Disabling applications on a client device remotely
First Claim
1. A method comprising:
- establishing, by a processing device of a server computing device via a network interface device, a communication connection with a client computing device, wherein the communication connection comprises a request to access an application store maintained by the server computing device;
receiving, via the communication connection, a list of applications installed on the client computing device, wherein receiving the list of applications is part of a handshake protocol associated with the request to access the application store, wherein the list of applications received from the client computing device is maintained in a data store associated with the server computing device;
comparing, by the processing device, the received list of applications to a blacklist of applications maintained by the server computing device, wherein each application in the blacklist is associated with a severity score that differs among the applications on the blacklist according to a measure of invasiveness of the respective application;
identifying, in view of the comparing, an installed application on the received list of applications, the installed application comprised in the blacklist of applications;
identifying, by the processing device, the severity score corresponding to the installed application;
identifying an action of a plurality of actions, the action corresponding to a value of the severity score, wherein the plurality of actions corresponding to respective ranges of values of the severity score;
responsive to the identifying of the severity score and the corresponding action, causing, by the processing device, the corresponding action to be performed with respect to the client computing device, the corresponding action pertaining to the installed application; and
referencing, on a periodic basis, the blacklist of applications with the list of applications of the client computing device in the data store to identify whether there is an application match between the list of applications and the blacklist of applications.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for disabling applications on a client device remotely are disclosed. An example method may comprise establishing, via a network interface device, a communication connection with a client computing device, receiving, via the communication connection, a list of applications installed on the client computing device, comparing the received list of applications to a blacklist of applications, identifying, in view of the comparing, an installed application on the received list of applications, the installed application comprised in the blacklist of applications, identifying a severity score corresponding to the installed application and an action corresponding to the severity score, and responsive to the identifying the severity score and the corresponding action, causing, by the processing device, the corresponding action to be performed with respect to the client computing device, the corresponding action pertaining to the installed application.
9 Citations
17 Claims
-
1. A method comprising:
-
establishing, by a processing device of a server computing device via a network interface device, a communication connection with a client computing device, wherein the communication connection comprises a request to access an application store maintained by the server computing device; receiving, via the communication connection, a list of applications installed on the client computing device, wherein receiving the list of applications is part of a handshake protocol associated with the request to access the application store, wherein the list of applications received from the client computing device is maintained in a data store associated with the server computing device; comparing, by the processing device, the received list of applications to a blacklist of applications maintained by the server computing device, wherein each application in the blacklist is associated with a severity score that differs among the applications on the blacklist according to a measure of invasiveness of the respective application; identifying, in view of the comparing, an installed application on the received list of applications, the installed application comprised in the blacklist of applications; identifying, by the processing device, the severity score corresponding to the installed application; identifying an action of a plurality of actions, the action corresponding to a value of the severity score, wherein the plurality of actions corresponding to respective ranges of values of the severity score; responsive to the identifying of the severity score and the corresponding action, causing, by the processing device, the corresponding action to be performed with respect to the client computing device, the corresponding action pertaining to the installed application; and referencing, on a periodic basis, the blacklist of applications with the list of applications of the client computing device in the data store to identify whether there is an application match between the list of applications and the blacklist of applications. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising, a memory;
-
a network interface device; and a processor operatively coupled to the memory and the network interface device, the processor to; establish, via the network interface device, a communication connection with a client computing device, wherein the communication connection comprises a request to access an application store maintained by the server computing device; receive, via the communication connection, a list of applications installed on the client computing device, wherein receiving the list of applications is part of a handshake protocol associated with the request to access the application store, wherein the list of applications received from the client computing device is maintained in a data store associated with the server computing device; determine that an installed application on the received list of applications is comprised in a blacklist of applications, wherein each application in the blacklist is associated with a severity score that differs among the applications on the blacklist according to a measure of invasiveness of the respective application; identify the severity score corresponding to the installed application; identify an action of a plurality of actions, the action corresponding to a value of the severity score, wherein the plurality of actions corresponding to respective ranges of values of the severity score; responsive to the identifying of the severity score and the corresponding action, transmit instructions to the client computing device, the instructions to cause the corresponding action to be performed at the client computing device; and reference, on a periodic basis, the blacklist of applications with the list of applications of the client computing device in the data store to identify whether there is an application match between the list of applications and the blacklist of applications. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A non-transitory machine-readable storage medium storing instructions that cause a processing device to:
-
establishing, by a processing device of a client computing device via a network interface device, a communication connection with a server computing device, wherein the communication connection enables access to an application store maintained by the server computing device, wherein the server computing device maintaining a blacklist of applications, wherein each application in the blacklist is associated with a severity score that differs among the applications on the blacklist according to a measure of invasiveness of the respective application, and wherein accessing a list of applications installed on the client computing device is part of a handshake protocol associated with a request to access the application store; transmit, via the communication connection to the server computing device, a list of applications installed on the client computing device; receive, at the client computing device, instructions to cause an action to be performed on the client computing device, the action corresponding to an installed application on the client computing device that is identified in the blacklist of applications maintained by the server computing device and the action corresponding to the severity score of the identified application in the blacklist; and executing, by the processing device, the instructions to cause the action to be performed, the action pertaining to the installed application; wherein the list of applications installed on the client computing device is maintained in a data store associated with the server computing device, and wherein the blacklist of applications is referenced, on a periodic basis, with the list of applications of the client computing device in the data store to identify whether there is an application match between the list of applications and the blacklist of applications. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification