Functionality management via application modification
First Claim
Patent Images
1. A method comprising:
- receiving, in a management server, a request to perform an action from an application executed by a client device, the action comprising a request to communicate with the Internet, wherein the application is configured to redirect the request to the management server in response to determining that the application is unauthorized to communicate with the Internet;
determining, by the management server, that the action is associated with a metered resource by determining that authorizing the action would consume at least a portion of the metered resource, wherein the metered resource comprises a data usage quota associated with communications over the Internet;
in response to determining that the action would consume the metered resource, determining, by the management server, that the request complies with at least one management policy stored in the management server; and
in response to determining that the request complies with the at least one management policy, authorizing, by the management server, the request to communicate with the Internet to perform the action.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, apparatuses, and/or computer-readable media for providing device management via application modification may be provided. In some embodiments, a request to perform an action may be received. Upon determining that the action is associated with a metered resource, a further determination may be made as to whether the request complies with at least one management policy. In response to determining that the request complies with the at least one management policy, the requested action may be authorized and/or caused to be performed.
155 Citations
19 Claims
-
1. A method comprising:
-
receiving, in a management server, a request to perform an action from an application executed by a client device, the action comprising a request to communicate with the Internet, wherein the application is configured to redirect the request to the management server in response to determining that the application is unauthorized to communicate with the Internet; determining, by the management server, that the action is associated with a metered resource by determining that authorizing the action would consume at least a portion of the metered resource, wherein the metered resource comprises a data usage quota associated with communications over the Internet; in response to determining that the action would consume the metered resource, determining, by the management server, that the request complies with at least one management policy stored in the management server; and in response to determining that the request complies with the at least one management policy, authorizing, by the management server, the request to communicate with the Internet to perform the action. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a memory storage; and a processor coupled to the memory storage, wherein the processor is configured to; obtain a request to perform an action from an application executed by a client device, the action comprising a request to communicate with the Internet, wherein the application is configured to redirect the request to the management server in response to determining that the application is unauthorized to communicate with the Internet; determine that the action is associated with a metered resource by determining that authorizing the action to be performed would consume at least a portion of the metered resource, wherein the metered resource comprise a data usage quota associated with communications over the Internet; in response to determining that the action would consume the metered resource, determine that the request complies with at least one management policy stored in the management server; and in response to determining that the request complies with the at least one management policy, authorize the request to communicate with the Internet to perform the action. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium embodying a program executable by a computing device, the program, when executed, configured to cause the computing device to at least:
-
obtain a request to perform an action from an application executed by a client device, the action comprising a request to communicate with the Internet, wherein the application is configured to redirect the request to the management server in response to determining that the application is unauthorized to communicate with the Internet; determine that the action is associated with a metered resource by determining that authorizing the action to be performed would consume at least a portion of the metered resource, wherein the metered resource comprise a data usage quota associated with communications over the Internet; in response to determining that the action would consume the metered resource, determine that the request complies with at least one management policy stored in the management server; and in response to determining that the request complies with the at least one management policy, authorize the request to communicate with the Internet to perform the action. - View Dependent Claims (16, 17, 18, 19)
-
Specification