a second unique identifier;

    during launching of at least one application on at least one of the plurality of computing devices for testing a new application control rule, transmitting, by the security software from each of the plurality of computing devices in the network, to an administrative server, information relating to one or more user account records and software applications deployed on each computing device for the identification and resolution of conflicts between the new application control rule and one or more existing application control rules, wherein the one or more existing application control rules comprise information linking at least one or more applications each having the second unique identifier with each user account having the first unique identifier, and the conflict is resolved by assigning different priorities to the conflicting rules;

    based at least upon the second unique identifier corresponding to the at least one application launched, receiving from the administrative server, by the security software on the at least one of the plurality of computing devices, an application control rule reconfigured with a lower or higher priority than one or more conflicting application control rules to eliminate a conflict between the new application control rule and the one or more existing application control rules; and

    applying, by the security software, the one or more application control rules to the applications on the computing devices based on the priorities of said application control rules.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×