Policy-Based Application Management
First Claim
1. A method, comprising:
- receiving, by an electronic mobile device, a managed personal information management (PIM) application from an application server during a first communication, the managed PIM application being constructed to operate in accordance with a set of one or more policy files;
receiving, by the electronic mobile device, the set of one or more policy files from the application server during a second communication which is different than the first communication, the set of one or more policy files being stored on the electronic mobile device separately from the managed application; and
running, by the processor, the managed PIM application on the mobile device, the managed PIM application operating in accordance with the set of one or more policy files,wherein one of the policy files alters a message processing functionality of the PIM application on the mobile device.
8 Assignments
0 Petitions
Accused Products
Abstract
Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user'"'"'s own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving, by an electronic mobile device, a managed personal information management (PIM) application from an application server during a first communication, the managed PIM application being constructed to operate in accordance with a set of one or more policy files; receiving, by the electronic mobile device, the set of one or more policy files from the application server during a second communication which is different than the first communication, the set of one or more policy files being stored on the electronic mobile device separately from the managed application; and running, by the processor, the managed PIM application on the mobile device, the managed PIM application operating in accordance with the set of one or more policy files, wherein one of the policy files alters a message processing functionality of the PIM application on the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. One or more non-transitory computer readable media storing computer instructions that, when executed, cause an electronic mobile device to manage a personal information management (PIM) application by:
-
receiving, by the electronic mobile device, a managed personal information management (PIM) application from an application server during a first communication, the managed PIM application being constructed to operate in accordance with a set of one or more policy files; receiving, by the electronic mobile device, the set of one or more policy files from the application server during a second communication which is different than the first communication, the set of one or more policy files being stored on the electronic mobile device separately from the managed application; and running, by the processor, the managed PIM application on the mobile device, the managed PIM application operating in accordance with the set of one or more policy files, wherein one of the policy files alters a characteristic of the PIM application on the mobile device while not altering a similar characteristic of any non-PIM applications on the mobile device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An electronic mobile device, comprising:
-
a processor; memory storing computer readable instructions that, when executed by the processor, cause the device to manage a personal information management (PIM) application by; receiving, by the electronic mobile device, a managed personal information management (PIM) application from an application server during a first communication, the managed PIM application being constructed to operate in accordance with a set of one or more policy files; receiving, by the electronic mobile device, the set of one or more policy files from the application server during a second communication which is different than the first communication, the set of one or more policy files being stored on the electronic mobile device separately from the managed application; and running, by the processor, the managed PIM application on the mobile device, the managed PIM application operating in accordance with the set of one or more policy files, wherein one of the policy files alters a characteristic of the PIM application on the mobile device while not altering a similar characteristic of any non-PIM applications on the mobile device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification