Managing application execution and data access on a device
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving, from an application associated with a first perimeter on a device, a request to access data associated with a second, different perimeter on the device, wherein the data has a data type;
determining, based on the data type, that a first management policy associated with the first perimeter permits the application to access the data independent of a second, different management policy associated with the second perimeter; and
based on the determining, providing the application access to the data.
10 Assignments
0 Petitions
Accused Products
Abstract
Some aspects of what is described here relate to managing application execution and data access on a mobile device. A request to access data is received from an application associated with a first perimeter on a device. The data is associated with a second, different perimeter on the device and has a data type. It is determined, based on the data type, that a management policy associated with the first perimeter permits the application to access the data independent of a second, different management policy assigned to the second perimeter. Based on the determining, the application is provided access to the data.
234 Citations
26 Claims
-
1. A computer-implemented method comprising:
-
receiving, from an application associated with a first perimeter on a device, a request to access data associated with a second, different perimeter on the device, wherein the data has a data type; determining, based on the data type, that a first management policy associated with the first perimeter permits the application to access the data independent of a second, different management policy associated with the second perimeter; and based on the determining, providing the application access to the data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A device comprising:
-
data processing apparatus; and a computer-readable medium storing instructions executable by the data processing apparatus to perform operations comprising; receiving, from an application associated with a first perimeter on a device, a request to access data associated with a second, different perimeter on the device, wherein the data has a data type; determining, based on the data type, that a first management policy associated with the first perimeter permits the application to access the data independent of a second, different management policy associated with the second perimeter; and based on the determining, providing the application access to the data. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable medium storing instructions executable by data processing apparatus to perform operations comprising:
-
receiving, from an application associated with a first perimeter on a device, a request to access data associated with a second, different perimeter on the device, wherein the data has a data type; determining, based on the data type, that a first management policy associated with the first perimeter permits the application to access the data independent of a second, different management policy associated with the second perimeter; and based on the determining, providing the application access to the data. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
-
Specification