Device management based on wireless beacons
First Claim
1. A method comprising:
- detecting, at a managed device, a signal from a wireless beacon via a first wireless connection between the managed device and the wireless beacon, wherein the signal is detected while the managed device does not have authorization to access a particular functionality;
in response to detecting the signal, generating a first message that includes a beacon identifier associated with the wireless beacon;
transmitting the first message from the managed device to a device management server via a second wireless connection;
receiving, at the managed device via the second wireless connection in response to the beacon identifier in the first message, a second message granting, to the managed device, the authorization to access the particular functionality while the managed device is within a transmission range of the wireless beacon; and
in response to an exit of the managed device from the transmission range of the wireless beacon, receiving at the managed device via the second wireless connection a third message from the device management server, the third message revoking from the managed device the authorization to access the particular functionality.
5 Assignments
0 Petitions
Accused Products
Abstract
A particular method includes detecting, at a managed computing device, a signal from a wireless beacon device via a first wireless connection. The signal is detected while particular functionality is inaccessibly at the managed computing device. The method further includes, in response to detecting the signal, transmitting a first message from the managed computing device to a device management server via a second wireless connection, where the first message identifies the wireless beacon device. The method further includes receiving, at the managed computing device in response to the identification of the wireless beacon device in the first message, a second message that grants the managed computing device access to the particular functionality while the managed computing device is within a transmission range of the wireless beacon device.
109 Citations
19 Claims
-
1. A method comprising:
-
detecting, at a managed device, a signal from a wireless beacon via a first wireless connection between the managed device and the wireless beacon, wherein the signal is detected while the managed device does not have authorization to access a particular functionality; in response to detecting the signal, generating a first message that includes a beacon identifier associated with the wireless beacon; transmitting the first message from the managed device to a device management server via a second wireless connection; receiving, at the managed device via the second wireless connection in response to the beacon identifier in the first message, a second message granting, to the managed device, the authorization to access the particular functionality while the managed device is within a transmission range of the wireless beacon; and in response to an exit of the managed device from the transmission range of the wireless beacon, receiving at the managed device via the second wireless connection a third message from the device management server, the third message revoking from the managed device the authorization to access the particular functionality. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
receiving, at a device management server, a first message from a managed device via an access point, wherein the first message includes a first identifier associated with a first wireless beacon, wherein the first wireless beacon is associated with a first wireless network connection, and wherein the first message indicates that the managed device is within a range of the first wireless beacon; in response to the first message, initiating transmission, via a second wireless connection, of a second message to the managed device granting the managed device authorization to access a particular functionality; and in response an exit of the managed device from the range of the first wireless beacon, initiating transmission, via the second wireless connection, of a third message to the managed device to revoke from the managed device the authorization to access the particular functionality. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A computer-readable storage device storing instructions that, when executed by a processor, cause the processor to perform operations including:
-
receiving, at a device management server, input indicating that authorization to access a particular functionality is to be granted to each computing device associated with a particular user identifier (ID) while the computing device is within a transmission range of a wireless beacon, the wireless beacon associated with a first wireless connection; receiving a first message from a managed computing device, the first message having a beacon identifier associated with the wireless beacon and having the user ID, the first message indicating that the managed computing device is within the transmission range of the wireless beacon; in response to the first message, initiating transmission, via a second wireless connection, of a second message to the managed computing device, the second message granting the managed computing device the authorization to access the particular functionality during a time period that the managed computing device is within the transmission range of the wireless beacon; and in response to an exit of the managed computing device from the transmission range of the wireless beacon, initiating transmission, via the second wireless connection, of a third message to the managed computing device to revoke from the managed computing device the authorization to access the particular functionality.
-
Specification