Security certification and application categorization for mobile device management
First Claim
1. A computer-implemented method for managing mobile devices associated with enterprise operations, the method being executed using one or more processors and comprising:
- receiving, by the one or more processors, a request to access information regarding at least one mobile application for download to and installation on a mobile device of a user, the request comprising an identifier associated with an enterprise, the identifier being unique to the enterprise and distinguishing the enterprise from other enterprises;
receiving, by the one or more processors, a tenant-specific configuration based on the identifier, the tenant-specific configuration comprising a plurality of criteria for mobile applications to be available for download to and installation on mobile devices associated with the enterprise, at least one of the plurality of criteria being associated with vendors of the mobile applications that are independent from the enterprise;
transmitting, by the one or more processors, a request for a list of available mobile applications to an application and certification database, the request comprising the tenant-specific configuration;
receiving, by the one or more processors, the list of available mobile applications, which comprises a subset of mobile applications of a superset of mobile applications, the subset of mobile applications being provided based on the tenant-specific configuration by using automated assessments and integrating an existing certification;
providing, by the one or more processors, graphical representations of each mobile application in the list of available mobile applications for display to the user, the graphical representations being ranked based on at least two different criteria that are selected by the user of the mobile device, the list of available mobile applications further grouped according to the at least two different criteria, at least one of the criteria being a risk of installing each mobile application; and
installing, by the one or more processors and on the mobile device of the user, a mobile application selected from the list of available mobile applications.
1 Assignment
0 Petitions
Accused Products
Abstract
Implementations for managing mobile devices associated with enterprise operations include actions of receiving a request to access information regarding a mobile application for download to and installation on a mobile device of a user, the request including an enterprise identifier, receiving a tenant-specific configuration based on the identifier, the tenant-specific configuration including criteria for mobile applications to be available for download to and installation on mobile devices associated with the enterprise, transmitting a request for a list of available mobile applications to an application and certification database, the request including the tenant-specific configuration, receiving the list of available mobile applications, which includes a subset of mobile applications of a superset of mobile applications, the subset of mobile applications being provided based on the tenant-specific configuration, and providing graphical representations of each mobile application in the list of available mobile applications for display to the user.
17 Citations
20 Claims
-
1. A computer-implemented method for managing mobile devices associated with enterprise operations, the method being executed using one or more processors and comprising:
-
receiving, by the one or more processors, a request to access information regarding at least one mobile application for download to and installation on a mobile device of a user, the request comprising an identifier associated with an enterprise, the identifier being unique to the enterprise and distinguishing the enterprise from other enterprises; receiving, by the one or more processors, a tenant-specific configuration based on the identifier, the tenant-specific configuration comprising a plurality of criteria for mobile applications to be available for download to and installation on mobile devices associated with the enterprise, at least one of the plurality of criteria being associated with vendors of the mobile applications that are independent from the enterprise; transmitting, by the one or more processors, a request for a list of available mobile applications to an application and certification database, the request comprising the tenant-specific configuration; receiving, by the one or more processors, the list of available mobile applications, which comprises a subset of mobile applications of a superset of mobile applications, the subset of mobile applications being provided based on the tenant-specific configuration by using automated assessments and integrating an existing certification; providing, by the one or more processors, graphical representations of each mobile application in the list of available mobile applications for display to the user, the graphical representations being ranked based on at least two different criteria that are selected by the user of the mobile device, the list of available mobile applications further grouped according to the at least two different criteria, at least one of the criteria being a risk of installing each mobile application; and installing, by the one or more processors and on the mobile device of the user, a mobile application selected from the list of available mobile applications. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable storage medium coupled to one or more processors and having instructions stored thereon which, when executed by the one or more processors, cause the one or more processors to perform operations for managing mobile devices associated with enterprise operations, the operations comprising:
-
receiving a request to access information regarding at least one mobile application for download to and installation on a mobile device of a user, the request comprising an identifier associated with an enterprise, the identifier being unique to the enterprise and distinguishing the enterprise from other enterprises; receiving a tenant-specific configuration based on the identifier, the tenant-specific configuration comprising a plurality of criteria for mobile applications to be available for download to and installation on mobile devices associated with the enterprise, at least one of the plurality of criteria being associated with vendors of the mobile applications that are independent from the enterprise; transmitting a request for a list of available mobile applications to an application and certification database, the request comprising the tenant-specific configuration; receiving the list of available mobile applications, which comprises a subset of mobile applications of a superset of mobile applications, the subset of mobile applications being provided based on the tenant-specific configuration by using automated assessments and integrating an existing certification; providing graphical representations of each mobile application in the list of available mobile applications for display to the user, the graphical representations being ranked based on at least two different criteria that are selected by the user of the mobile device, the list of available mobile applications further grouped according to the at least two different criteria, at least one of the criteria being a risk of installing each mobile application; and installing, on the mobile device of the user, a mobile application selected from the list of available mobile applications. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system, comprising:
-
a computing device; and a computer-readable storage device coupled to the computing device and having instructions stored thereon which, when executed by the computing device, cause the computing device to perform operations for managing mobile devices associated with enterprise operations, the operations comprising; receiving a request to access information regarding at least one mobile application for download to and installation on a mobile device of a user, the request comprising an identifier associated with an enterprise, the identifier being unique to the enterprise and distinguishing the enterprise from other enterprises; receiving a tenant-specific configuration based on the identifier, the tenant-specific configuration comprising a plurality of criteria for mobile applications to be available for download to and installation on mobile devices associated with the enterprise, at least one of the plurality of criteria being associated with vendors of the mobile applications that are independent from the enterprise; transmitting a request for a list of available mobile applications to an application and certification database, the request comprising the tenant-specific configuration; receiving the list of available mobile applications, which comprises a subset of mobile applications of a superset of mobile applications, the subset of mobile applications being provided based on the tenant-specific configuration by using automated assessments and integrating an existing certification; providing graphical representations of each mobile application in the list of available mobile applications for display to the user, the graphical representations being ranked based on at least two different criteria that are selected by the user of the mobile device, the list of available mobile applications further grouped according to the at least two different criteria, at least one of the criteria being a risk of installing each mobile application; and installing, on the mobile device of the user, a mobile application selected from the list of available mobile applications. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification