Configuring and providing profiles that manage execution of mobile applications
First Claim
1. A method, comprising:
- analyzing a managed application to determine policy settings for the managed application, wherein the managed application is to be made available for download to a mobile device, wherein each of the one or more policy settings provides a constraint to be enforced by the mobile device prior to the managed application being provided access to at least one resource that is accessible through an access gateway, wherein the policy settings include at least one first setting specifying that a private secure container, which is to be private to the managed application, is to be configured on the mobile device such that a read or write operation from the managed application is to be redirected to the private secure container, and wherein the policy settings includes at least one second setting specifying that a shared secure container, which is to be accessible by at least one other managed application, is to be configured on the mobile device such that a read or write operation from the managed application is to be redirected to the shared secure container;
displaying, by one or more computing devices, a user interface that displays the policy settings;
receiving input via the user interface that creates or modifies an application management setting of the policy settings, wherein the application management setting specifies how data associated with the managed application is to be processed by the mobile device in connection with the managed application;
producing a policy file for the managed application that includes the application management setting, the at least one first setting, and the at least one second setting; and
providing the policy file such that the policy is available for download to the mobile device.
7 Assignments
0 Petitions
Accused Products
Abstract
Various aspects of the disclosure relate to configuring and providing policies that manage execution of mobile applications. In some embodiments, a user interface may be generated that allows an IT administrator or other operator to set, change and/or add to policy settings. The policy settings can be formatted into a policy file and be made available for download to a mobile device, such as via an application store or to be pushed to the mobile device as part of a data push service. The mobile device, based on the various settings included in the policy file, may perform various actions to enforce the security constraints that are represented by the policy. The various settings that can be included in a policy are numerous and some examples and variations thereof are described in connection with the example embodiments discussed herein.
358 Citations
20 Claims
-
1. A method, comprising:
-
analyzing a managed application to determine policy settings for the managed application, wherein the managed application is to be made available for download to a mobile device, wherein each of the one or more policy settings provides a constraint to be enforced by the mobile device prior to the managed application being provided access to at least one resource that is accessible through an access gateway, wherein the policy settings include at least one first setting specifying that a private secure container, which is to be private to the managed application, is to be configured on the mobile device such that a read or write operation from the managed application is to be redirected to the private secure container, and wherein the policy settings includes at least one second setting specifying that a shared secure container, which is to be accessible by at least one other managed application, is to be configured on the mobile device such that a read or write operation from the managed application is to be redirected to the shared secure container; displaying, by one or more computing devices, a user interface that displays the policy settings; receiving input via the user interface that creates or modifies an application management setting of the policy settings, wherein the application management setting specifies how data associated with the managed application is to be processed by the mobile device in connection with the managed application; producing a policy file for the managed application that includes the application management setting, the at least one first setting, and the at least one second setting; and providing the policy file such that the policy is available for download to the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus, comprising:
-
at least one processor; and memory storing executable instructions configured to, when executed by the at least one processor, cause the apparatus to; analyze a managed application to determine policy settings for the managed application, wherein the managed application is to be made available for download to a mobile device, wherein each of the policy settings provides a constraint to be enforced by the mobile device prior to the managed application being provided access to at least one resource that is accessible through an access gateway, wherein the policy settings include at least one first setting specifying that a private secure container, which is to be private to the managed application, is to be configured on the mobile device such that a read or write operation from the managed application is to be redirected to the private secure container, and wherein the policy settings includes at least one second setting specifying that a shared secure container, which is to be accessible by at least one other managed application, is to be configured on the mobile device such that a read or write operation from the managed application is to be redirected to the shared secure container; display a user interface that displays the policy settings; receive input via the user interface that creates or modifies an application management setting of the policy settings, wherein the application management setting specifies how data associated with the managed application is to be processed by the mobile device in connection with the managed application; produce a policy file for the managed application that includes the application management setting, the at least one first setting, and the at least one second setting; and provide the policy file such that the policy is available for download to the mobile device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. One or more non-transitory computer-readable media storing instructions configured to, when executed, cause at least one computing device to:
-
analyze a managed application to determine policy settings for the managed application, wherein the managed application is to be made available for download to a mobile device, wherein each of the policy settings provides a constraint to be enforced by the mobile device prior to the managed application being provided access to at least one resource that is accessible through an access gateway, wherein the policy settings include at least one first setting specifying that a private secure container, which is to be private to the managed application, is to be configured on the mobile device such that a read or write operation from the managed application is to be redirected to the private secure container, and wherein the policy settings includes at least one second setting specifying that a shared secure container, which is to be accessible by at least one other managed application, is to be configured on the mobile device such that a read or write operation from the managed application is to be redirected to the shared secure container; display a user interface that displays the policy settings; receive input via the user interface that creates or modifies an application management setting of the policy settings, wherein the application management setting specifies how data associated with the managed application is to be processed by the mobile device in connection with the managed application; produce a policy file for the managed application that includes the application management setting, the at least one first setting, and the at least one second setting; and provide the policy file such that the policy is available for download to the mobile device. - View Dependent Claims (20)
-
Specification