Location based configuration profile toggling
First Claim
Patent Images
1. A method for enforcing a compliance rule associated with an enterprise, comprising:
- providing an agent application to a mobile computing device;
monitoring, by the agent application, a call by an application to an operating system;
determining, by the agent application, whether the call by the application invokes functionality associated with the compliance rule, the compliance rule requiring the mobile computing device to be in proximity of a second mobile computing device in order to invoke the functionality;
approving the call by the application when the mobile computing device is in the proximity of the second mobile computing device, andblocking the call by the application when the mobile computing device is outside the proximity of the second mobile computing device.
0 Assignments
0 Petitions
Accused Products
Abstract
Location-based configuration profile toggling may be provided. Configuration profiles associated with user devices may be identified, determinations of whether the user devices are authorized to enable the configuration profiles on the user devices may be made based at least in part on location constraints, and the configuration profiles may be enabled on the user devices if the location constraints are satisfied.
246 Citations
17 Claims
-
1. A method for enforcing a compliance rule associated with an enterprise, comprising:
-
providing an agent application to a mobile computing device; monitoring, by the agent application, a call by an application to an operating system; determining, by the agent application, whether the call by the application invokes functionality associated with the compliance rule, the compliance rule requiring the mobile computing device to be in proximity of a second mobile computing device in order to invoke the functionality; approving the call by the application when the mobile computing device is in the proximity of the second mobile computing device, and blocking the call by the application when the mobile computing device is outside the proximity of the second mobile computing device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer readable medium comprising instructions which, when executed by a processor, enforce a compliance rule associated with an enterprise by:
-
providing an agent application to a mobile computing device; monitoring, by the agent application, a call by an application to an operating system; determining, by the agent application, whether the call by the application invokes functionality associated with the compliance rule, the compliance rule requiring the mobile computing device to be in proximity of a second mobile computing device in order to invoke the functionality; approving the call by the application when the mobile computing device is in the proximity of the second mobile computing device, and blocking the call by the application when the mobile computing device is outside the proximity of the second mobile computing device. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A remote management system for enforcing a compliance rule associated with an enterprise, comprising:
-
a processor; and a memory, the processor and the memory being configured to provide an agent application to a mobile computing device, the agent application being configured to; monitor a call by an application to the operating system; determine whether the call by the application invokes functionality associated with the compliance rule, the compliance rule requiring the mobile computing device to be in proximity of a second mobile computing device in order to invoke the functionality; approve the call by the application when the mobile computing device is in the proximity of the second mobile computing device, and blocking the call by the application when the mobile computing device is outside the proximity of the second mobile computing device. - View Dependent Claims (14, 15, 16, 17)
-
Specification