Management of application access
First Claim
1. A method comprising:
- obtaining, by a device that comprises a processor, an access control for an application program that is installed at the device, wherein the device is configured to deny access to application programs installed at the device when the device is locked, and wherein the access control specifies that an entity using the device is allowed to access the application program when the device is locked without the entity unlocking the device and without the device authenticating the entity; and
presenting, by the device, a user interface that comprises a lock screen comprising a first user interface control that is selectable to present an application access screen and a second user interface control that is selectable to initiate unlocking of the device, wherein the device is configured to respond to an interaction with the first user interface control by the entity by presenting, by the device without unlocking the device and without authenticating the entity, the application access screen, wherein the application access screen comprises a third user interface control that corresponds to the application program, wherein selection of the third user interface control causes the device to allow access to the application program without the entity unlocking the device and without the device authenticating the entity.
1 Assignment
0 Petitions
Accused Products
Abstract
Concepts and technologies are disclosed herein for management of application access. A security management application can be configured to set access controls and/or other security settings relating to application programs. Additionally, or alternatively, particular functions and/or functionality associated with application programs may be individually configured. Settings reflecting the access controls and/or other security settings can be stored and can be applied at the user device. The security management application also can be configured to determine if security settings and/or access controls are to be overridden. Data can be collected from various sensors and/or other sources to use in determining if particular application programs and/or application program functionality is to be allowed. Thus, normally disallowed activities can be allowed in emergency conditions, when in a business location associated with a particular device, and/or at other times and/or under other circumstances.
-
Citations
20 Claims
-
1. A method comprising:
-
obtaining, by a device that comprises a processor, an access control for an application program that is installed at the device, wherein the device is configured to deny access to application programs installed at the device when the device is locked, and wherein the access control specifies that an entity using the device is allowed to access the application program when the device is locked without the entity unlocking the device and without the device authenticating the entity; and presenting, by the device, a user interface that comprises a lock screen comprising a first user interface control that is selectable to present an application access screen and a second user interface control that is selectable to initiate unlocking of the device, wherein the device is configured to respond to an interaction with the first user interface control by the entity by presenting, by the device without unlocking the device and without authenticating the entity, the application access screen, wherein the application access screen comprises a third user interface control that corresponds to the application program, wherein selection of the third user interface control causes the device to allow access to the application program without the entity unlocking the device and without the device authenticating the entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 18, 19)
-
-
8. A computer storage medium having computer-executable instructions stored thereon that, when executed by a processor, cause the processor to perform operations comprising:
-
obtaining an access control for an application program that is installed at a device, wherein the device is configured to deny access to application programs installed at the device when the device is locked, and wherein the access control specifies that an entity using the device is allowed to access the application program when the device is locked without the entity unlocking the device and without the device authenticating the entity; and presenting a user interface that comprises a lock screen comprising a first user interface control that is selectable to present an application access screen and a second user interface control that is selectable to initiate unlocking of the device, wherein the device is configured to respond to an interaction with the first user interface control by the entity by presenting, without authenticating the entity, the application access screen, wherein the application access screen comprises a third user interface control that corresponds to the application program, wherein selection of the third user interface control causes the device to allow access to the application program without the entity unlocking the device and without the device authenticating the entity. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A device comprising:
-
a processor; and a memory that stores computer-executable instructions that, when executed by the processor, cause the processor to perform operations comprising obtaining an access control for an application program that is installed at the device, wherein the device is configured to deny access to application programs installed at the device when the device is locked, and wherein the access control specifies that an entity using the device is allowed to access the application program when the device is locked without the entity unlocking the device and without the device authenticating the entity; and presenting a user interface that comprises a lock screen comprising a first user interface control that is selectable to present an application access screen and a second user interface control that is selectable to initiate unlocking of the device, wherein the device is configured to respond to an interaction with the first user interface control by the entity by presenting, without authenticating the entity and without unlocking the device, the application access screen, wherein the application access screen comprises a third user interface control that corresponds to the application program, wherein the third user interface control is selectable to cause the device to allow access to the application program without unlocking the device and without the device authenticating the entity. - View Dependent Claims (15, 16, 17, 20)
-
Specification