Policy Enforcement in Mobile Devices
First Claim
1. A method of controlling access to resources in a mobile device, comprising:
- intercepting a request to access one or more resources of said mobile device;
authorizing said request based on an enforcement policy; and
controlling access to said resources based on said authorizing step.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods and computer program products for enabling enforcement of an administrative policy on one or more mobile devices are described herein. In an embodiment, an administrator uses a policy server to create and provide an enforcement policy to a mobile device. An enforcement policy may include information on mobile device resources which may be controlled by an administrator. An enforcement policy also includes information on how mobile device features will be set, configured or disabled. An enforcement device driver and an enforcement monitor on a mobile device use the enforcement policy to control access to resources associated with the mobile device regardless of whether the mobile device is “online” and connected to a network or “offline” and disconnected from a network.
44 Citations
11 Claims
-
1. A method of controlling access to resources in a mobile device, comprising:
-
intercepting a request to access one or more resources of said mobile device; authorizing said request based on an enforcement policy; and controlling access to said resources based on said authorizing step. - View Dependent Claims (2, 3, 4)
-
-
5. A method of maintaining a desired state on a mobile device, comprising:
-
monitoring one or more settings associated with a plurality of user applications or device resources; detecting a change in said settings; and restoring said settings to a desired state wherein said desired state is based on an enforcement policy.
-
-
6. A system for controlling access to resources in a mobile device, comprising:
-
an enforcement policy that includes one or more settings to control access to resources associated with said mobile device; an enforcement device driver that intercepts requests to access said resources; and an enforcement monitor that monitors said settings, wherein said enforcement monitor returns said settings to a desired state if said settings have been changed in a manner that is not authorized. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer program product having control logic stored therein, said control logic enabling a processor to control access to resources in a mobile device, said control logic comprising;
-
intercepting means for enabling a processor to intercept a request to access one or more resources associated with said mobile device; authorizing means for enabling a processor to authorize said request based on an enforcement policy; and controlling means for enabling a processor to control access to said resources.
-
Specification