MANAGING ACCESS TO RESOURCES
9 Assignments
0 Petitions
Accused Products
Abstract
In some implementations, a method of managing access to resources in a single device including receiving, from a first resource assigned to a first perimeter, a request to access a second resource assigned to a second perimeter different from the first perimeter. The single device includes the first perimeter and the second perimeter. Whether access to the second resource is prohibited is determined based on a management policy for the first perimeter. The management policy defining one or more rules for accessing resources assigned to the second perimeter including the second resource.
-
Citations
47 Claims
-
1-27. -27. (canceled)
-
28. A method of managing access to resources in a device, comprising:
-
receiving, by a hardware data processing apparatus on the device, from a first resource associated with a first plurality of resources defined on the device, a request to access a second resource associated with a second plurality of resources, wherein the device includes the first plurality of resources, the first resource, the second plurality of resources, and the second resource, and wherein the first plurality of resources and the second plurality of resources are logically separated and access between the first plurality of resources and the second plurality of resources is determined based on one or more management policies, the first plurality of resources including a first network connection profile, and the second plurality of resources including a second network connection profile, and wherein the request to access the second resource comprises a request to make a network connection by the first resource using the second network connection profile; determining, by a hardware data processing apparatus on the device, whether the request to make the network connection is prohibited based on a first management policy for the first plurality of resources or a second management policy for the second plurality of resources, the first management policy defining one or more rules for the first plurality of resources for accessing resources associated with the second plurality of resources including the second resource, the second management policy defining one or more rules for the second plurality of resources for allowing access to resources associated with the second plurality of resources including the second resource, and processing the request to make the network connection based on the determining. - View Dependent Claims (29, 30, 31, 32, 33, 34)
-
-
35. A device, comprising:
-
a first plurality of resources associated with a first resource and a first management policy, the first management policy defining one or more rules for accessing resources associated with the second plurality of resources including the second resource, wherein the first plurality of resources including a first network connection profile; a second plurality of resources associated with a second resource and a second management policy, the second management policy defining one or more rules for allowing access to resources associated with the second plurality of resources including the second resource, wherein the second plurality of resources including a second network connection profile, the first plurality of resources and the second plurality of resources being logically separated; and one or more hardware processors operable to; receive, from the first resource associated with the first plurality of resources on the device a request to access the second resource associated with the second plurality of resources, wherein the device includes the first plurality of resources, the first resource, the second plurality of resources, and the second resource, wherein the request to access the second resource comprises a request to make a network connection by the first resource using the second network connection profile; determine whether the request to make the network connection is prohibited based on the first management policy for the first plurality of resources or the second management policy for the second plurality of resources; and process the request to make the network connection based on the determining. - View Dependent Claims (36, 37, 38, 39, 40, 41)
-
-
42. A computer program product encoded on a tangible, non-transitory storage medium, the product comprising computer readable instructions for causing one or more processors to perform operations comprising:
-
receiving, by a hardware data processing apparatus on the device, from a first resource associated with a first plurality of resources defined on the device, a request to access a second resource associated with a second plurality of resources, wherein the device includes the first plurality of resources, the first resource, the second plurality of resources, and the second resource, and wherein the first plurality of resources and the second plurality of resources are logically separated and access between the first plurality of resources and the second plurality of resources is determined based on one or more management policies, the first plurality of resources including a first network connection profile, and the second plurality of resources including a second network connection profile, and wherein the request to access the second resource comprises a request to make a network connection by the first resource using the second network connection profile; determining, by a hardware data processing apparatus on the device, whether the request to make the network connection is prohibited based on a first management policy for the first plurality of resources or a second management policy for the second plurality of resources, the first management policy defining one or more rules for the first plurality of resources for accessing resources associated with the second plurality of resources including the second resource, the second management policy defining one or more rules for the second plurality of resources for allowing access to resources associated with the second plurality of resources including the second resource; and processing the request to make the network connection based on the determining. - View Dependent Claims (43, 44, 45, 46, 47)
-
Specification