×

Managing cross perimeter access

  • US 9,613,219 B2
  • Filed: 11/10/2011
  • Issued: 04/04/2017
  • Est. Priority Date: 11/10/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method of managing access to resources in a device, comprising:

  • receiving, by a hardware data processing apparatus on the device, from a first resource associated with a first plurality of resources defined on the device, a request to access a second resource associated with a second plurality of resources, wherein the device includes the first plurality of resources, the first resource, the second plurality of resources, and the second resource, and wherein the first plurality of resources and the second plurality of resources are logically separated and access between the first plurality of resources and the second plurality of resources is determined based on one or more management policies, the first plurality of resources including a first network connection profile and a first encryption certificate for the first plurality of resources, and the second plurality of resources including a second network connection profile and a second encryption certificate for the second plurality of resources, and wherein the request to access the second resource comprises a request to make a network connection by the first resource using the second network connection profile;

    determining, by a hardware data processing apparatus on the device, whether the request to make the network connection is prohibited based on a first management policy for the first plurality of resources and a second management policy for the second plurality of resources, the first management policy defining one or more rules for the first plurality of resources for accessing resources associated with the second plurality of resources including the second resource, the second management policy defining one or more rules for the second plurality of resources for allowing access to resources associated with the second plurality of resources including the second resource, and the determination comprises;

    if the first management policy prohibits the first resource to use any network connection profiles included in the second plurality of resources to make the network connection, prohibiting the request to make the network connection; and

    if the second management policy prohibits the resources outside of the second plurality of resources to use any network connection profiles included in the second plurality of resources to make the network connection, prohibiting the request to make the network connection;

    when the request to make the network connection is granted, enabling the first resource associated with the first plurality of resources to use the second network connection profile to make the network connection.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×