Management of Application Access
First Claim
1. A method comprising:
- selecting, with a security management application executing at a computing device, an application program installed at the computing device;
setting an access control associated with the application program, the access control defining whether access to the application program is to be allowed when the computing device is in a secured state; and
storing a setting defining the access control associated with the application program.
1 Assignment
0 Petitions
Accused Products
Abstract
Concepts and technologies are disclosed herein for management of application access. A security management application can be configured to set access controls and/or other security settings relating to application programs. Additionally, or alternatively, particular functions and/or functionality associated with application programs may be individually configured. Settings reflecting the access controls and/or other security settings can be stored and can be applied at the user device. The security management application also can be configured to determine if security settings and/or access controls are to be overridden. Data can be collected from various sensors and/or other sources to use in determining if particular application programs and/or application program functionality is to be allowed. Thus, normally disallowed activities can be allowed in emergency conditions, when in a business location associated with a particular device, and/or at other times and/or under other circumstances.
-
Citations
20 Claims
-
1. A method comprising:
-
selecting, with a security management application executing at a computing device, an application program installed at the computing device; setting an access control associated with the application program, the access control defining whether access to the application program is to be allowed when the computing device is in a secured state; and storing a setting defining the access control associated with the application program. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer storage medium having computer-executable instructions stored thereon that, when executed by a computer, cause the computer to:
-
select, by a security management application, an application program installed at the computer; set an access control associated with the application program, the access control defining whether access to the application program is to be allowed when the computing device is in a secured state; and store a setting defining the access control associated with the application program. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A mobile computing device comprising a processor configured to execute computer-executable instructions stored thereon for providing a security management application, wherein the processor is configured, via execution of the security management application, to:
-
select, using the security management application, an application program installed at the mobile computing device, the application program being selected from a plurality of application programs; determine if tiered access is to be configured for the application program; in response to determining that tiered access is not to be configured, set an access control associated with the application program, the access control defining whether access to the application program is to be allowed when the computing device is in a secured state, and store a setting defining the access control associated with the application program; and in response to determining that the tiered access is to be configured, select a function of the plurality of functions, assign a function access control for the function, and store a setting defining the function access control associated with the application program. - View Dependent Claims (17, 18, 19, 20)
-
Specification