Functionality management via application modification
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/60
H04L-029/08
H04L-012/24
H04L-012/14
G06F-021/54
G06F-021/62
출원번호
US-0950486
(2013-07-25)
등록번호
US-9112749
(2015-08-18)
발명자
/ 주소
Dabbiere, Alan
Stuntebeck, Erich
출원인 / 주소
AirWatch LLC
대리인 / 주소
Thomas | Horstemeyer, LLP
인용정보
피인용 횟수 :
3인용 특허 :
81
초록▼
Methods, systems, apparatuses, and/or computer-readable media for providing device management via application modification may be provided. In some embodiments, a request to perform an action may be received. Upon determining that the action is associated with a metered resource, a further determina
Methods, systems, apparatuses, and/or computer-readable media for providing device management via application modification may be provided. In some embodiments, a request to perform an action may be received. Upon determining that the action is associated with a metered resource, a further determination may be made as to whether the request complies with at least one management policy. In response to determining that the request complies with the at least one management policy, the requested action may be authorized and/or caused to be performed.
대표청구항▼
1. A method comprising: receiving, in a management server, one or more requests to perform an action;modifying, in the management server, an application to redirect the one or more requests to perform the action to a second application;determining, by the management server, whether the action is ass
1. A method comprising: receiving, in a management server, one or more requests to perform an action;modifying, in the management server, an application to redirect the one or more requests to perform the action to a second application;determining, by the management server, whether the action is associated with a metered resource by determining whether authorizing the action to be performed would consume at least a portion of the metered resource, wherein determining whether the action would consume at least a portion of the metered resource comprises identifying one or more functions associated with the action to be performed and computing an amount of the metered resource consumed by at least one of the one or more functions;in response to determining that the action is associated with the metered resource, determining, by the management server, whether the request complies with at least one management policy by determining whether the computed amount of the metered resource consumed by at least one of the one or more functions exceeds a quota amount of the metered resource; andin response to determining that the request complies with the at least one management policy, authorizing, by the management server, the action to be performed. 2. The method of claim 1, wherein the metered resource comprises at least one of the following: a data communication resource, a power resource, a financial resource, or a hardware resource. 3. The method of claim 1, further comprising providing, by the management server, an application programming interface (API) call operative to receive the request. 4. The method of claim 1, wherein receiving the request to perform the action comprises intercepting, by the management server, the request from an application by an agent application. 5. The method of claim 1, wherein determining whether the action is associated with a metered resource comprises determining, by the management server, whether authorizing the action to be performed would consume at least a portion of the metered resource. 6. The method of claim 1, further comprising defining, by the management server, the quota amount of the metered resource according to the requested action. 7. A system comprising: a memory storage; anda processor coupled to the memory storage, wherein the processor is configured to: receive one or more requests to perform an action,modifying an application to redirect the one or more requests to perform the action to a second application,determine whether the action is associated with a metered resource by determining whether authorizing the action to be performed would consume at least a portion of the metered resource, wherein determining whether the action would consume at least a portion of the metered resource comprises identifying one or more functions associated with the action to be performed and computing an amount of the metered resource consumed by at least one of the one or more functionsin response to a determination that the action is associated with the metered resource, determine whether the request complies with at least one management policy by determining whether the computed amount of the metered resource consumed by at least one of the one or more functions exceeds a quota amount of the metered resource, andin response to determining that the request complies with the at least one management policy, authorize the action to be performed. 8. The system of claim 7, wherein the processor being configured to determine whether the action is associated with a metered resource comprises the processor being configured to determine whether authorizing the action to be performed would consume at least a portion of the metered resource. 9. The system of claim 8, wherein the metered resource comprises a pre-purchased resource. 10. The system of claim 8, wherein the metered resource comprises a periodically replenished resource. 11. A non-transitory computer-readable medium which stores a set of instructions that when executed performs a method executed by the set of instructions comprising: receiving one or more requests to perform an action;modifying an application to redirect the one or more requests to perform the action to a second application;determining whether the action is associated with a metered resource by determining whether authorizing the action to be performed would consume at least a portion of the metered resource, wherein determining whether the action would consume at least a portion of the metered resource comprises identifying one or more functions associated with the action to be performed and computing an amount of the metered resource consumed by at least one of the one or more functions;in response to a determination that the action is associated with the metered resource, determine whether the request complies with at least one management policy by determining whether the computed amount of the metered resource consumed by at least one of the one or more functions exceeds a quota amount of the metered resource; andin response to determining that the request complies with the at least one management policy, authorizing the action to be performed. 12. The non-transitory computer-readable medium of claim 11, wherein the at least one management policy comprises one or more conditions. 13. The non-transitory computer-readable medium of claim 12, further comprising: identifying a priority associated with the one or more requests, wherein at least one of the one or more conditions is associated with the identified priority. 14. The non-transitory computer-readable medium of claim 11, further comprising: identifying a priority associated with the one or more requests;in response to determining that the request does not comply with the at least one management policy, determining whether the priority exceeds a threshold value; andin response to determining that the priority exceeds the threshold value, authorizing the action to be performed. 15. The non-transitory computer-readable medium of claim 11, further comprising: in response to determining that the request does not comply with the at least one management policy, causing a notification to be displayed.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (81)
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
Bhaskaran,Harikrishnan, Communication system and method for compressing information sent by a communication device to a target portable communication device.
Johnson, David Nephi; Nielson, Dustin Lance; Griffis, Jr., Jerry E.; Beus, David Kent; Jensen, Nathan Blaine; Street, William; Sherman, Paul Erik; Cook, Michael William; Carter, Stephen R, Credential mapping.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
Shai Mohaban ; Itzhak Parnafes ; Yoram Ramberg IL; Yoram Snir IL; John Strassner, Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Maurya, Sanjiv; Tse, Benson Wei-Ming; VanZile, Frank; Bonham, Larry Dean; Peterson, Phil; Friend, John, Method and system for distributing and updating software in wireless devices.
Bruton, III, David Aro; Overby, Jr., Linwood H.; Rodriguez, Adolfo Francisco, Methods, systems and computer program products for selectively allowing users of a multi-user system access to network resources.
Laird,David; Jones,Martin Kelly, Notification systems and methods enabling user entry of notification trigger information based upon monitored mobile vehicle location.
Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Organizing permission associated with a cloud customer in a virtual computing infrastructure.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Protection of data accessible by a mobile device.
Phillips John C. ; Hayes ; Jr. John J., Recyclable cellular telephone and method and apparatus for supporting the use of a recyclable cellular telephone within.
Czajkowski, Grzegorz J.; Skinner, Glenn C.; Bryce, Ciaran J.; Hahn, Stephen C.; Soper, Peter James, Regulation of resource requests to control rate of resource consumption.
Mann, Dwayne R.; Heard, Robert W.; Burchett, Christopher D.; Gordon, Ian R., Server, computer memory, and method to support security policy maintenance and distribution.
Wolovitz, Lionel; Collins, Tim, Service management system and associated methodology of providing service related message prioritization in a mobile client.
Ng, Mason; Mendez, Daniel J.; Quinlan, Sean Michael, System and method for automatically forwarding email and email events via a computer network to a server computer.
Heard, Robert W.; Mann, Dwayne R.; Burchett, Christopher D.; Gordon, Ian R., System and method for distribution of security policies for mobile devices.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R., System and method for globally and securely accessing unified information in a computer network.
Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for synchronizing electronic mail between a client site and a central site.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for using a global translator to synchronize workspace elements across a network.
Clark Ted H. ; Malisewski Steven C. ; Cooper Patrick R. ; Crosswy William Caldwell ; Crochet Larry J., System for automatic synchronization of common file between portable computer and host computer via communication channe.
Nagamatsu Jun (Kawasaki JPX) Terashima Masaki (Yokohama JPX) Yamada Jun (Yokohama JPX), System for preventing unauthorized use of a micro cellular system operating in coexistence with a cellular system.
Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.