Certificate based profile confirmation
First Claim
1. A method for managing a device, comprising:
- sending, to the device from a remote server, a profile specifying that an application installed on the device is authorized to execute on the device and authorized to access a resource, wherein the profile comprises a certificate that uniquely identifies the profile from another profile;
receiving, at the remote server, a request from the application installed on the device to access the resource, the request including the certificate;
verifying that the certificate is valid;
if the certificate is valid, providing the application with access to the resource; and
wherein providing the application with access to the resource further comprises providing the application with access to a plurality of additional resources authorized by the certificate.
3 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments for controlling access to resources in a network environment. Methods may include installing a profile on the device and installing a certificate included in or otherwise associated with the profile on the device. A request to execute an application, and/or access a resource using a particular application, is received and determination is made as to whether the certificate is installed on the device based on an identification of the certificate by the application. If the certificate is installed on the device, then execution of the application and/or access to the resource is allowed. If the certificate is not installed on the device, then the request for execution and/or access is refused.
-
Citations
17 Claims
-
1. A method for managing a device, comprising:
-
sending, to the device from a remote server, a profile specifying that an application installed on the device is authorized to execute on the device and authorized to access a resource, wherein the profile comprises a certificate that uniquely identifies the profile from another profile; receiving, at the remote server, a request from the application installed on the device to access the resource, the request including the certificate;
verifying that the certificate is valid;if the certificate is valid, providing the application with access to the resource; and
wherein providing the application with access to the resource further comprises providing the application with access to a plurality of additional resources authorized by the certificate. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory, computer-readable medium comprising instructions that, when executed by a processor of a remote server, performs stages for managing a device, the stages comprising:
-
sending, to the device from the remote server, a profile specifying that an application installed on the device is authorized to execute on the device and authorized to access a resource, wherein the profile comprises a certificate that uniquely identifies the profile from another profile; receiving, at the remote server, a request from the application installed on the device to access the resource, the request including the certificate;
verifying that the certificate is valid;if the certificate is valid, providing the application with access to the resource; and
wherein providing the application with access to the resource further comprises providing the application with access to a plurality of additional resources authorized by the certificate. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A server, comprising:
- a memory storage storing program code; and
a processor coupled to the memory storage, wherein, upon execution, the program code causes the processor to; send, to a device from the server, a profile specifying that an application installed on the device is authorized to execute on the device and authorized to access a resource, wherein the profile comprises a certificate that uniquely identifies the profile from another profile; receive a request, from the application installed on the device, to access the resource, the request including the certificate; verify that the certificate is valid; if the certificate is valid, provide the application with access to the resource; and
wherein providing the application with access to the resource further comprises providing the application with access to a plurality of additional resources authorized by the certificate. - View Dependent Claims (14, 15, 16, 17)
- a memory storage storing program code; and
Specification