Techniques to apply and share remote policies on mobile devices
First Claim
1. A computer-implemented method, comprising:
- connecting to an enterprise server with a first enterprise application on a personal device using an enterprise account for a user of the personal device, the first enterprise application selected from among a group of applications including an electronic mail application, a word processing application, a video conferencing application, and a collaboration application;
receiving a policy for the first enterprise application from the enterprise server at the first enterprise application, the policy comprising one or more rules that one or more applications must follow to interact with the enterprise server;
the policy comprising a password policy including a requirement for re-entry of a password after a specified period of inactivity;
applying, by a processor circuit, the policy to the first enterprise application;
applying, by the processor circuit, the policy to a second enterprise application on the personal device automatically when the second enterprise application is used;
generating a policy key at the personal device representing the policy applied to the first and second enterprise applications on the personal device; and
transmitting the policy key from the personal device to the enterprise server to validate compliance with the policy by the personal device;
wherein activity within either of the first enterprise application or the second enterprise application satisfies the password policy to avoid re-entry of the password in either of the first enterprise application or the second enterprise application within the specified period; and
wherein at least one aspect of the policy is not applied to a non-enterprise application on the personal device.
4 Assignments
0 Petitions
Accused Products
Abstract
Techniques to apply and share remote policies on personal devices are described. In an embodiment, a technique includes contacting an enterprise server from an enterprise application operating on a personal device. The enterprise application may receive policies from the enterprise server. The policies may be applied to the enterprise application. When a second enterprise application on the personal device is launched, the policies may also be applied to the second enterprise application. When a policy is changed on the enterprise server, notification is pushed to the personal device and all related enterprise applications on the personal device may be updated to enforce the policy change. Other embodiments are described and claimed.
-
Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
connecting to an enterprise server with a first enterprise application on a personal device using an enterprise account for a user of the personal device, the first enterprise application selected from among a group of applications including an electronic mail application, a word processing application, a video conferencing application, and a collaboration application; receiving a policy for the first enterprise application from the enterprise server at the first enterprise application, the policy comprising one or more rules that one or more applications must follow to interact with the enterprise server;
the policy comprising a password policy including a requirement for re-entry of a password after a specified period of inactivity;applying, by a processor circuit, the policy to the first enterprise application; applying, by the processor circuit, the policy to a second enterprise application on the personal device automatically when the second enterprise application is used; generating a policy key at the personal device representing the policy applied to the first and second enterprise applications on the personal device; and transmitting the policy key from the personal device to the enterprise server to validate compliance with the policy by the personal device; wherein activity within either of the first enterprise application or the second enterprise application satisfies the password policy to avoid re-entry of the password in either of the first enterprise application or the second enterprise application within the specified period; and wherein at least one aspect of the policy is not applied to a non-enterprise application on the personal device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An article of manufacture comprising a computer-readable storage device containing instructions that when executed cause a system to:
-
receive a policy from an enterprise server for a first enterprise application at the first enterprise application, the first enterprise application using an enterprise account for a user of a personal device to connect to the enterprise server, the policy comprising one or more rules that the one or more applications must follow to interact with the enterprise server;
the policy comprising a password policy including a requirement for re-entry of a password after a specified period of inactivity, the first enterprise application selected from among a group of applications including an electronic mail application, a word processing application, a video conferencing application, and a collaboration application;apply the policy to the first enterprise application; apply the policy to a second enterprise application on the device when the second enterprise application is used; generate a policy key at the personal device representing the policy applied to the first and second enterprise applications on the personal device; and transmit the policy key from the personal device to the enterprise server to validate compliance with the policy by the personal device; wherein activity within either of the first enterprise application or the second enterprise application satisfies the password policy to avoid re-entry of the password in either of the first enterprise application or the second enterprise application within the specified period; and wherein at least one aspect of the policy is not applied to a non-enterprise application on the personal device. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. An apparatus, comprising:
-
a memory store to store personal data and enterprise data; a processing unit coupled to the memory store; and multiple enterprise applications executable on the processing unit and operative to connect to an enterprise server using an enterprise account for a user of a personal device, receive a policy for a first enterprise application from the enterprise server at the first enterprise application, and automatically apply the policy for the first enterprise application to a second enterprise application, the policy comprising one or more rules that one or more applications must follow to interact with the enterprise server;
the policy comprising a password policy including a requirement for re-entry of a password after a specified period of inactivity;wherein the first enterprise application is selected from among a group of applications including an electronic mail application, a word processing application, a video conferencing application, and a collaboration application; and wherein the apparatus generates a policy key representing the policy applied to the first and second enterprise applications and transmits the policy key from the personal device to the enterprise server to validate compliance with the policy by the personal device; wherein activity within either of the first enterprise application or the second enterprise application satisfies the password policy to avoid re-entry of the password in either of the first enterprise application or the second enterprise application within the specified period; and wherein at least one aspect of the policy is not applied to a non-enterprise application on the personal device. - View Dependent Claims (18, 19, 20)
-
Specification