Providing mobile device management functionalities
First Claim
1. A method, comprising:
- receiving, by a mobile computing device, a single sign-on (SSO) credential that is associated with at least one user account;
monitoring, via a mobile device management agent on the mobile computing device, state information associated with the mobile computing device; and
enforcing at least one mobile device management policy based on the monitored state information and the SSO credential,wherein monitoring the state information includes providing the SSO credential and at least some of the monitored state information to one or more policy management servers,wherein enforcing the at least one mobile device management policy includes;
receiving management information from the one or more policy management servers; and
executing at least one command included in the management information,wherein the at least one command included in the management information is generated, for execution on the mobile computing device, by the one or more policy management servers based on the SSO credential and the at least some of the monitored state information received from the mobile device management agent on the mobile computing device, andwherein enforcing the at least one mobile device management policy further includes;
receiving enterprise data from one or more enterprise resources;
storing the received enterprise data in a secure document container on the mobile computing device; and
based on detecting a change in device state, selectively wiping the enterprise data stored in the secure document container.
7 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, computer-readable media, and apparatuses for providing mobile device management functionalities are presented. In various embodiments, a mobile device management agent may monitor state information associated with a mobile computing device. The monitored state information may be analyzed on the mobile computing device and/or by one or more policy management servers. In some instances, the one or more policy management servers may provide management information to the mobile computing device, and the management information may include one or more commands (which may, e.g., cause the mobile computing device to enforce one or more policies) and/or one or more policy updates. Subsequently, one or more policies may be enforced on the mobile computing device based on the monitored state information and/or based on the management information.
285 Citations
19 Claims
-
1. A method, comprising:
-
receiving, by a mobile computing device, a single sign-on (SSO) credential that is associated with at least one user account; monitoring, via a mobile device management agent on the mobile computing device, state information associated with the mobile computing device; and enforcing at least one mobile device management policy based on the monitored state information and the SSO credential, wherein monitoring the state information includes providing the SSO credential and at least some of the monitored state information to one or more policy management servers, wherein enforcing the at least one mobile device management policy includes; receiving management information from the one or more policy management servers; and executing at least one command included in the management information, wherein the at least one command included in the management information is generated, for execution on the mobile computing device, by the one or more policy management servers based on the SSO credential and the at least some of the monitored state information received from the mobile device management agent on the mobile computing device, and wherein enforcing the at least one mobile device management policy further includes; receiving enterprise data from one or more enterprise resources; storing the received enterprise data in a secure document container on the mobile computing device; and based on detecting a change in device state, selectively wiping the enterprise data stored in the secure document container. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A mobile computing device, comprising:
-
at least one processor; and memory storing computer-readable instructions that, when executed by the at least one processor, cause the mobile computing device to; receive a single sign-on (SSO) credential that is associated with at least one user account; monitor, via a mobile device management agent on the mobile computing device, state information associated with the mobile computing device; and enforce at least one mobile device management policy based on the monitored state information and the SSO credential, wherein monitoring the state information includes providing the SSO credential and at least some of the monitored state information to one or more policy management servers, wherein enforcing the at least one mobile device management policy includes; receiving management information from the one or more policy management servers; and executing at least one command included in the management information, wherein the at least one command included in the management information is generated, for execution on the mobile computing device, by the one or more policy management servers based on the SSO credential and the at least some of the monitored state information received from the mobile device management agent on the mobile computing device, and wherein enforcing the at least one mobile device management policy further includes; receiving enterprise data from one or more enterprise resources; storing the received enterprise data in a secure document container on the mobile computing device; and based on detecting a change in device state, selectively wiping the enterprise data stored in the secure document container. - View Dependent Claims (13, 14, 15, 16)
-
-
17. One or more non-transitory computer-readable media having instructions stored thereon that, when executed, cause a mobile computing device to:
-
receive a single sign-on (SSO) credential that is associated with at least one user account; monitor, via a mobile device management agent on the mobile computing device, state information associated with the mobile computing device; and enforce at least one mobile device management policy based on the monitored state information and the SSO credential, wherein monitoring the state information includes providing the SSO credential and at least some of the monitored state information to one or more policy management servers, wherein enforcing the at least one mobile device management policy includes; receiving management information from the one or more policy management servers; and executing at least one command included in the management information, wherein the at least one command included in the management information is generated, for execution on the mobile computing device, by the one or more policy management servers based on the SSO credential and the at least some of the monitored state information received from the mobile device management agent on the mobile computing device, and wherein enforcing the at least one mobile device management policy further includes; receiving enterprise data from one or more enterprise resources; storing the received enterprise data in a secure document container on the mobile computing device; and based on detecting a change in device state, selectively wiping the enterprise data stored in the secure document container. - View Dependent Claims (18, 19)
-
Specification