Managing use of network resources
First Claim
1. A method of managing use of network resources on a device, the method comprising:
- receiving, from user input received at the device, an indication whether to allow a personal application associated with a personal perimeter on the device to access an enterprise network resource associated with an enterprise perimeter on the device, wherein the enterprise perimeter is configured to prevent resources of the device external to the enterprise perimeter from accessing enterprise resources, including the enterprise network resource, associated with the enterprise perimeter unless an indication from user input is received granting access to an external resource, the enterprise perimeter including parameters for accessing a first wireless network and the personal perimeter including parameters for accessing a second wireless network that is different than the first wireless network;
receiving outbound data from the personal application associated with the personal perimeter;
determining that the enterprise perimeter includes a policy that allows the personal application associated with the personal perimeter to access the enterprise network resource associated with the enterprise perimeter, wherein personal resources associated with the personal perimeter, including the personal application, are different from enterprise resources associated with the enterprise perimeter;
presenting, on the device, a user interface that allows a selection whether to allow the personal application associated with the personal perimeter to access the enterprise network resource associated with the enterprise perimeter;
determining, according to the selection, whether to route the outbound data to the enterprise network resource associated with the enterprise perimeter, wherein the device is connected to the first and the second wireless networks;
if the outbound data is determined to be routed to the enterprise network resource, routing the outbound data to the first wireless network; and
if the outbound data is determined not to be routed to the enterprise network resource, routing the outbound data to the second wireless network without disabling a connection to the first wireless network.
6 Assignments
0 Petitions
Accused Products
Abstract
Some aspects of what is described here relate to managing the use of network resources on a mobile device. User input received at the device indicates whether to allow an application associated with a first perimeter on the device to access a network resource associated with a second perimeter on the device. For example, in some instances user input may indicate whether to allow data from applications associated with a personal perimeter on the device to be transmitted over an enterprise communication system. When outbound data associated with the first perimeter are received, the device determines, according to the indication from the user input, whether to route the outbound data to the network resource associated with the second perimeter.
259 Citations
15 Claims
-
1. A method of managing use of network resources on a device, the method comprising:
-
receiving, from user input received at the device, an indication whether to allow a personal application associated with a personal perimeter on the device to access an enterprise network resource associated with an enterprise perimeter on the device, wherein the enterprise perimeter is configured to prevent resources of the device external to the enterprise perimeter from accessing enterprise resources, including the enterprise network resource, associated with the enterprise perimeter unless an indication from user input is received granting access to an external resource, the enterprise perimeter including parameters for accessing a first wireless network and the personal perimeter including parameters for accessing a second wireless network that is different than the first wireless network; receiving outbound data from the personal application associated with the personal perimeter; determining that the enterprise perimeter includes a policy that allows the personal application associated with the personal perimeter to access the enterprise network resource associated with the enterprise perimeter, wherein personal resources associated with the personal perimeter, including the personal application, are different from enterprise resources associated with the enterprise perimeter; presenting, on the device, a user interface that allows a selection whether to allow the personal application associated with the personal perimeter to access the enterprise network resource associated with the enterprise perimeter; determining, according to the selection, whether to route the outbound data to the enterprise network resource associated with the enterprise perimeter, wherein the device is connected to the first and the second wireless networks; if the outbound data is determined to be routed to the enterprise network resource, routing the outbound data to the first wireless network; and if the outbound data is determined not to be routed to the enterprise network resource, routing the outbound data to the second wireless network without disabling a connection to the first wireless network. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A device comprising:
one or more hardware processors operable to; generate a personal perimeter that includes a personal application and parameters for accessing a second wireless network; generate an enterprise perimeter that includes an enterprise network resource, wherein the enterprise perimeter is configured to prevent resources of the device external to the enterprise perimeter from accessing resources, including the enterprise network resource, associated with the enterprise perimeter unless an indication from user input is received granting access to an external resource, the enterprise perimeter including parameters for accessing a first wireless network that is different than the second wireless network; determine that the enterprise perimeter includes a policy that allows the personal application associated with the personal perimeter to access the enterprise network resource associated with the enterprise perimeter, wherein resources associated with the personal perimeter, including the personal application, are different from resources associated with the enterprise perimeter; generate a user interface operable to receive an indication whether to allow the personal application associated with the personal perimeter to access the enterprise network resource associated with the enterprise perimeter, the user interface comprising a graphical user interface that allows a selection whether to allow the personal application associated with the personal perimeter to access the enterprise network resource associated with the enterprise perimeter; receive outbound data from the personal application associated with the personal perimeter; determine, according to the indication, whether to route the outbound data to the enterprise network resource associated with the enterprise perimeter, wherein the device is connected to the first and the second wireless networks; if the outbound data is determined to be routed to the enterprise network resource, route the outbound data to the first wireless network; and if the outbound data is determined not to be routed to the enterprise network resource, route the outbound data to the second wireless network without disabling a connection to the first wireless network. - View Dependent Claims (8, 9, 10, 11)
-
12. A non-transitory computer-readable storage medium comprising instructions that are operable when executed to cause data processing apparatus to perform operations comprising:
-
receiving, from user input received at a device, an indication whether to allow a personal application associated with a personal perimeter on the device to access a enterprise network resource associated with an enterprise perimeter on the device, wherein the enterprise perimeter is configured to prevent resources of the device external to the enterprise perimeter from accessing resources, including the enterprise network resource, associated with the enterprise perimeter unless an indication from user input is received granting access to an external resource, the enterprise perimeter including parameters for accessing a first wireless network and the personal perimeter including parameters for accessing a second wireless network that is different than the first wireless network; receiving outbound data from the personal application associated with the personal perimeter; determining that the enterprise perimeter includes a policy that allows the personal application associated with the personal perimeter to access the enterprise network resource associated with the enterprise perimeter, wherein resources associated with the personal perimeter, including the personal application, are different from resources associated with the enterprise perimeter; presenting, on the device, a user interface that allows a selection whether to allow the personal application associated with the personal perimeter to access the enterprise network resource associated with the enterprise perimeter; determining, according to the indication from the user input, whether to route the outbound data to the enterprise network resource associated with the enterprise perimeter, wherein the device is connected to the first and the second wireless networks; if the outbound data is determined to be routed to the enterprise network resource, routing the outbound data to the first wireless network; and if the outbound data is determined not to be routed to the enterprise network resource, routing the outbound data to the second wireless network without disabling a connection to the first wireless network. - View Dependent Claims (13, 14, 15)
-
Specification