A method, device and medium for managing application access to certificates and keys
A technology for application access and computing equipment, applied in the direction of using stored programs for program control, program control design, digital data authentication, etc., and can solve problems such as limited application scope
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] In addition to restricting access to the entire mobile device for both personal and corporate functions, this disclosure envisions creating two or more modes of operation on the mobile device. Specifically, each of the plurality of applications may be separated into one of the plurality of groups. In an example scenario involving corporate and personal modes of operation, an application may be designated as either a corporate application or a personal application. In cases where some applications can be both corporate and personal applications, a copy of the application code can be kept on both personal and corporate storage on the mobile device.
[0026] This disclosure provides a mobile device, but is not intended to be limited to any particular mobile device. Examples of mobile devices include smart phones, personal digital assistants, data enabled cellular phones, tablet computers, and the like.
[0027] Mobile devices in this disclosure implement IT policies that...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


