Controlling distribution of resources in a network
First Claim
1. A computing device comprising at least one processor and at least one memory storing program code, the memory and program code being configured to, with the at least one processor, cause the computing device to at least:
- receive, from a client device, a request to access a distribution service associated with a plurality of resources;
determine whether the client device is authorized to access the distribution service;
determine, in response to the determination that the client device is authorized to access the distribution service, one or more resources of the plurality of the resources that are approved for the provision to the client device by at least;
identifying one or more resource grouping identifiers associated with the client device or a user of the client device;
identifying, based at least in part on the identified one or more resource grouping identifiers, one or more particular resources associated with the one or more resource grouping identifiers, anddetermining, for each of the particular resources, whether the client device complies with one or more distribution rules respectively associated with the particular resources, wherein at least one of the distribution rules specifies that the received resources may be accessed only by authorized applications;
cause the one or more resources approved for the provision to the client device to be provided to the client device; and
responsive to detecting an attempt to access the received resources by an unauthorized application, blocking the access by the unauthorized application.
6 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments for controlling distribution of data on a network. In one embodiment, a distribution service receives a request from a user on a client device to access the distribution service. In response, the distribution service determines whether the user and the client device are authorized to access the distribution service. The distribution service identifies which of the resources are accessible to the user and the client device pairing based on a plurality of resource grouping identifiers. The distribution service then determines whether the client device complies with a plurality of distribution rules associated with the identified resources. Upon determining that the client device is compliant, the distribution service transmits the resources related to the compliance.
-
Citations
22 Claims
-
1. A computing device comprising at least one processor and at least one memory storing program code, the memory and program code being configured to, with the at least one processor, cause the computing device to at least:
-
receive, from a client device, a request to access a distribution service associated with a plurality of resources; determine whether the client device is authorized to access the distribution service; determine, in response to the determination that the client device is authorized to access the distribution service, one or more resources of the plurality of the resources that are approved for the provision to the client device by at least; identifying one or more resource grouping identifiers associated with the client device or a user of the client device; identifying, based at least in part on the identified one or more resource grouping identifiers, one or more particular resources associated with the one or more resource grouping identifiers, and determining, for each of the particular resources, whether the client device complies with one or more distribution rules respectively associated with the particular resources, wherein at least one of the distribution rules specifies that the received resources may be accessed only by authorized applications; cause the one or more resources approved for the provision to the client device to be provided to the client device; and responsive to detecting an attempt to access the received resources by an unauthorized application, blocking the access by the unauthorized application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, comprising:
-
transmitting, from a client device comprising at least one processor and at least one memory storing program code, a request to access a distribution service associated with a plurality of resources; receiving at the client device, one or more resources selected from the plurality of resources for provision to the client device, said resources being selected by the distribution service by at least; identifying one or more resource grouping identifiers associated with the client device or a user of the client device, and identifying, based at least in part on the identified one or more resource grouping identifiers, one or more particular resources associated with the one or more resource grouping identifiers; receiving, at the client device, one or more distribution rules respectively associated with each of the received resources, wherein at least one of the distribution rules specifies that the received resources may be accessed only by authorized applications; determining, via the at least one processor of the client device, for at least one of the received resources, whether the client device complies with the one or more distribution rules associated with the at least one received resource; responsive to a determination that the client device compiles with the one or more distribution rules associated with the at least one received resource, causing the at least one received resource to be rendered via a display associated with the client device; and responsive to detecting an attempt to access the received resources by an unauthorized application, blocking the access by the unauthorized application. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable medium embodying program code portions executable by a computing device, the program code portions being configured to, upon execution by the computing device, cause the computing device to at least:
-
receive a request from a client device to access a distribution service associated with a plurality of resources; determine whether the client device is authorized to access the distribution service; determine, in response to the determination that the client device is authorized to access the distribution service, one or more resources of the plurality of resources that are approved for provision to the client device by at least; identifying one or more resource grouping identifiers associated with the client device or a user of the client device, identifying, based at least in part on the identified one or more resource grouping identifiers, one or more particular resources associated with the one or more resource grouping identifiers, and determining, for each of the particular resources, whether the client device complies with one or more distribution rules respectively associated with the particular resources, wherein at least one of the distribution rules specifies that the received resources may be accessed only by authorized applications; cause the one or more resources approved for provision to the client device to be provided to the client device; and responsive to detecting an attempt to access the received resources by an unauthorized application, blocking the access by the unauthorized application. - View Dependent Claims (18, 19, 20, 21, 22)
-
Specification