×

Managing permission settings applied to applications

  • US 9,075,955 B2
  • Filed: 10/24/2012
  • Issued: 07/07/2015
  • Est. Priority Date: 10/24/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • identifying a plurality of management policies that apply to an application associated with a first perimeter of a plurality of perimeters on a device, each perimeter being associated with a separate file system on the device, wherein each of the plurality of management policies determines whether a resource on the device can be accessed, the plurality of management policies includes a first management policy and a second management policy and the plurality of management policies are received from one or more sources;

    determining, for the application, a priority ranking for each of the plurality of management policies, wherein the priority ranking for at least one of the management policies is determined based on the association of the application with the first perimeter;

    applying a permission setting to the application based on the priority rankings for the plurality of management policies, wherein applying the permission setting comprises;

    determining that the first management policy conflicts with the second management policy; and

    applying the second management policy in response to determining that the second management policy has a higher priority ranking than the first management policy;

    determining that a source from which a management policy was received has rescinded the management policy; and

    in response to determining that the source has rescinded the management policy, re-calculating a new priority ranking for each of remaining management policies.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×