Managing application execution and data access on a device
First Claim
Patent Images
1. A method comprising:
- configuring a first management policy associated with a first perimeter on a device to permit an application associated with the first perimeter to access a type of data associated with a second, different perimeter on the device, the first management policy being configured to permit access to the type of data independent of a second, different management policy associated with the second perimeter, the second management policy being configured to deny access to the data by applications not associated with the second perimeter.
10 Assignments
0 Petitions
Accused Products
Abstract
Some aspects of what is described here relate to managing application execution and data access on a mobile device. A request to access data is received from an application associated with a first perimeter on a device. The data is associated with a second, different perimeter on the device and has a data type. It is determined, based on the data type, that a management policy associated with the first perimeter permits the application to access the data independent of a second, different management policy assigned to the second perimeter. Based on the determining, the application is provided access to the data.
-
Citations
24 Claims
-
1. A method comprising:
configuring a first management policy associated with a first perimeter on a device to permit an application associated with the first perimeter to access a type of data associated with a second, different perimeter on the device, the first management policy being configured to permit access to the type of data independent of a second, different management policy associated with the second perimeter, the second management policy being configured to deny access to the data by applications not associated with the second perimeter. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. A device comprising:
-
data processing apparatus operable to run an application associated with a first perimeter on the device; and a computer-readable medium storing a first management policy associated with the first perimeter, the first management policy configured to permit the application to access a type of data associated with a second, different perimeter on the device, the first management policy configured to permit the application to access the type of data independent of a second, different management policy associated with the second perimeter, the second management policy being configured to deny access to the data by applications not associated with the second perimeter. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer-readable medium storing instructions executable by data processing apparatus to perform operations comprising:
configuring a first management policy associated with a first perimeter on a device to permit an application associated with the first perimeter to access a type of data associated with a second, different perimeter on the device, the first management policy being configured to permit access to the data independent of a second, different management policy associated with the second perimeter, the second management policy being configured to deny access to the data by applications not associated with the second perimeter. - View Dependent Claims (19, 20, 21, 22, 23, 24)
Specification