Device management macros
First Claim
Patent Images
1. A method comprising:
- receiving a request to perform a function, the function comprising a request to install an application;
determining whether the function is associated with a management macro comprising a plurality of operations, wherein at least one of the plurality of operations comprises determining whether the application comprises an authorized application;
in response to determining that the request to install the application is associated with the management macro, activating the management macro by determining whether the application comprises the authorized application, wherein activating the management macro comprises performing at least a subset of the plurality of operations;
in response to determining that the application comprises the authorized application, determining whether access to an application source is active;
in response to determining that access to the application source is not active, activating access to the application source;
installing the application from the application source; and
deactivating access to the application source.
2 Assignments
0 Petitions
Accused Products
Abstract
Mobile device management macros may be provided. A request to perform a function may be received. If the function is associated with a management macro comprising a plurality of operations, the macro may be activated to perform at least some of the plurality of operations.
164 Citations
10 Claims
-
1. A method comprising:
-
receiving a request to perform a function, the function comprising a request to install an application; determining whether the function is associated with a management macro comprising a plurality of operations, wherein at least one of the plurality of operations comprises determining whether the application comprises an authorized application; in response to determining that the request to install the application is associated with the management macro, activating the management macro by determining whether the application comprises the authorized application, wherein activating the management macro comprises performing at least a subset of the plurality of operations; in response to determining that the application comprises the authorized application, determining whether access to an application source is active; in response to determining that access to the application source is not active, activating access to the application source; installing the application from the application source; and deactivating access to the application source. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
a memory storage; and a processor coupled to the memory storage, wherein the processor is configured to; receive a request to perform a function, the function comprising a request to install an application, determine whether the function is associated with at least one of a plurality of management macros each comprising a plurality of operations, wherein the plurality of operations associated with the at least one of the plurality of management macros comprises determining whether access to an application source is active and in response to determining that access to the application source is active, deactivate access to the application source, in response to determining that the function is associated with the at least one management macro comprising the plurality of operations, perform the plurality of operations, and in response to determining that the function is not associated with the at least one management macro comprising the plurality of operations, prevent the function from being performed. - View Dependent Claims (8)
-
-
9. A non-transitory computer-readable medium which stores a set of instructions that when executed performs a method executed by the set of instructions comprising:
-
receiving a request to perform a function; determining whether the function is associated with a management macro comprising a plurality of ordered operations, wherein at least one of the plurality of ordered operations comprises determining whether the requested function requires the use of an audited resource; in response to determining that the requested function requires the use of an audited resource, determining whether the requested function is associated with an enterprise function, in response to determining that the requested function is associated with the enterprise function, determining whether a first threshold associated with the audited resource is satisfied; and in response to determining that the first threshold associated with the audited resource is satisfied, proceeding with performing the plurality of ordered operations. - View Dependent Claims (10)
-
Specification