Patent application number | Description | Published |
20130212278 | CONTROLLING DISTRIBUTION OF RESOURCES IN A NETWORK - Disclosed are various embodiments for controlling distribution of data on a network. In one embodiment, a distribution service receives a request from a user on a client device to access the distribution service. In response, the distribution service determines whether the user and the client device are authorized to access the distribution service. The distribution service identifies which of the resources are accessible to the user and the client device pairing based on a plurality of resource grouping identifiers. The distribution service then determines whether the client device complies with a plurality of distribution rules associated with the identified resources. Upon determining that the client device is compliant, the distribution service transmits the resources related to the compliance. | 08-15-2013 |
20130212650 | DISTRIBUTION OF VARIABLY SECURE RESOURCES IN A NETWORKED ENVIRONMENT - A method of receiving a request to access a plurality of resources and determining whether a first resource of the plurality of resources is associated with a different authorization requirement than at least one second resource of the plurality of resources. In response to determining that the first resource of the plurality of resources is associated with a different authorization requirement than the at least one second resource of the plurality of resources, determining whether the request includes the authorization requirement for the first resource and the authorization requirement for the second resource. In response to determining that the request includes the authorization requirement for the first resource and the authorization requirement for the second resource, providing access to the first resource and the at least one second resource. | 08-15-2013 |
20130247144 | Controlling Access to Resources on a Network - Disclosed are various embodiments for controlling access to data on a network. Upon receiving a request comprising a device identifier and at least one user credential to access a remote resource, the request may be authenticated according to at least one compliance policy. If the request is authenticated, a resource credential associated with the remote resource may be provided. | 09-19-2013 |
20130254401 | Controlling Distribution of Resources on a Network - Disclosed are various embodiments for controlling distribution of resources on a network. In one embodiment, a distribution service receives a request from a client device to access resources hosted by a distribution service. In response, the distribution service determines whether the client device is authorized to access the distribution service. The distribution service identifies which of the resources hosted by the distribution service are accessible to the client device based on the resource grouping identifiers associated with the client device. The distribution service determines which distribution rules are associated with the identified resources, the distribution rules including location rules and time rules. The distribution service then transmits the identified resources and identified distribution rules to the client device, where the resources are configured to be exclusively accessible via a containerized client application on the client device while the client device satisfies the distribution rules associated with the resources. | 09-26-2013 |
20130254889 | Server-Side Restricted Software Compliance - Server-side restricted software compliance may be provided. An application installed on a user device may be identified and analyzed to determine whether the application comprises a security threat by comparing the application to a copy of the application. In response to determining that the application comprises a security threat, a user of the user device may be notified that the application comprises a security threat. | 09-26-2013 |
20130311660 | Functionality Management via Application Modification - Methods, systems, apparatuses, and/or computer-readable media for providing device management via application modification may be provided. In some embodiments, upon receiving a request to perform an action associated with an application, a determination as to whether performing the action will utilize a metered resource may be made. If so, a further determination may be made as to whether the request complies with at least one cost compliance policy and, in response to determining that the request complies with the at least one cost compliance policy, the action may be caused and/or authorize to be performed. | 11-21-2013 |
20130312057 | Functionality Management via Application Modification - Methods, systems, apparatuses, and/or computer-readable media for providing device management via application modification may be provided. In some embodiments, a request to perform an action may be received. Upon determining that the action is associated with a metered resource, a further determination may be made as to whether the request complies with at least one management policy. In response to determining that the request complies with the at least one management policy, the requested action may be authorized and/or caused to be performed. | 11-21-2013 |
20130332989 | Watermarking Detection and Management - A method, system and non-transitory computer-readable medium product are provided for watermarking detection and management. In the context of a method, a method is provided that includes identifying at least one resource accessible to a user device and determining whether a watermark template is applied to the at least one resource accessible to the user device. The method further includes identifying at least one compliance rule and determining whether the at least one compliance rule is satisfied in response to a determination that the watermark template is applied to the at least one resource accessible to the user device. The method yet further includes performing at least one remedial action in response to a determination that the at least one compliance rule is not satisfied. | 12-12-2013 |
20130340060 | Individual-specific Content Management - A method, system, apparatus, and computer program product are provided for facilitating individual-specific content management. For example, a method is provided that includes receiving information regarding at least one prerequisite condition relating to at least one individual, receiving information regarding the at least one individual, determining whether the at least one prerequisite condition is satisfied, and causing individual-specific content associated with the at least one individual to be transmitted. At least a portion of the individual-specific content comprises protected content configured to be unviewable and/or unmodifiable. The method further includes receiving at least one access credential and causing at least a portion of the protected content to be viewable and/or modifiable. | 12-19-2013 |
20140004832 | Data Communications Management | 01-02-2014 |
20140024339 | Telecommunications Data Usage Management - Telecommunications data usage management may be provided. A network state associated with a communication network may be identified. Upon determining that the network state is not in compliance with a data usage policy, access to the communication network may be restricted for at least one application. | 01-23-2014 |
20140040982 | Functionality Watermarking and Management - A method, system and non-transitory computer-readable medium product are provided for functionality watermarking and management. In the context of a method, a method is provided that includes identifying a request to establish an association between a watermark template and a function of at least one user device and determining whether the request to establish the association between the watermark template and the function of the at least one user device is authorized. The method further includes authorizing the request to establish the association between the watermark template and the function of the at least one user device in response to a determination that the request to establish the association between the watermark template and the function of the at least one user device is authorized. | 02-06-2014 |
20140115668 | Systems and Methods for Controlling Network Access - Disclosed are various embodiments for systems and methods for controlling access of networks. In one embodiment, an access control service receives requests to access network beacons from client devices. In response, the access control service determines whether the client devices satisfy authorization rules associated with the network beacons. If the access control service determines that the client devices satisfy the authorization rules associated with the network beacons, the access control service authorizes the client devices to access the network beacons. Subsequently, if the client devices cease to satisfy the authorization rules associated with the network beacons, the access control service terminates the authorization of the client devices to access the network beacons. | 04-24-2014 |
20140156472 | Logistics and Supply Chain Tracking and Management via Mobile Device - Logistics and supply chain tracking and management via mobile devices may be provided. Data about a plurality of inventory items may be collected via a networked device. Upon receiving an order for at least one of the plurality of inventory items, an instruction associated with fulfillment of the order may be created and performed. | 06-05-2014 |
20140157354 | Securing Access to Resources on a Network - Secure access to resources on a network may be provided. Upon receiving a request for at least one resource, a determination may be made as to whether the at least one resource comprises a secure resource. In response to determining that the at least one resource comprises a secure resource, the at least one resource may be retrieved; and at least one security policy may be applied to the at least one resource. | 06-05-2014 |
20140164759 | Systems and Methods for Controlling Email Access - Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more email attachments from the email resources, and encoding the stripped email attachments based at least in part on one or more cryptographic keys. | 06-12-2014 |
20140165132 | Systems and Methods for Controlling Email Access - Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, identifying at least one resource rule associated with the email resources, and adding at least one URL to the email resources in accordance with the resource rules. | 06-12-2014 |
20140165148 | Systems and Methods for Controlling Email Access - Embodiments of the disclosure relate to identifying email resources associated with client devices, identifying resource rules, determining whether the email resources satisfy the resource rules, and modifying the email resources based on the resource rules if the resource rules are not satisfied by the email resources. | 06-12-2014 |
20140165153 | Systems and Methods for Controlling Email Access - Embodiments of the disclosure relate to proxying at least one email resource in transit to at least one client device from at least one email service, removing at least one URL from the email resources, and adding at least one modified URL to the email resources. | 06-12-2014 |
20140165213 | Systems and Methods for Controlling Email Access - Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, determining whether the email resources are accessible to the client devices via at least one unauthorized application on the client devices, and modifying the email resources to be inaccessible via the unauthorized applications on the client devices in response to a determination that the email resources are accessible via the unauthorized applications on the client devices. | 06-12-2014 |
20140189119 | Controlling Access to Resources on a Network - Control of access to resources on a network may be provided. A request to access enterprise resource(s), the request comprising a set of user access credentials and a device identifier, may be generated. The request to access the at least one enterprise resource and an updated device profile may be provided to an authorization service. A set of enterprise access credentials may be received from the authorization service and used to generate a second request to access the enterprise resource(s). | 07-03-2014 |
20140195927 | Multi-Persona Devices and Management - Apparatuses and devices configured with multiple user personas may be provided. For example, a device may comprise a housing embedding a display, one or more processors, and one or more memory storages. A first processor and/or memory storage may be dedicated to a first unique user persona and a second processor and/or memory storage may be dedicated to a second unique user persona. | 07-10-2014 |
20140208095 | MANAGED REAL-TIME COMMUNICATIONS BETWEEN USER DEVICES - Managed real-time communications between user devices may be provided. Upon receiving a request to instantiate a communication connection from an application, a secure session may be established between the application and a remote application. Input from a user of the application may be received, subjected to at least one management policy, and transmitted to the remote application. | 07-24-2014 |
20140245008 | Systems and Methods for Controlling Email Access - Embodiments of the disclosure relate to proxying at least one email resource in transit to at least one client device from at least one email service, removing at least one URL from the email resources, and adding at least one modified URL to the email resources. | 08-28-2014 |
20140245381 | Systems and Methods for Controlling Email Access - Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, identifying at least one resource rule associated with the email resources, and adding at least one URL to the email resources in accordance with the resource rules. | 08-28-2014 |
20140270410 | FACIAL CAPTURE MANAGING ACCESS TO RESOURCES BY A DEVICE - Disclosed are various embodiments for controlling access to resources by a client device. Methods may include receiving a user request to access a resource on the device and determining whether the resource requires a facial capture. If the resource requires a facial capture, a camera of the device may be automatically activated to capture an image and the resource may be rendered on the device. In some cases, access to the resource may be limited based on whether the image includes a face or not. A record associating the image and the requested resource may be stored, for example, on the device or on a remote server. | 09-18-2014 |
20140280955 | Controlling Electronically Communicated Resources - Methods, systems, and devices provide control over resources electronically communicated among computing devices. In some embodiments, a management application identifies multiple entities for communicating electronic content. The management application determines that at least a subset of the entities required for communicating the electronic content is available for electronic communication. The management application authorizes communication of at least some of the electronic content among the entities in response to determining that the required subset of entities is available for electronic communication. | 09-18-2014 |
20140282828 | Data Access Sharing - Data access sharing may be provided. Requests may be received to display an data item associated with a list of data items. Upon determining whether a property of the data item is restricted by an access control policy, the property may be modified prior to rendering a display of the data item. | 09-18-2014 |
20140282829 | INCREMENTAL COMPLIANCE REMEDIATION - Disclosed are various embodiments for enforcing device compliance parameters by inhibiting access to devices, networks or resources. Methods may include associating a compliance rule with a client device. If the compliance rule is violated, a setting associated with the client device may be altered. The altered setting may inhibit access to the client device, a network, a client device resource and/or a network resource. For example, necessary password complexities may be increased, password lifetimes may be decreased and/or resources may be restricted based on a geofence, a time of day and/or a day of the week. | 09-18-2014 |
20140282846 | SECONDARY DEVICE AS KEY FOR AUTHORIZING ACCESS TO RESOURCES - A secondary device may be used to provide access to resources to a primary device. Upon receiving an authorization indication at a device, a registration key based on the authorization indication, a user identifier, and a property of the device may be created. Upon determining whether access to at least one resource is permitted according to the registration key the device may be permitted to access the at least one resource. | 09-18-2014 |
20140282895 | SECONDARY DEVICE AS KEY FOR AUTHORIZING ACCESS TO RESOURCES - In a networked environment, a client side application executed on a chant device may transmit a request to an authorization service for access to a resource. The authorization service may authenticate the user of client device and/or the client device based on user credentials and/or a device identifier. The authorization service may require that the client device comply with a distribution rule associated with the resource, where the distribution rule requires a specified secondary client device to be in communication with the client device as a prerequisite to accessing the resource. The client side application may determine that the client device complies with the distribution rule and may thereafter access the resources. In some cases, the secondary chant device facilitates access to the resource, which may involve receiving from the secondary client device an authorization credential to be used for receiving authorization to access the resource. | 09-18-2014 |
20140282897 | APPLICATION PROGRAM AS KEY FOR AUTHORIZING ACCESS TO RESOURCES - In a networked environment, a client side application executed on a client device may transmit a request to an authorization service for access to a resource. The authorization service may authenticate the user of client device and/or the client device based on user credentials and/or a device identifier. In response to authenticating the user and/or the client device, the authorization service may send to the client side application a request for confirmation that the client device complies with a distribution rule associated with the resource, where the distribution rule requires a specific application or specific type of application to be installed, enabled and/or executing on the client device as a prerequisite to accessing the resource. If the client device complies with the distribution rule, the client side application accesses the resource. Accessing the resource may include receiving an authorization credential required for access to the resource. | 09-18-2014 |
20140298462 | Restricted Software Automated Compliance - Automated restricted software compliance may be provided. Periodic scans may be performed to identify applications as potentially restricted applications. Upon identifying a restricted application, a notification of the presence of the restricted application and a proposed remedial action may be provided. If the restricted application is not removed, the remedial action may be performed. | 10-02-2014 |
20140310765 | On-Demand Security Policy Activation - On-demand activation of a security policy may be provided. Upon receiving a selection of a link, a profile identified by a security policy associated with the link may be activated and the link may be opened according to the security policy. In some embodiments, opening the link according to the security policy may comprise redirecting the opening of the link from a first application to a second application. | 10-16-2014 |
20140310771 | Time-based Functionality Restrictions - Time-based functionality restrictions may be provided. Periodic scans may be performed to identify requests to perform functions on user devices, to determine whether the functions are compliant with compliance rules associated with the user devices that specify time periods during which the user devices are authorized to perform the functions, and to perform remedial actions if the functions are not compliant with the compliance rules. | 10-16-2014 |
20140310772 | Location-based Functionality Restrictions - Location-based functionality restrictions may be provided. Periodic scans may be performed to identify requests to perform functions on user devices, to determine whether the functions are compliant with compliance rules associated with the user devices that specify location where the user devices are authorized to perform the functions, and to perform remedial actions if the functions are not compliant with the compliance rules. | 10-16-2014 |
20140330944 | Time-based Configuration Policy Toggling - Time-based configuration profile toggling may be provided. Configuration profiles associated with user devices may be identified, determinations of whether the user devices are authorized to enable the configuration profiles on the user devices may be made based at least in part on time constraints, and the configuration profiles may be enabled on the user devices if the time constraints are satisfied. | 11-06-2014 |
20140330945 | Location-based Configuration Policy Toggling - Location-based configuration profile toggling may be provided. Configuration profiles associated with user devices may be identified, determinations of whether the user devices are authorized to enable the configuration profiles on the user devices may be made based at least in part on location constraints, and the configuration profiles may be enabled on the user devices if the location constraints are satisfied. | 11-06-2014 |
20140331040 | Systems and Methods for Controlling Email Access - Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more email attachments from the email resources, and encoding the stripped email attachments based at least in part on one or more cryptographic keys. | 11-06-2014 |
20140331316 | Functionality Watermarking and Management - A method, system and non-transitory computer-readable medium product are provided for functionality watermarking and management. In the context of a method, a method is provided that includes identifying a request to establish an association between a watermark template and a function of at least one user device and determining whether the request to establish the association between the watermark template and the function of the at least one user device is authorized. The method further includes authorizing the request to establish the association between the watermark template and the function of the at least one user device in response to a determination that the request to establish the association between the watermark template and the function of the at least one user device is authorized. | 11-06-2014 |
20140337925 | Secure Application Leveraging of Web Filter Proxy Services - Secure application leveraging of a filter proxy service may be provided. In response to receiving a request to access a resource, a filter proxy service may be used to determine whether the request to access the resource is approved. If the request to access the resource is approved, the access to the resource may be allowed to continue. | 11-13-2014 |
20140358703 | Item Delivery Optimization - Item delivery optimization may be provided. Items may be identified as available for delivery at a first location to at least one second location. A route from the first location to the second location may be calculated and at least a portion of the route from the first location to the second location may be provided to a delivery mechanism, such as an automated delivery device and/or a user. | 12-04-2014 |
20150082371 | Multi-Persona Devices and Management - A method of installing an application on a device configured with a plurality of personas is disclosed. The method includes receiving an indication to engage a first persona of the plurality of personas. The method further includes causing an indication of the first persona to be displayed. The method further includes receiving, via an interface associated with the first persona, an indication to install a first application. The method further includes causing the first application to be installed. The method further includes causing the installed first application to be associated with the first persona. | 03-19-2015 |