Controlling use of a business environment on a mobile device
First Claim
1. A method of controlling use of a business environment on a mobile device by an enterprise server, the method comprising:
- receiving identifying information transmitted from a mobile device, wherein the identifying information identifies a user of the mobile device to the enterprise server;
transmitting a virtual phone template to the mobile device, wherein the virtual phone template (i) corresponds to the identifying information, and (ii) is configured to provide the business environment on the mobile device as a virtual machine running on a hypervisor installed on top of a host operating system of the mobile device;
receiving a periodic transmission from the mobile device to indicate that the mobile device remains in periodic communication with the enterprise server;
causing, if a first period of time passes without the mobile device successfully communicating with the enterprise server, an access to the virtual machine to be disabled; and
causing, if a second period of time passes without the mobile device successfully communicating with the enterprise server, the virtual phone image to be erased from the mobile device, wherein the first period of time is shorter than the second period of time,wherein the periodic transmission is transmitted by a management component running on the mobile device, wherein the management component runs in a privileged mode on the mobile device and cannot be manually terminated by the user, and wherein the method further comprises transmitting a security policy to the mobile device that specifies the first and second period of time.
2 Assignments
0 Petitions
Accused Products
Abstract
A business environment on a mobile device can be controlled by an enterprise server by receiving identifying information transmitted from a mobile device, wherein the identifying information identifies a user of the mobile device to the enterprise server. A virtual phone template is transmitted to the mobile device, wherein the virtual phone template (i) corresponds to the identifying information, and (ii) is configured to provide the business environment on the mobile device as a virtual machine running on a hypervisor installed on top of a host operating system of the mobile device. The enterprise server then receives a periodic transmission from the mobile device to indicate that the mobile device remains in periodic communication with the enterprise server.
-
Citations
18 Claims
-
1. A method of controlling use of a business environment on a mobile device by an enterprise server, the method comprising:
-
receiving identifying information transmitted from a mobile device, wherein the identifying information identifies a user of the mobile device to the enterprise server; transmitting a virtual phone template to the mobile device, wherein the virtual phone template (i) corresponds to the identifying information, and (ii) is configured to provide the business environment on the mobile device as a virtual machine running on a hypervisor installed on top of a host operating system of the mobile device; receiving a periodic transmission from the mobile device to indicate that the mobile device remains in periodic communication with the enterprise server; causing, if a first period of time passes without the mobile device successfully communicating with the enterprise server, an access to the virtual machine to be disabled; and causing, if a second period of time passes without the mobile device successfully communicating with the enterprise server, the virtual phone image to be erased from the mobile device, wherein the first period of time is shorter than the second period of time, wherein the periodic transmission is transmitted by a management component running on the mobile device, wherein the management component runs in a privileged mode on the mobile device and cannot be manually terminated by the user, and wherein the method further comprises transmitting a security policy to the mobile device that specifies the first and second period of time. - View Dependent Claims (2, 3, 4, 5, 15, 16, 17, 18)
-
-
6. A server configured to control use of a business environment on a mobile device comprising a processor configured to perform the steps of:
-
receiving identifying information transmitted from a mobile device, wherein the identifying information identifies a user of the mobile device to the server; transmitting a virtual phone template to the mobile device, wherein the virtual phone template (i) corresponds to the identifying information, and (ii) is configured to provide the business environment on the mobile device as a virtual machine running on a hypervisor installed on top of a host operating system of the mobile device; receiving a periodic transmission from the mobile device to indicate that the mobile device remains in periodic communication with the server; causing, if a first period of time passes without the mobile device successfully communicating with the server, an access to the virtual machine to be disabled; and causing, if a second period of time passes without the mobile device successfully communicating with the server, the virtual phone image to be erased from the mobile device, wherein the first period of time is shorter than the second period of time, wherein the periodic transmission is transmitted by a management component running on the mobile device, wherein the management component runs in a privileged mode on the mobile device and cannot be manually terminated by the user, and wherein the steps further comprise transmitting a security policy to the mobile device that specifies the first and second period of time. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer readable storage medium comprising instructions that cause a processor of a server to control use of a business environment on a mobile device by performing the steps of:
-
receiving identifying information transmitted from a mobile device, wherein the identifying information identifies a user of the mobile device to the server; transmitting a virtual phone template to the mobile device, wherein the virtual phone template (i) corresponds to the identifying information, and (ii) is configured to provide the business environment on the mobile device as a virtual machine running on a hypervisor installed on top of a host operating system of the mobile device; receiving a periodic transmission from the mobile device to indicate that the mobile device remains in periodic communication with the server; causing, if a first period of time passes without the mobile device successfully communicating with the server, an access to the virtual machine to be disabled; and causing, if a second period of time passes without the mobile device successfully communicating with the server, the virtual phone image to be erased from the mobile device, wherein the first period of time is shorter than the second period of time, wherein the periodic transmission is transmitted by a management component running on the mobile device, wherein the management component runs in a privileged mode on the mobile device and cannot be manually terminated by the user, and wherein the steps further comprise transmitting a security policy to the mobile device that specifies the first and second period of time. - View Dependent Claims (12, 13, 14)
-
Specification