Management of application access
First Claim
1. A method comprising:
- selecting, at a computing device executing a security management application, an application program installed at the computing device, wherein the application program provides a plurality of functions;
determining, by the computing device, that tiered access should be configured for the application program;
presenting, by the computing device, a list indicating the plurality of functions and user interface controls that assign function access controls to the plurality of functions;
setting, by the computing device and via a user interface control, a function access control for a function of the plurality of functions, the function access control defining whether access to the function should be allowed when the computing device is in a lock state; and
storing, by the computing device, a setting defining the function access control.
1 Assignment
0 Petitions
Accused Products
Abstract
Concepts and technologies are disclosed herein for management of application access. A security management application can be configured to set access controls and/or other security settings relating to application programs. Additionally, or alternatively, particular functions and/or functionality associated with application programs may be individually configured. Settings reflecting the access controls and/or other security settings can be stored and can be applied at the user device. The security management application also can be configured to determine if security settings and/or access controls are to be overridden. Data can be collected from various sensors and/or other sources to use in determining if particular application programs and/or application program functionality is to be allowed. Thus, normally disallowed activities can be allowed in emergency conditions, when in a business location associated with a particular device, and/or at other times and/or under other circumstances.
-
Citations
16 Claims
-
1. A method comprising:
-
selecting, at a computing device executing a security management application, an application program installed at the computing device, wherein the application program provides a plurality of functions; determining, by the computing device, that tiered access should be configured for the application program; presenting, by the computing device, a list indicating the plurality of functions and user interface controls that assign function access controls to the plurality of functions; setting, by the computing device and via a user interface control, a function access control for a function of the plurality of functions, the function access control defining whether access to the function should be allowed when the computing device is in a lock state; and storing, by the computing device, a setting defining the function access control. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer storage medium having computer-executable instructions stored thereon that, when executed by a processor, cause the processor to perform operations comprising:
-
selecting an application program installed at a computer; determining that tiered access should be configured for the application program, wherein the application program provides a plurality of functions; presenting a list comprising data indicating the plurality of functions and user interface controls that assign function access controls to the plurality of functions; receiving input corresponding to selection of a function of the plurality of functions and a function access control for the function via the user interface; setting the function access control for the function to define if the function is allowed when the computer is in a lock state; and storing a setting defining the function access control. - View Dependent Claims (8, 11, 12, 13)
-
-
9. A mobile computing device comprising:
-
a processor; and a memory that stores computer-executable instructions that, when executed by the processor, cause the processor to perform operations comprising selecting, using the security management application, an application program installed at the mobile computing device, the application program being selected from a plurality of application programs and comprising a multi-function application program, determining that tiered access should be configured for the application program, presenting a list comprising indications of the plurality of functions and user interface controls that assign function access controls to the plurality of functions, receiving input corresponding to selection of a function of the plurality of functions and assignment of a function access control for the function, wherein the function access control defines if the function is allowed when the mobile computing device is in a lock state, and storing a setting defining the function access control associated with the function. - View Dependent Claims (10, 14, 15, 16)
-
Specification