DEVICE MANAGEMENT BASED ON WIRELESS BEACONS
First Claim
1. A method comprising:
- detecting, at a managed computing device, a signal from a wireless beacon device via a first wireless connection, wherein the signal is detected while particular functionality is inaccessible at the managed computing device;
in response to detecting the signal, transmitting a first message from the managed computing device to a device management server via a second wireless connection, wherein the first message identifies the wireless beacon device; and
receiving, at the managed computing device in response to the identification of the wireless beacon device in the first message, a second message that grants the managed computing device access to the particular functionality while the managed computing device is within a transmission range of the wireless beacon device.
7 Assignments
0 Petitions
Accused Products
Abstract
A particular method includes detecting, at a managed computing device, a signal from a wireless beacon device via a first wireless connection. The signal is detected while particular functionality is inaccessibly at the managed computing device. The method further includes, in response to detecting the signal, transmitting a first message from the managed computing device to a device management server via a second wireless connection, where the first message identifies the wireless beacon device. The method further includes receiving, at the managed computing device in response to the identification of the wireless beacon device in the first message, a second message that grants the managed computing device access to the particular functionality while the managed computing device is within a transmission range of the wireless beacon device.
19 Citations
20 Claims
-
1. A method comprising:
-
detecting, at a managed computing device, a signal from a wireless beacon device via a first wireless connection, wherein the signal is detected while particular functionality is inaccessible at the managed computing device; in response to detecting the signal, transmitting a first message from the managed computing device to a device management server via a second wireless connection, wherein the first message identifies the wireless beacon device; and receiving, at the managed computing device in response to the identification of the wireless beacon device in the first message, a second message that grants the managed computing device access to the particular functionality while the managed computing device is within a transmission range of the wireless beacon device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
receiving, at a device management server, an input indicating that access to particular functionality is to be granted to a managed computing device that is within range of a wireless beacon device; receiving a first message from a first managed computing device indicating that the first managed computing device is within range of the wireless beacon device; and in response to the first message, initiating transmission of a second message to the first managed computing device granting the first managed computing device access to the particular functionality. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer-readable storage device storing instructions that, when executed by a processor, cause the processor to perform operations including:
-
receiving, at a device management server, input indicating that access to particular functionality is to be granted to each computing device associated with a particular user that is within range of a wireless beacon device; receiving a first message from a managed computing device associated with the user indicating that the managed computing device is within range of the wireless beacon device; and in response to the first message, initiating transmission of a second message to the managed computing device granting the managed computing device access to the particular functionality.
-
Specification