Multi-persona devices and management
First Claim
Patent Images
1. A method comprising:
- configuring a first end-user environment in a device, wherein the first end-user environment comprises a first set of compliance policies;
configuring a second end-user environment in the device, wherein the second end-user environment comprises a second set of compliance policies;
causing at least a portion of the first set of compliance policies to be applied to a first data element;
causing at least a portion of the second set of compliance policies to be applied to a second data element;
receiving a request to install an application in the device in the first end-user environment;
in response to receiving the request to install the application, determining that the first set of compliance policies permits the application to be used in the first end-user environment;
in response to determining that the first set of compliance policies permits the application to be used in the first end-user environment;
causing the application to be installed in the device; and
causing the application to be accessible to the first end-user environment;
causing the device to switch from an active use of the first end-user environment to the second end-user environment in response to detecting a trigger event associated with the device;
in response to receiving a request to access a network content repository, facilitating an authentication of the device with the network content repository over a network based at least in part on a credential associated with the second end-user environment in the device; and
determining that communication between the device and the network content repository is permissible based at least in part on the active use of the second end-user environment and the authentication of the credential for the second end-user environment.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of installing an application on a device configured with a plurality of personas is disclosed. The method includes receiving an indication to engage a first persona of the plurality of personas. The method further includes causing an indication of the first persona to be displayed. The method further includes receiving, via an interface associated with the first persona, an indication to install a first application. The method further includes causing the first application to be installed. The method further includes causing the installed first application to be associated with the first persona.
197 Citations
20 Claims
-
1. A method comprising:
-
configuring a first end-user environment in a device, wherein the first end-user environment comprises a first set of compliance policies; configuring a second end-user environment in the device, wherein the second end-user environment comprises a second set of compliance policies; causing at least a portion of the first set of compliance policies to be applied to a first data element; causing at least a portion of the second set of compliance policies to be applied to a second data element; receiving a request to install an application in the device in the first end-user environment; in response to receiving the request to install the application, determining that the first set of compliance policies permits the application to be used in the first end-user environment; in response to determining that the first set of compliance policies permits the application to be used in the first end-user environment; causing the application to be installed in the device; and causing the application to be accessible to the first end-user environment; causing the device to switch from an active use of the first end-user environment to the second end-user environment in response to detecting a trigger event associated with the device; in response to receiving a request to access a network content repository, facilitating an authentication of the device with the network content repository over a network based at least in part on a credential associated with the second end-user environment in the device; and determining that communication between the device and the network content repository is permissible based at least in part on the active use of the second end-user environment and the authentication of the credential for the second end-user environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus comprising:
-
a processor; and computer instructions configured to cause the processor to; configure a first end-user environment in the apparatus, wherein the first end-user environment comprises a first set of compliance policies; configure a second end-user environment in the apparatus, wherein the second end-user environment comprises a second set of compliance policies; cause at least one first resource associated with the apparatus to be authorized for access by the first end-user environment; cause at least one second resource associated with the apparatus to be denied access by the first end-user environment; receive a request to install an application in the apparatus in the first end-user environment; in response to receiving the request to install the application, determine that the first set of compliance policies permits the application to be used in the first end-user environment; and in response to determining that the first set of compliance policies permits the application to be used in the first end-user environment; cause the application to be installed in the apparatus; and cause the application to be accessible to the first end-user environment; and cause the processor to switch from an active use of the first end-user environment to the second end-user environment in response to detecting a trigger event associated with the apparatus; in response to receiving a request to access a network content repository, facilitate an authentication with the network content repository over a network based at least in part on a credential associated with the second end-user environment and determine that communication with the network content repository is permissible based at least in part on the active use of the second end-user environment and the authentication of the credential for the second end-user environment. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium comprising a program executable in a computing device, that when executed, causes the computing device to perform a method comprising:
-
configuring a first end-user environment in a device, wherein the first end-user environment comprises a first set of compliance policies; configuring a second end-user environment in the device, wherein the second end-user environment comprises a second set of compliance policies; causing the first end-user environment to become an active end-user environment, wherein causing the first end-user environment to become the active end-user environment comprises; enabling the first set of compliance policies; and disabling the second set of compliance policies; receiving a request to install an application in the device in the first end-user environment; in response to receiving the request to install the application, determining that the first set of compliance policies permits the application to be used in the first end-user environment; and in response to determining that the first set of compliance policies permits the application to be used in the first end-user environment; causing the application to be installed in the device; and causing the application to be accessible to the first end-user environment; and causing a switch of the active end-user environment from the first end-user environment to the second end-user environment in response to detecting a trigger event associated with the computing device; in response to receiving a request to access a network content repository, facilitating an authentication of the device with the network content repository over a network based at least in part on a credential associated with the second end-user environment in the device; and determining that communication between the device and the network content repository is permissible based at least in part on an active use of the second end-user environment and the authentication of the credential for the second end-user environment. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification