JP2005535969A - 侵害された遠隔装置上のデータへのアクセスを防止するシステムおよび方法 - Google Patents
侵害された遠隔装置上のデータへのアクセスを防止するシステムおよび方法 Download PDFInfo
- Publication number
- JP2005535969A JP2005535969A JP2004528143A JP2004528143A JP2005535969A JP 2005535969 A JP2005535969 A JP 2005535969A JP 2004528143 A JP2004528143 A JP 2004528143A JP 2004528143 A JP2004528143 A JP 2004528143A JP 2005535969 A JP2005535969 A JP 2005535969A
- Authority
- JP
- Japan
- Prior art keywords
- data
- remote device
- data subset
- server
- command
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 148
- 230000001010 compromised effect Effects 0.000 title claims abstract description 35
- 230000001360 synchronised effect Effects 0.000 description 64
- 238000004891 communication Methods 0.000 description 33
- 230000008859 change Effects 0.000 description 27
- 230000006378 damage Effects 0.000 description 27
- 230000008569 process Effects 0.000 description 25
- 238000010586 diagram Methods 0.000 description 22
- 230000008520 organization Effects 0.000 description 15
- 238000012217 deletion Methods 0.000 description 10
- 230000037430 deletion Effects 0.000 description 10
- 230000007246 mechanism Effects 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 7
- 238000013475 authorization Methods 0.000 description 6
- 238000012546 transfer Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 5
- 238000007726 management method Methods 0.000 description 5
- 230000001960 triggered effect Effects 0.000 description 5
- 238000004590 computer program Methods 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 230000003936 working memory Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 230000015654 memory Effects 0.000 description 3
- 235000006508 Nelumbo nucifera Nutrition 0.000 description 2
- 240000002853 Nelumbo nucifera Species 0.000 description 2
- 235000006510 Nelumbo pentapetala Nutrition 0.000 description 2
- 241000700605 Viruses Species 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 230000008450 motivation Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 239000000872 buffer Substances 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- VZCCETWTMQHEPK-QNEBEIHSSA-N gamma-linolenic acid Chemical compound CCCCC\C=C/C\C=C/C\C=C/CCCCC(O)=O VZCCETWTMQHEPK-QNEBEIHSSA-N 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000000670 limiting effect Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000004083 survival effect Effects 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/128—Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
本出願は、発明者ダニエル ジェィ メンデッツ、及び、メイソン エヌジーによって2002年8月9日に出願された米国暫定特許出願第60/402,287号「グローバルサーバシステムへのアクセスがもはや許可されない遠隔装置を一掃するシステム、方法、およびコンピュータプログラム製品」に対して米国特許法第119条の利益を主張したものであり、この出願は引用に含まれている。
本発明は、遠隔データアクセスの分野に関連し、特に、侵害されており、許可を受けていないユーザに使用される状態にある遠隔装置上で入手可能なデータを自動破棄する技術に関する。
データのアクセス可能性及び一貫性は、コンピュータユーザにとって重要な問題である。遠隔位置に移動したローミングユーザが電子メールあるいは電子書類などのデータを調べたり操作したりする必要がある場合、このローミングユーザはデータをその遠隔位置に運び、遠隔地からワークステーションにアクセスする必要がある。必要なデータを含むデータベースの正しく複製されたコピーを維持することは面倒な手順であるため、システム設計者はコンピュータネットワークを介してデータを保存しているサーバへ遠隔装置を接続する様々な技術を開発している。
本発明の実施例は、会社、政府エージェント、プライベートクラブ、その他の組織においてデータを担当するユーザに対して、遠隔装置が侵害されている場合あるいは遠隔装置のユーザが許可ステータスを失っているような場合に、例えば、その組織の中央位置で、グローバルサーバシステムと通信する遠隔装置のデータの誤使用を防ぐ方法、システム、およびコンピュータプログラム製品を提供する。
発明の背景で記載した問題点は、サーバシステムなどのデータの中央リポジトリと通信する遠隔装置上のデータの許可されていない使用を防ぐためのシステムと方法が求められていることを明らかにしている。遠隔装置またはその遠隔装置と通信するサーバ上のデータへの許可されていないアクセスの問題に取り組んだシステム、方法及びコンピュータプログラム製品がここに述べられている。
Claims (48)
- 遠隔装置が侵害されていることの表示を受信するステップと;
前記遠隔装置から少なくとも一つのデータサブセットを選択するステップと;
前記少なくとも一つのデータサブセットへのアクセスを防止するコマンドを前記遠隔装置に送信するステップと;
を具えることを特徴とする方法。 - 請求項1に記載の方法において、前記コマンドが前記少なくとも一つのデータサブセットを消去するステップを具えることを特徴とする方法。
- 請求項1に記載の方法において、前記コマンドが前記少なくとも一つのデータサブセットを暗号化するステップを具えることを特徴とする方法。
- 請求項1に記載の方法が、更に、前記少なくとも一つのデータサブセットを他の場所へ送信するコマンドを前記遠隔装置に送信するステップを具えることを特徴とする方法。
- 請求項1に記載の方法において、前記少なくとも一つのデータサブセットが非同期データを具えることを特徴とする方法。
- 請求項1に記載の方法において、前記少なくとも一つのデータサブセットが同期データを具えることを特徴とする方法。
- 請求項1に記載の方法において、前記少なくとも一つのデータサブセットが個人データを具えることを特徴とする方法。
- 請求項1に記載の方法において、前記少なくとも一つのデータサブセットがアプリケーションを具えることを特徴とする方法。
- 請求項1に記載の方法が、更に、前記遠隔装置とネットワーク間の接続を切るコマンドを前記遠隔装置に送信するステップを具えることを特徴とする方法。
- 請求項1に記載の方法において、前記表示が前記遠隔装置によって送信されることを特徴とする方法。
- 請求項1に記載の方法において、前記少なくとも一つのデータサブセットが遠隔装置上の全データを具えることを特徴とする方法。
- コンピュータにある方法を実行させる命令を格納しているコンピュータで読み取り可能な媒体において、前記方法が:
遠隔装置が侵害されていることの表示を受信するステップと;
前記遠隔装置からの少なくとも一つのデータサブセットを選択するステップと;
前記少なくとも一つのデータサブセットへのアクセスを防止するコマンドを前記遠隔装置に送信するステップと;
を具えることを特徴とするコンピュータで読み取り可能な媒体。 - 遠隔装置上の少なくとも一つのデータサブセットがアクセスされることを防止する技術を表示した手順ファイルと;
前記手順ファイルと前記遠隔装置に通信可能に接続され、遠隔装置が侵害されていることの表示を受信することができ、前記遠隔装置から少なくとも一つのデータサブセットを選択し、前記手順ファイルに従って前記少なくとも一つのデータサブセットへのアクセスを防止するコマンドを前記遠隔装置に送信する、サーバを具えることを特徴とするシステム。 - 請求項13に記載のシステムにおいて、前記コマンドが前記少なくとも一つのデータサブセットの消去を含むことを特徴とするシステム。
- 請求項13に記載のシステムにおいて、前記コマンドが前記少なくとも一つのデータサブセットの暗号化を含むことを特徴とするシステム。
- 請求項13に記載のシステムにおいて、前記サーバがさらに、前記少なくとも一つのデータサブセットを別の場所に送信するコマンドを前記遠隔装置に送信することができることを特徴とするシステム。
- 請求項13に記載のシステムにおいて、前記少なくとも一つのデータサブセットが非同期データを含むことを特徴とするシステム。
- 請求項13に記載のシステムにおいて、前記少なくとも一つのデータサブセットが同期データを含むことを特徴とするシステム。
- 請求項13に記載のシステムにおいて、前記少なくとも一つのデータサブセットが個人データを含むことを特徴とするシステム。
- 請求項13に記載のシステムにおいて、前記少なくとも一つのデータサブセットがアプリケーションを含むことを特徴とするシステム。
- 請求項13に記載のシステムにおいて、前記サーバが前記遠隔装置とネットワークとの接続を切断するコマンドを前記遠隔装置に送信できることを特徴とするシステム。
- 請求項13に記載のシステムにおいて、前記遠隔装置によって前記表示が前記サーバに送信されることを特徴とするシステム。
- 請求項13に記載のシステムにおいて、前記少なくとも一つのデータサブセットが前記遠隔装置上の全データを含むことを特徴とするシステム。
- 遠隔装置が侵害されていることの表示を受信する手段と;
前記遠隔装置から前記少なくとも一つのデータサブセットを選択する手段と;
前記少なくとも一つのデータサブセットへのアクセスを防止するコマンドを前記遠隔装置に送信する手段と;
を具えることを特徴とするシステム。 - 遠隔装置が侵害されている場合に、遠隔装置の少なくとも一つのデータサブセットへのアクセスを防止するコマンドを受信するステップと;
前記少なくとも一つのデータサブセットへのアクセスを防止するコマンドを実行するステップと;
を具えることを特徴とする方法。 - 請求項25に記載の方法において、前記コマンドが前記少なくとも一つのデータサブセットの消去を含むことを特徴とする方法。
- 請求項25に記載の方法において、前記コマンドが前記少なくとも一つのデータサブセットの暗号化を含むことを特徴とする方法。
- 請求項25に記載の方法が更に:
前記少なくとも一つのデータサブセットを別の場所に送信するコマンドを前記遠隔装置で受信するステップと;
前記少なくとも一つのデータサブセットを別の場所に送信するステップとを;
具えることを特徴とする方法。 - 請求項25に記載の方法において、前記少なくとも一つのデータサブセットが非同期データを含むことを特徴とする方法。
- 請求項25に記載の方法において、前記少なくとも一つのデータサブセットが同期データを含むことを特徴とする方法。
- 請求項25に記載の方法において、前記少なくとも一つのデータサブセットが個人データを含むことを特徴とする方法。
- 請求項25に記載の方法において、前記少なくとも一つのデータサブセットがアプリケーションを含むことを特徴とする方法。
- 請求項25に記載の方法が、更に、
前記遠隔装置とネットワーク間の接続を切断するコマンドを前記遠隔装置で受信するステップと;
前記遠隔装置と前記ネットワーク間の接続を切断するステップと;
を具えることを特徴とする方法。 - 請求項25に記載の方法において、前記少なくとも一つのデータサブセットが前記遠隔装置上の全データを具えることを特徴とする方法。
- ある方法を実行するための命令が格納されているコンピュータで読み取り可能な媒体において、前記方法が:
遠隔装置が侵害されている場合に遠隔装置における少なくとも一つのデータサブセットへのアクセスを防止するコマンドをサーバから受信するステップと;
前記少なくとも一つのデータサブセットへのアクセスを防止する前記コマンドを実行するステップと;
を具えることを特徴とするコンピュータで読み取り可能な媒体。 - 遠隔装置におけるデータの場所とタイプを追跡可能なデータトラッカと;
前記遠隔装置が侵害されている場合に前記遠隔装置において少なくとも一つのデータサブセットへのアクセスを防止するコマンドを受信可能であり、前記データトラッカによって生成される情報に基づいて前記少なくとも一つのデータサブセットへのアクセスを防止するコマンドを実行することができる、前記データトラッカに通信可能に接続されているクライアントと;
を具えることを特徴とするシステム。 - 請求項36に記載のシステムにおいて、前記コマンドが前記少なくとも一つのデータサブセットの消去を含むことを特徴とするシステム。
- 請求項36に記載のシステムにおいて、前記コマンドが前記少なくとも一つのデータサブセットの暗号化を含むことを特徴とするシステム。
- 請求項36に記載のシステムにおいて、前記クライアントが更に;
前記少なくとも一つのデータサブセットを別の場所に送信するコマンドを前記遠隔装置において受信することと;
前記少なくとも一つのデータサブセットを別の場所に送信すること;
が可能であることを特徴とするシステム。 - 請求項36に記載のシステムにおいて、前記少なくとも一つのデータサブセットが非同期データを含むことを特徴とするシステム。
- 請求項36に記載のシステムにおいて、前記少なくとも一つのデータサブセットが同期データを含むことを特徴とするシステム。
- 請求項36に記載のシステムにおいて、前記少なくとも一つのデータサブセットが個人データを含むことを特徴とするシステム。
- 請求項36に記載のシステムにおいて、前記少なくとも一つのデータサブセットがアプリケーションを含むことを特徴とするシステム。
- 請求項36に記載のシステムが、更に、前記遠隔装置とネットワークとの接続を切断するコマンドを前記遠隔装置において受信することができ;
前記遠隔装置と前記ネットワークとの間の接続を切断することができる、遠隔装置切断エンジンを具えることを特徴とするシステム。 - 請求項36に記載のシステムにおいて、前記少なくとも一つのデータサブセットが前記遠隔装置の全データを含むことを特徴とするシステム。
- 遠隔装置が侵害されている場合に遠隔装置における少なくとも一つのデータサブセットへのアクセスを防止するコマンドをサーバから受信する手段と;
前記少なくとも一つのデータサブセットへのアクセスを防止する前記コマンドを実行する手段と;
を具えることを特徴とするシステム。 - 遠隔装置が侵害されている旨の表示を受信するステップと;
前記遠隔装置から少なくとも一つのデータサブセットを選択するステップと;
前記少なくとも一つのデータサブセットを別の場所に送信するコマンドを前記遠隔装置に送信するステップと;
を具えることを特徴とする方法。 - 遠隔装置が侵害されている旨の表示を受信するステップと;
前記遠隔装置とネットワーク間のアクセスを切断するコマンドを前記遠隔装置に送信するステップと;
を具えることを特徴とする方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US40228702P | 2002-08-09 | 2002-08-09 | |
PCT/US2003/025795 WO2004015576A1 (en) | 2002-08-09 | 2003-08-09 | System and method for preventing access to data on a compromised remote device |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2005535969A true JP2005535969A (ja) | 2005-11-24 |
JP4612416B2 JP4612416B2 (ja) | 2011-01-12 |
Family
ID=31715828
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2004528143A Expired - Lifetime JP4612416B2 (ja) | 2002-08-09 | 2003-08-09 | 危殆化した遠隔装置上のデータへのアクセスを防止するシステムおよび方法 |
Country Status (8)
Country | Link |
---|---|
US (6) | US8012219B2 (ja) |
EP (3) | EP1535159B1 (ja) |
JP (1) | JP4612416B2 (ja) |
CN (1) | CN100380337C (ja) |
AU (1) | AU2003259893B2 (ja) |
CA (1) | CA2495083A1 (ja) |
IL (1) | IL166762A0 (ja) |
WO (1) | WO2004015576A1 (ja) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007233989A (ja) * | 2006-02-06 | 2007-09-13 | Fujitsu Business Systems Ltd | 情報漏洩防止プログラム、情報漏洩防止方法および情報漏洩防止装置 |
JP2016532955A (ja) * | 2013-08-01 | 2016-10-20 | ドロップボックス, インコーポレイテッド | 接続デバイスでの強制暗号化 |
JP2016532956A (ja) * | 2013-07-30 | 2016-10-20 | ドロップボックス, インコーポレイテッド | リンク解除されたデバイスにおける未同期コンテンツ・アイテムの管理技術 |
JP2022121295A (ja) * | 2021-02-08 | 2022-08-19 | ソフトバンク株式会社 | 画像解析装置、プログラム、及び管理方法 |
Families Citing this family (226)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060195595A1 (en) | 2003-12-19 | 2006-08-31 | Mendez Daniel J | System and method for globally and securely accessing unified information in a computer network |
US6219694B1 (en) | 1998-05-29 | 2001-04-17 | Research In Motion Limited | System and method for pushing information from a host system to a mobile data communication device having a shared electronic address |
US7739334B1 (en) | 2000-03-17 | 2010-06-15 | Visto Corporation | System and method for automatically forwarding email and email events via a computer network to a server computer |
US7225231B2 (en) * | 2000-09-20 | 2007-05-29 | Visto Corporation | System and method for transmitting workspace elements across a network |
US7197541B1 (en) | 2001-06-18 | 2007-03-27 | Palm, Inc. | Method and apparatus for automated personality transfer for a wireless enabled handheld device |
EP2296098B1 (en) * | 2001-10-23 | 2019-02-27 | BlackBerry Limited | System and method for merging remote and local data in a single user interface |
CA2467404A1 (en) * | 2001-11-15 | 2003-05-30 | Visto Corporation | System and methods for asychronous synchronization |
EP1535159B1 (en) | 2002-08-09 | 2016-03-02 | Good Technology Corporation | System and method for preventing access to data on a compromised remote device |
US20080261633A1 (en) | 2002-10-22 | 2008-10-23 | Research In Motion Limited | System and Method for Pushing Information from a Host System to a Mobile Data Communication Device |
US20050033976A1 (en) * | 2003-08-04 | 2005-02-10 | Sbc Knowledge Ventures, L.P. | Host intrusion detection and isolation |
US9336393B2 (en) * | 2003-08-23 | 2016-05-10 | Softex Incorporated | System and method for protecting files stored on an electronic device |
US20050080787A1 (en) * | 2003-10-14 | 2005-04-14 | National Gypsum Properties, Llc | System and method for protecting management records |
US7421589B2 (en) | 2004-07-21 | 2008-09-02 | Beachhead Solutions, Inc. | System and method for lost data destruction of electronic data stored on a portable electronic device using a security interval |
WO2006012457A1 (en) * | 2004-07-21 | 2006-02-02 | Beachhead Solutions, Inc. | A system and method for lost data destruction of electronic data stored on portable electronic devices |
US8001082B1 (en) | 2004-10-28 | 2011-08-16 | Good Technology, Inc. | System and method of data security in synchronizing data with a wireless device |
US20060248352A1 (en) * | 2005-04-27 | 2006-11-02 | Sbc Knowledge Ventures, L.P. | Method and system of securing electronic data |
CN100391189C (zh) * | 2006-04-05 | 2008-05-28 | 中国科学院研究生院 | 基于互联网的访问和共享远程设备的系统和方法 |
US8121915B1 (en) * | 2006-08-16 | 2012-02-21 | Resource Consortium Limited | Generating financial plans using a personal information aggregator |
US8930204B1 (en) | 2006-08-16 | 2015-01-06 | Resource Consortium Limited | Determining lifestyle recommendations using aggregated personal information |
WO2008048419A2 (en) * | 2006-10-18 | 2008-04-24 | Wms Gaming Inc. | Control of reconfigurable gaming machines |
US7603435B2 (en) | 2006-11-15 | 2009-10-13 | Palm, Inc. | Over-the-air device kill pill and lock |
US20080115152A1 (en) | 2006-11-15 | 2008-05-15 | Bharat Welingkar | Server-controlled heartbeats |
US8135798B2 (en) | 2006-11-15 | 2012-03-13 | Hewlett-Packard Development Company, L.P. | Over-the-air device services and management |
US8856511B2 (en) | 2006-12-14 | 2014-10-07 | Blackberry Limited | System and method for wiping and disabling a removed device |
US8056143B2 (en) | 2007-01-19 | 2011-11-08 | Research In Motion Limited | Selectively wiping a remote device |
US8060653B2 (en) * | 2007-04-23 | 2011-11-15 | Ianywhere Solutions, Inc. | Background synchronization |
WO2008144943A1 (en) * | 2007-05-29 | 2008-12-04 | Absolute Software Corporation | Offline data delete with false trigger protection |
US8635125B2 (en) * | 2007-07-03 | 2014-01-21 | Microsoft Corporation | Automatic calculation with multiple editable fields |
US8060074B2 (en) | 2007-07-30 | 2011-11-15 | Mobile Iron, Inc. | Virtual instance architecture for mobile device management systems |
GB2452479A (en) * | 2007-08-31 | 2009-03-11 | Sony Corp | Content protection through deletion of a decryption key in response to a predetermined event |
WO2009033431A1 (fr) * | 2007-09-13 | 2009-03-19 | Shenzhen Huawei Telecommunication Technologies Co., Ltd. | Procédé pour effacer des données de terminal et dispositif de terminal |
US9552491B1 (en) * | 2007-12-04 | 2017-01-24 | Crimson Corporation | Systems and methods for securing data |
US8239523B1 (en) * | 2008-01-22 | 2012-08-07 | Avaya Inc. | Secure remote access |
KR101339869B1 (ko) * | 2008-09-22 | 2013-12-10 | 삼성전자주식회사 | 화상형성장치 및 화상형성장치의 저장부에 대한 오버라이트방법 |
US8650290B2 (en) | 2008-12-19 | 2014-02-11 | Openpeak Inc. | Portable computing device and method of operation of same |
US8788655B2 (en) | 2008-12-19 | 2014-07-22 | Openpeak Inc. | Systems for accepting and approving applications and methods of operation of same |
US8615581B2 (en) | 2008-12-19 | 2013-12-24 | Openpeak Inc. | System for managing devices and method of operation of same |
US8856322B2 (en) | 2008-12-19 | 2014-10-07 | Openpeak Inc. | Supervisory portal systems and methods of operation of same |
US8713173B2 (en) | 2008-12-19 | 2014-04-29 | Openpeak Inc. | System and method for ensuring compliance with organizational policies |
US8745213B2 (en) | 2008-12-19 | 2014-06-03 | Openpeak Inc. | Managed services platform and method of operation of same |
US8612582B2 (en) | 2008-12-19 | 2013-12-17 | Openpeak Inc. | Managed services portals and method of operation of same |
US8199507B2 (en) | 2008-12-19 | 2012-06-12 | Openpeak Inc. | Telephony and digital media services device |
US8340633B1 (en) | 2009-04-09 | 2012-12-25 | Mobile Iron, Inc. | Mobile activity intelligence |
US20100299152A1 (en) * | 2009-05-20 | 2010-11-25 | Mobile Iron, Inc. | Selective Management of Mobile Devices in an Enterprise Environment |
US8695058B2 (en) * | 2009-05-20 | 2014-04-08 | Mobile Iron, Inc. | Selective management of mobile device data in an enterprise environment |
US20120042354A1 (en) * | 2010-08-13 | 2012-02-16 | Morgan Stanley | Entitlement conflict enforcement |
US9077796B2 (en) | 2010-08-17 | 2015-07-07 | Openpeak Inc. | System containing a mobile communication device and associated docking station |
US9645992B2 (en) | 2010-08-21 | 2017-05-09 | Oracle International Corporation | Methods and apparatuses for interaction with web applications and web application data |
US8583091B1 (en) | 2010-09-06 | 2013-11-12 | Sprint Communications Company L.P. | Dynamic loading, unloading, and caching of alternate complete interfaces |
US8838087B1 (en) | 2010-09-06 | 2014-09-16 | Sprint Communications Company L.P. | Provisioning system and methods for interfaceless phone |
US8650658B2 (en) | 2010-10-25 | 2014-02-11 | Openpeak Inc. | Creating distinct user spaces through user identifiers |
US8359016B2 (en) | 2010-11-19 | 2013-01-22 | Mobile Iron, Inc. | Management of mobile applications |
US8869307B2 (en) | 2010-11-19 | 2014-10-21 | Mobile Iron, Inc. | Mobile posture-based policy, remediation and access control for enterprise resources |
US8559933B1 (en) | 2011-02-08 | 2013-10-15 | Sprint Communications Company L.P. | System and method for ID platform |
US9123062B1 (en) | 2011-02-18 | 2015-09-01 | Sprint Communications Company L.P. | Ad sponsored interface pack |
US9202059B2 (en) | 2011-03-01 | 2015-12-01 | Apurva M. Bhansali | Methods, systems, and apparatuses for managing a hard drive security system |
US9224166B2 (en) | 2011-03-08 | 2015-12-29 | Bank Of America Corporation | Retrieving product information from embedded sensors via mobile device video analysis |
US9043446B1 (en) | 2011-03-10 | 2015-05-26 | Sprint Communications Company L.P. | Mirroring device interface components for content sharing |
US8972592B1 (en) | 2011-05-27 | 2015-03-03 | Sprint Communications Company L.P. | Extending an interface pack to a computer system |
US9143910B2 (en) * | 2011-09-30 | 2015-09-22 | Blackberry Limited | Method and system for remote wipe through voice mail |
US8695060B2 (en) | 2011-10-10 | 2014-04-08 | Openpeak Inc. | System and method for creating secure applications |
US20140032733A1 (en) | 2011-10-11 | 2014-01-30 | Citrix Systems, Inc. | Policy-Based Application Management |
US9280377B2 (en) | 2013-03-29 | 2016-03-08 | Citrix Systems, Inc. | Application with multiple operation modes |
US9215225B2 (en) | 2013-03-29 | 2015-12-15 | Citrix Systems, Inc. | Mobile device locking with context |
US8881229B2 (en) | 2011-10-11 | 2014-11-04 | Citrix Systems, Inc. | Policy-based application management |
US20140053234A1 (en) | 2011-10-11 | 2014-02-20 | Citrix Systems, Inc. | Policy-Based Application Management |
US9529996B2 (en) | 2011-10-11 | 2016-12-27 | Citrix Systems, Inc. | Controlling mobile device access to enterprise resources |
US9619810B1 (en) | 2011-10-11 | 2017-04-11 | Sprint Communications Company L.P. | Zone architecture for dynamic targeted content creation |
US9430641B1 (en) | 2011-11-03 | 2016-08-30 | Mobile Iron, Inc. | Adapting a mobile application to a partitioned environment |
US9386009B1 (en) | 2011-11-03 | 2016-07-05 | Mobile Iron, Inc. | Secure identification string |
US9129273B2 (en) * | 2011-12-01 | 2015-09-08 | At&T Intellectual Property I, L.P. | Point of sale for mobile transactions |
US20130151705A1 (en) * | 2011-12-07 | 2013-06-13 | Apple Inc. | System for provisioning diverse types of resources through a unified interface |
US9787655B2 (en) | 2011-12-09 | 2017-10-10 | Airwatch Llc | Controlling access to resources on a network |
US8713646B2 (en) | 2011-12-09 | 2014-04-29 | Erich Stuntebeck | Controlling access to resources on a network |
EP2795520A4 (en) | 2011-12-22 | 2015-09-02 | Intel Corp | INCORPORATED FLIGHT REACTION SUBSYSTEM ALWAYS AVAILABLE |
WO2013095589A1 (en) * | 2011-12-22 | 2013-06-27 | Intel Corporation | Always-available embedded theft reaction subsystem |
EP2795507A4 (en) | 2011-12-22 | 2015-08-12 | Intel Corp | STILL AVAILABLE EMBEDDED THEFT REACTION SYSTEM |
WO2013095586A1 (en) | 2011-12-22 | 2013-06-27 | Intel Corporation | Always-available embedded theft reaction subsystem |
WO2013095591A1 (en) | 2011-12-22 | 2013-06-27 | Intel Corporation | Always-available embedded theft reaction subsystem |
EP2795514A4 (en) | 2011-12-22 | 2015-12-30 | Intel Corp | INCORPORATED FLIGHT REACTION SUBSYSTEM ALWAYS AVAILABLE |
US9619671B2 (en) | 2011-12-22 | 2017-04-11 | Intel Corporation | Always-available embedded theft reaction subsystem |
WO2013095587A1 (en) | 2011-12-22 | 2013-06-27 | Intel Corporation | Always-available embedded theft reaction subsystem |
US9558378B2 (en) | 2011-12-22 | 2017-01-31 | Intel Corporation | Always-available embedded theft reaction subsystem |
US9148419B2 (en) * | 2012-02-13 | 2015-09-29 | PivotCloud, Inc. | User administering a trustworthy workspace |
US10404615B2 (en) | 2012-02-14 | 2019-09-03 | Airwatch, Llc | Controlling distribution of resources on a network |
US9705813B2 (en) | 2012-02-14 | 2017-07-11 | Airwatch, Llc | Controlling distribution of resources on a network |
US10257194B2 (en) | 2012-02-14 | 2019-04-09 | Airwatch Llc | Distribution of variably secure resources in a networked environment |
US9680763B2 (en) | 2012-02-14 | 2017-06-13 | Airwatch, Llc | Controlling distribution of resources in a network |
US9722972B2 (en) | 2012-02-26 | 2017-08-01 | Oracle International Corporation | Methods and apparatuses for secure communication |
EP2820793B1 (en) | 2012-02-29 | 2018-07-04 | BlackBerry Limited | Method of operating a computing device, computing device and computer program |
CN104145446B (zh) | 2012-02-29 | 2018-06-05 | 黑莓有限公司 | 操作计算设备的方法、计算设备及计算机程序 |
WO2013130555A2 (en) | 2012-02-29 | 2013-09-06 | Good Technology Corporation | Method of operating a computing device, computing device and computer program |
US9594921B2 (en) | 2012-03-02 | 2017-03-14 | International Business Machines Corporation | System and method to provide server control for access to mobile client data |
CN104718526B (zh) | 2012-03-30 | 2018-04-17 | Sncr有限责任公司 | 安全移动框架 |
US10225300B2 (en) | 2012-06-10 | 2019-03-05 | Apple Inc. | Unified playback position |
US10409984B1 (en) | 2012-06-15 | 2019-09-10 | Square, Inc. | Hierarchical data security measures for a mobile device |
US8843122B1 (en) * | 2012-06-29 | 2014-09-23 | Sprint Communications Company L.P. | Mobile phone controls preprocessor |
US9413839B2 (en) | 2012-07-31 | 2016-08-09 | Sprint Communications Company L.P. | Traffic management of third party applications |
US9183412B2 (en) | 2012-08-10 | 2015-11-10 | Sprint Communications Company L.P. | Systems and methods for provisioning and using multiple trusted security zones on an electronic device |
US8745755B2 (en) | 2012-10-12 | 2014-06-03 | Citrix Systems, Inc. | Controlling device access to enterprise resources in an orchestration framework for connected devices |
US9516022B2 (en) | 2012-10-14 | 2016-12-06 | Getgo, Inc. | Automated meeting room |
US20140109176A1 (en) | 2012-10-15 | 2014-04-17 | Citrix Systems, Inc. | Configuring and providing profiles that manage execution of mobile applications |
US8910239B2 (en) | 2012-10-15 | 2014-12-09 | Citrix Systems, Inc. | Providing virtualized private network tunnels |
US20140109171A1 (en) | 2012-10-15 | 2014-04-17 | Citrix Systems, Inc. | Providing Virtualized Private Network tunnels |
US20140109072A1 (en) | 2012-10-16 | 2014-04-17 | Citrix Systems, Inc. | Application wrapping for application management framework |
US9971585B2 (en) | 2012-10-16 | 2018-05-15 | Citrix Systems, Inc. | Wrapping unmanaged applications on a mobile device |
US9606774B2 (en) | 2012-10-16 | 2017-03-28 | Citrix Systems, Inc. | Wrapping an application with field-programmable business logic |
US20140108793A1 (en) | 2012-10-16 | 2014-04-17 | Citrix Systems, Inc. | Controlling mobile device access to secure data |
US9247432B2 (en) | 2012-10-19 | 2016-01-26 | Airwatch Llc | Systems and methods for controlling network access |
US9442709B1 (en) | 2012-10-24 | 2016-09-13 | Sprint Communications Company L.P. | Transition experience during loading and updating an interface and applications pack |
JP6182855B2 (ja) * | 2012-12-04 | 2017-08-23 | 株式会社リコー | 画像処理システム及び情報同期方法 |
US9021037B2 (en) | 2012-12-06 | 2015-04-28 | Airwatch Llc | Systems and methods for controlling email access |
US8978110B2 (en) | 2012-12-06 | 2015-03-10 | Airwatch Llc | Systems and methods for controlling email access |
US8826432B2 (en) | 2012-12-06 | 2014-09-02 | Airwatch, Llc | Systems and methods for controlling email access |
US8862868B2 (en) | 2012-12-06 | 2014-10-14 | Airwatch, Llc | Systems and methods for controlling email access |
US8832785B2 (en) | 2012-12-06 | 2014-09-09 | Airwatch, Llc | Systems and methods for controlling email access |
US20140280955A1 (en) | 2013-03-14 | 2014-09-18 | Sky Socket, Llc | Controlling Electronically Communicated Resources |
US9473417B2 (en) | 2013-03-14 | 2016-10-18 | Airwatch Llc | Controlling resources used by computing devices |
US9179199B2 (en) | 2013-03-14 | 2015-11-03 | Apple Inc. | Media playback across multiple devices |
US9819682B2 (en) | 2013-03-15 | 2017-11-14 | Airwatch Llc | Certificate based profile confirmation |
US9401915B2 (en) | 2013-03-15 | 2016-07-26 | Airwatch Llc | Secondary device as key for authorizing access to resources |
US9203820B2 (en) | 2013-03-15 | 2015-12-01 | Airwatch Llc | Application program as key for authorizing access to resources |
US8997187B2 (en) | 2013-03-15 | 2015-03-31 | Airwatch Llc | Delegating authorization to applications on a client device in a networked environment |
JP6480908B2 (ja) | 2013-03-15 | 2019-03-13 | オラクル・インターナショナル・コーポレイション | アプリケーション間におけるコンピュータ間の保護された通信 |
US10652242B2 (en) | 2013-03-15 | 2020-05-12 | Airwatch, Llc | Incremental compliance remediation |
US9275245B2 (en) | 2013-03-15 | 2016-03-01 | Airwatch Llc | Data access sharing |
US9129112B2 (en) | 2013-03-15 | 2015-09-08 | Oracle International Corporation | Methods, systems and machine-readable media for providing security services |
US9344422B2 (en) | 2013-03-15 | 2016-05-17 | Oracle International Corporation | Method to modify android application life cycle to control its execution in a containerized workspace environment |
US9148416B2 (en) | 2013-03-15 | 2015-09-29 | Airwatch Llc | Controlling physical access to secure areas via client devices in a networked environment |
US9378350B2 (en) | 2013-03-15 | 2016-06-28 | Airwatch Llc | Facial capture managing access to resources by a device |
US9355223B2 (en) | 2013-03-29 | 2016-05-31 | Citrix Systems, Inc. | Providing a managed browser |
US10284627B2 (en) | 2013-03-29 | 2019-05-07 | Citrix Systems, Inc. | Data management for an application with multiple operation modes |
US9985850B2 (en) | 2013-03-29 | 2018-05-29 | Citrix Systems, Inc. | Providing mobile device management functionalities |
US8910264B2 (en) | 2013-03-29 | 2014-12-09 | Citrix Systems, Inc. | Providing mobile device management functionalities |
US8849979B1 (en) | 2013-03-29 | 2014-09-30 | Citrix Systems, Inc. | Providing mobile device management functionalities |
US9413736B2 (en) | 2013-03-29 | 2016-08-09 | Citrix Systems, Inc. | Providing an enterprise application store |
US8813179B1 (en) | 2013-03-29 | 2014-08-19 | Citrix Systems, Inc. | Providing mobile device management functionalities |
US9710678B2 (en) * | 2013-04-02 | 2017-07-18 | Dropbox, Inc. | Techniques for recovering missing devices |
US9787686B2 (en) | 2013-04-12 | 2017-10-10 | Airwatch Llc | On-demand security policy activation |
US10754966B2 (en) | 2013-04-13 | 2020-08-25 | Airwatch Llc | Time-based functionality restrictions |
US8914013B2 (en) | 2013-04-25 | 2014-12-16 | Airwatch Llc | Device management macros |
US9123031B2 (en) | 2013-04-26 | 2015-09-01 | Airwatch Llc | Attendance tracking via device presence |
US9219741B2 (en) | 2013-05-02 | 2015-12-22 | Airwatch, Llc | Time-based configuration policy toggling |
US9246918B2 (en) | 2013-05-10 | 2016-01-26 | Airwatch Llc | Secure application leveraging of web filter proxy services |
US9058495B2 (en) | 2013-05-16 | 2015-06-16 | Airwatch Llc | Rights management services integration with mobile device management |
US9900261B2 (en) | 2013-06-02 | 2018-02-20 | Airwatch Llc | Shared resource watermarking and management |
US9584437B2 (en) | 2013-06-02 | 2017-02-28 | Airwatch Llc | Resource watermarking and management |
US20140358703A1 (en) | 2013-06-04 | 2014-12-04 | SkySocket, LLC | Item Delivery Optimization |
US9270777B2 (en) | 2013-06-06 | 2016-02-23 | Airwatch Llc | Social media and data sharing controls for data security purposes |
US8924608B2 (en) | 2013-06-25 | 2014-12-30 | Airwatch Llc | Peripheral device management |
US9535857B2 (en) | 2013-06-25 | 2017-01-03 | Airwatch Llc | Autonomous device interaction |
US8775815B2 (en) | 2013-07-03 | 2014-07-08 | Sky Socket, Llc | Enterprise-specific functionality watermarking and management |
US8756426B2 (en) | 2013-07-03 | 2014-06-17 | Sky Socket, Llc | Functionality watermarking and management |
US8806217B2 (en) | 2013-07-03 | 2014-08-12 | Sky Socket, Llc | Functionality watermarking and management |
WO2015004706A1 (ja) * | 2013-07-08 | 2015-01-15 | 株式会社日立製作所 | ストレージ装置およびストレージ装置の制御方法 |
US9226155B2 (en) | 2013-07-25 | 2015-12-29 | Airwatch Llc | Data communications management |
US9112749B2 (en) | 2013-07-25 | 2015-08-18 | Airwatch Llc | Functionality management via application modification |
US9665723B2 (en) | 2013-08-15 | 2017-05-30 | Airwatch, Llc | Watermarking detection and management |
US9516005B2 (en) | 2013-08-20 | 2016-12-06 | Airwatch Llc | Individual-specific content management |
US10129242B2 (en) | 2013-09-16 | 2018-11-13 | Airwatch Llc | Multi-persona devices and management |
US9258301B2 (en) | 2013-10-29 | 2016-02-09 | Airwatch Llc | Advanced authentication techniques |
US9544306B2 (en) | 2013-10-29 | 2017-01-10 | Airwatch Llc | Attempted security breach remediation |
US9513888B1 (en) | 2014-01-30 | 2016-12-06 | Sprint Communications Company L.P. | Virtual preloads |
US10212143B2 (en) * | 2014-01-31 | 2019-02-19 | Dropbox, Inc. | Authorizing an untrusted client device for access on a content management system |
US9317673B2 (en) | 2014-02-07 | 2016-04-19 | Bank Of America Corporation | Providing authentication using previously-validated authentication credentials |
US9317674B2 (en) | 2014-02-07 | 2016-04-19 | Bank Of America Corporation | User authentication based on fob/indicia scan |
US9185117B2 (en) | 2014-02-07 | 2015-11-10 | Bank Of America Corporation | User authentication by geo-location and proximity to user's close network |
US9223951B2 (en) | 2014-02-07 | 2015-12-29 | Bank Of America Corporation | User authentication based on other applications |
US9286450B2 (en) | 2014-02-07 | 2016-03-15 | Bank Of America Corporation | Self-selected user access based on specific authentication types |
US9213974B2 (en) | 2014-02-07 | 2015-12-15 | Bank Of America Corporation | Remote revocation of application access based on non-co-location of a transaction vehicle and a mobile device |
US9213814B2 (en) | 2014-02-07 | 2015-12-15 | Bank Of America Corporation | User authentication based on self-selected preferences |
US9305149B2 (en) | 2014-02-07 | 2016-04-05 | Bank Of America Corporation | Sorting mobile banking functions into authentication buckets |
US9331994B2 (en) | 2014-02-07 | 2016-05-03 | Bank Of America Corporation | User authentication based on historical transaction data |
US9208301B2 (en) | 2014-02-07 | 2015-12-08 | Bank Of America Corporation | Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location |
US9647999B2 (en) | 2014-02-07 | 2017-05-09 | Bank Of America Corporation | Authentication level of function bucket based on circumstances |
US20150227903A1 (en) * | 2014-02-07 | 2015-08-13 | Bank Of America Corporation | Remote revocation of application access based on lost or misappropriated card |
US9965606B2 (en) | 2014-02-07 | 2018-05-08 | Bank Of America Corporation | Determining user authentication based on user/device interaction |
US9185101B2 (en) | 2014-02-07 | 2015-11-10 | Bank Of America Corporation | User authentication based on historical user behavior |
US9313190B2 (en) * | 2014-02-07 | 2016-04-12 | Bank Of America Corporation | Shutting down access to all user accounts |
US9390242B2 (en) | 2014-02-07 | 2016-07-12 | Bank Of America Corporation | Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements |
US9721248B2 (en) | 2014-03-04 | 2017-08-01 | Bank Of America Corporation | ATM token cash withdrawal |
US9830597B2 (en) | 2014-03-04 | 2017-11-28 | Bank Of America Corporation | Formation and funding of a shared token |
US9600817B2 (en) | 2014-03-04 | 2017-03-21 | Bank Of America Corporation | Foreign exchange token |
US9600844B2 (en) | 2014-03-04 | 2017-03-21 | Bank Of America Corporation | Foreign cross-issued token |
US9424572B2 (en) | 2014-03-04 | 2016-08-23 | Bank Of America Corporation | Online banking digital wallet management |
RU2581559C2 (ru) | 2014-08-01 | 2016-04-20 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ применения политик безопасности к накопителю в сети |
US20160071040A1 (en) | 2014-09-05 | 2016-03-10 | Openpeak Inc. | Method and system for enabling data usage accounting through a relay |
US9350818B2 (en) | 2014-09-05 | 2016-05-24 | Openpeak Inc. | Method and system for enabling data usage accounting for unreliable transport communication |
US9232013B1 (en) | 2014-09-05 | 2016-01-05 | Openpeak Inc. | Method and system for enabling data usage accounting |
US9100390B1 (en) | 2014-09-05 | 2015-08-04 | Openpeak Inc. | Method and system for enrolling and authenticating computing devices for data usage accounting |
US8938547B1 (en) | 2014-09-05 | 2015-01-20 | Openpeak Inc. | Method and system for data usage accounting in a computing device |
EP3198418B1 (en) | 2014-09-24 | 2020-04-22 | Oracle International Corporation | Method to modify android application life cycle to control its execution in a containerized workspace environment |
US9584964B2 (en) | 2014-12-22 | 2017-02-28 | Airwatch Llc | Enforcement of proximity based policies |
US9413754B2 (en) | 2014-12-23 | 2016-08-09 | Airwatch Llc | Authenticator device facilitating file security |
US9659170B2 (en) * | 2015-01-02 | 2017-05-23 | Senteon LLC | Securing data on untrusted devices |
US9483253B1 (en) | 2015-04-30 | 2016-11-01 | Sprint Communications Company L.P. | Methods for customization of default applications on a mobile communication device |
US10733594B1 (en) | 2015-05-11 | 2020-08-04 | Square, Inc. | Data security measures for mobile devices |
US10326856B2 (en) | 2015-06-25 | 2019-06-18 | Mcafee, Llc | Single solution for user asset control |
US10021565B2 (en) | 2015-10-30 | 2018-07-10 | Bank Of America Corporation | Integrated full and partial shutdown application programming interface |
US9641539B1 (en) | 2015-10-30 | 2017-05-02 | Bank Of America Corporation | Passive based security escalation to shut off of application based on rules event triggering |
US9820148B2 (en) | 2015-10-30 | 2017-11-14 | Bank Of America Corporation | Permanently affixed un-decryptable identifier associated with mobile device |
US9729536B2 (en) | 2015-10-30 | 2017-08-08 | Bank Of America Corporation | Tiered identification federated authentication network system |
US10956603B2 (en) * | 2016-04-07 | 2021-03-23 | Samsung Electronics Co., Ltd. | Private dataaggregation framework for untrusted servers |
US9916446B2 (en) | 2016-04-14 | 2018-03-13 | Airwatch Llc | Anonymized application scanning for mobile devices |
US9917862B2 (en) | 2016-04-14 | 2018-03-13 | Airwatch Llc | Integrated application scanning and mobile enterprise computing management system |
US10460367B2 (en) | 2016-04-29 | 2019-10-29 | Bank Of America Corporation | System for user authentication based on linking a randomly generated number to the user and a physical item |
US10326841B2 (en) * | 2016-06-07 | 2019-06-18 | Vmware Inc. | Remote data securement on mobile devices |
US10268635B2 (en) | 2016-06-17 | 2019-04-23 | Bank Of America Corporation | System for data rotation through tokenization |
US10546302B2 (en) | 2016-06-30 | 2020-01-28 | Square, Inc. | Logical validation of devices against fraud and tampering |
US10373167B2 (en) | 2016-06-30 | 2019-08-06 | Square, Inc. | Logical validation of devices against fraud |
US10616210B2 (en) * | 2016-08-19 | 2020-04-07 | Microsoft Technology Licensing, Llc | Protection feature for data stored at storage service |
US10268818B2 (en) | 2016-09-07 | 2019-04-23 | Vivint, Inc. | Automated script |
US20180218120A1 (en) * | 2017-02-02 | 2018-08-02 | Wendy Canzoneri | System, Method, and Apparatus for Controlling Medical Information |
US10496993B1 (en) | 2017-02-15 | 2019-12-03 | Square, Inc. | DNS-based device geolocation |
US20180322305A1 (en) * | 2017-05-05 | 2018-11-08 | Mastercard International Incorporated | System and method for data theft prevention |
US10313480B2 (en) | 2017-06-22 | 2019-06-04 | Bank Of America Corporation | Data transmission between networked resources |
US10524165B2 (en) | 2017-06-22 | 2019-12-31 | Bank Of America Corporation | Dynamic utilization of alternative resources based on token association |
US10511692B2 (en) | 2017-06-22 | 2019-12-17 | Bank Of America Corporation | Data transmission to a networked resource based on contextual information |
US10552308B1 (en) | 2017-06-23 | 2020-02-04 | Square, Inc. | Analyzing attributes of memory mappings to identify processes running on a device |
KR102064942B1 (ko) * | 2017-07-12 | 2020-01-13 | 엔에이치엔 주식회사 | 디바이스를 무선으로 연결하는 방법 및 시스템 |
US10715536B2 (en) | 2017-12-29 | 2020-07-14 | Square, Inc. | Logical validation of devices against fraud and tampering |
US10785291B2 (en) | 2018-05-09 | 2020-09-22 | Bank Of America Corporation | Executing ad-hoc commands on-demand in a public cloud environment absent use of a command line interface |
US11494762B1 (en) | 2018-09-26 | 2022-11-08 | Block, Inc. | Device driver for contactless payments |
US11507958B1 (en) | 2018-09-26 | 2022-11-22 | Block, Inc. | Trust-based security for transaction payments |
US11681814B2 (en) * | 2019-07-23 | 2023-06-20 | International Business Machines Corporation | Automatic and customized data deletion actions |
US11178110B2 (en) * | 2019-08-20 | 2021-11-16 | International Business Machines Corporation | Controlling compliance remediations |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07193865A (ja) * | 1993-09-13 | 1995-07-28 | Casio Comput Co Ltd | 携帯端末装置およびそのセキュリティ方法 |
JPH08314805A (ja) * | 1995-05-19 | 1996-11-29 | Nec Corp | 無線携帯端末不正使用防止システム及びその実施方法 |
JPH1069436A (ja) * | 1996-05-14 | 1998-03-10 | Fujitsu Ltd | セキュリティー機能を備えた記憶媒体および記憶媒体のリモート・セキュリティー・システム |
JPH1115715A (ja) * | 1997-06-20 | 1999-01-22 | Nec Corp | データ共有システム |
JPH11134297A (ja) * | 1997-08-29 | 1999-05-21 | Compaq Computer Corp | 遠隔セキュリティ・システム |
JPH11298600A (ja) * | 1998-04-16 | 1999-10-29 | Sony Corp | 携帯電話装置 |
JP2001230858A (ja) * | 2000-02-17 | 2001-08-24 | Mitsubishi Electric Corp | 携帯電話システム及び携帯電話機 |
JP2002011101A (ja) * | 1989-05-15 | 2002-01-15 | Advanced Cardiovascular Systems Inc | 加熱されたバルーン要素を有する拡張カテーテル |
WO2002012985A2 (en) * | 2000-08-09 | 2002-02-14 | Datawipe Management Services Limited. | Personal data device and protection system and method for storing and protecting personal data |
JP2002216099A (ja) * | 2001-01-16 | 2002-08-02 | Joho Net:Kk | 携帯型データ記録端末 |
Family Cites Families (126)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS5151091Y2 (ja) | 1972-07-05 | 1976-12-08 | ||
JPS60123055A (ja) * | 1983-12-07 | 1985-07-01 | Fujitsu Ltd | 半導体装置及びその製造方法 |
JPS6024351A (ja) | 1984-06-12 | 1985-02-07 | Aichi Steel Works Ltd | 浸炭用鋼 |
US4714995A (en) * | 1985-09-13 | 1987-12-22 | Trw Inc. | Computer integration system |
US4882752A (en) * | 1986-06-25 | 1989-11-21 | Lindman Richard S | Computer security system |
US4837811A (en) | 1988-01-25 | 1989-06-06 | Communication Manufacturing Co. | Telephone technician's terminals |
JP2559472B2 (ja) | 1988-09-09 | 1996-12-04 | 株式会社日立製作所 | 関連ソフトウェア自動選定システム |
JPH0281560A (ja) | 1988-09-19 | 1990-03-22 | Oki Electric Ind Co Ltd | ファクシミリ装置 |
CA2002912A1 (en) | 1988-11-14 | 1990-05-14 | William A. Clough | Portable computer with touch screen and computer system employing same |
US5687322A (en) | 1989-05-01 | 1997-11-11 | Credit Verification Corporation | Method and system for selective incentive point-of-sale marketing in response to customer shopping histories |
US5220501A (en) * | 1989-12-08 | 1993-06-15 | Online Resources, Ltd. | Method and system for remote delivery of retail banking services |
US5113041A (en) | 1990-12-28 | 1992-05-12 | At&T Bell Laboratories | Information processing |
AU1550992A (en) | 1991-03-04 | 1992-10-06 | Megatrend Telecommunications | Mobile telephone, system and method |
US5237614A (en) * | 1991-06-07 | 1993-08-17 | Security Dynamics Technologies, Inc. | Integrated network security system |
JP3305737B2 (ja) | 1991-11-27 | 2002-07-24 | 富士通株式会社 | 情報処理装置の機密情報管理方式 |
US5150407A (en) * | 1991-12-16 | 1992-09-22 | Chan Steve S C | Secured data storage devices |
US5265159A (en) * | 1992-06-23 | 1993-11-23 | Hughes Aircraft Company | Secure file erasure |
US5432999A (en) | 1992-08-20 | 1995-07-18 | Capps; David F. | Integrated circuit lamination process |
US5666530A (en) | 1992-12-02 | 1997-09-09 | Compaq Computer Corporation | System for automatic synchronization of common file between portable computer and host computer via communication channel selected from a plurality of usable channels there between |
JPH06309214A (ja) | 1993-04-21 | 1994-11-04 | Toshiba Corp | データベースシステム |
JPH06332858A (ja) | 1993-05-21 | 1994-12-02 | Casio Comput Co Ltd | ファイルネットワークシステム |
US5649099A (en) * | 1993-06-04 | 1997-07-15 | Xerox Corporation | Method for delegating access rights through executable access control program without delegating access rights not in a specification to any intermediary nor comprising server security |
AU7707894A (en) | 1993-09-29 | 1995-04-18 | Pumpkin House Incorporated | Enciphering/deciphering device and method and enciphering/deciphering communication system |
DE69432503T2 (de) * | 1993-10-08 | 2003-12-24 | Ibm | Informationsarchivierungssystem mit objektabhängiger Funktionalität |
US5771354A (en) | 1993-11-04 | 1998-06-23 | Crawford; Christopher M. | Internet online backup system provides remote storage for customers using IDs and passwords which were interactively established when signing up for backup services |
US5694546A (en) | 1994-05-31 | 1997-12-02 | Reisman; Richard R. | System for automatic unattended electronic information transport between a server and a client by a vendor provided transport software with a manifest list |
JPH0877052A (ja) | 1994-09-05 | 1996-03-22 | Hitachi Ltd | ワークスペース制御方法及び装置 |
US5684984A (en) * | 1994-09-29 | 1997-11-04 | Apple Computer, Inc. | Synchronization and replication of object databases |
JPH08137732A (ja) | 1994-11-10 | 1996-05-31 | Hitachi Ltd | 情報処理装置 |
US5652884A (en) * | 1994-11-14 | 1997-07-29 | Object Technology Licensing Corp. | Method and apparatus for dynamic update of an existing object in an object editor |
JPH08263438A (ja) * | 1994-11-23 | 1996-10-11 | Xerox Corp | ディジタルワークの配給及び使用制御システム並びにディジタルワークへのアクセス制御方法 |
US5613012A (en) * | 1994-11-28 | 1997-03-18 | Smarttouch, Llc. | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
US5664207A (en) * | 1994-12-16 | 1997-09-02 | Xcellenet, Inc. | Systems and methods for automatically sharing information among remote/mobile nodes |
US6167253A (en) * | 1995-01-12 | 2000-12-26 | Bell Atlantic Network Services, Inc. | Mobile data/message/electronic mail download system utilizing network-centric protocol such as Java |
US5696825A (en) | 1995-02-13 | 1997-12-09 | Eta Technologies Corporation | Personal access management system |
US5991410A (en) | 1995-02-15 | 1999-11-23 | At&T Wireless Services, Inc. | Wireless adaptor and wireless financial transaction system |
EP0818007B1 (en) | 1995-03-31 | 2006-05-10 | The Commonwealth Of Australia | Method and means for interconnecting different security level networks |
AU6678096A (en) | 1995-07-20 | 1997-02-18 | Novell, Inc. | Transaction synchronization in a disconnectable computer and network |
US5647002A (en) | 1995-09-01 | 1997-07-08 | Lucent Technologies Inc. | Synchronization of mailboxes of different types |
JP3483364B2 (ja) * | 1995-09-07 | 2004-01-06 | Kddi株式会社 | Snmp/osi管理ゲートウェイ装置 |
JPH0981560A (ja) | 1995-09-11 | 1997-03-28 | Hitachi Ltd | 文書データの配布方法 |
US5727202A (en) | 1995-10-18 | 1998-03-10 | Palm Computing, Inc. | Method and apparatus for synchronizing information on two different computer systems |
US5713019A (en) * | 1995-10-26 | 1998-01-27 | Keaten; Timothy M. | Iconic access to remote electronic monochrome raster data format document repository |
US5832483A (en) * | 1995-12-15 | 1998-11-03 | Novell, Inc. | Distributed control interface for managing the interoperability and concurrency of agents and resources in a real-time environment |
US5787441A (en) | 1996-01-11 | 1998-07-28 | International Business Machines Corporation | Method of replicating data at a field level |
JPH09218815A (ja) * | 1996-01-31 | 1997-08-19 | Toshiba Corp | ネットワーク通信機能を持つ情報機器及び同機器における情報アクセス方法 |
US5862325A (en) | 1996-02-29 | 1999-01-19 | Intermind Corporation | Computer-based communication system and method using metadata defining a control structure |
AU2533797A (en) | 1996-03-19 | 1997-10-10 | Siebel Systems, Inc. | Method of maintaining a network of partially replicated database system |
US6049671A (en) | 1996-04-18 | 2000-04-11 | Microsoft Corporation | Method for identifying and obtaining computer software from a network computer |
US6286102B1 (en) * | 1996-04-30 | 2001-09-04 | International Business Machines Corporation | Selective wireless disablement for computers passing through a security checkpoint |
JP3471523B2 (ja) | 1996-05-21 | 2003-12-02 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 通信方法及び通信端末 |
US6151643A (en) | 1996-06-07 | 2000-11-21 | Networks Associates, Inc. | Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer |
TW313642B (en) | 1996-06-11 | 1997-08-21 | Ibm | A uniform mechanism for using signed content |
US5857201A (en) | 1996-06-18 | 1999-01-05 | Wright Strategies, Inc. | Enterprise connectivity to handheld devices |
US5862346A (en) | 1996-06-28 | 1999-01-19 | Metadigm | Distributed group activity data network system and corresponding method |
US5896497A (en) * | 1996-08-07 | 1999-04-20 | Halstead; William D. | System for securing a computer |
JPH10111727A (ja) * | 1996-10-03 | 1998-04-28 | Toshiba Corp | 電話機能を有する情報機器及び同情報機器のセキリュリティ実現方法 |
US5870759A (en) * | 1996-10-09 | 1999-02-09 | Oracle Corporation | System for synchronizing data between computers using a before-image of data |
US5745884A (en) | 1996-10-21 | 1998-04-28 | Mobile Area Networks, Inc. | System and method for billing data grade network use on a per connection basis |
US5790790A (en) | 1996-10-24 | 1998-08-04 | Tumbleweed Software Corporation | Electronic document delivery system in which notification of said electronic document is sent to a recipient thereof |
US6330568B1 (en) | 1996-11-13 | 2001-12-11 | Pumatech, Inc. | Synchronization of databases |
US5748084A (en) | 1996-11-18 | 1998-05-05 | Isikoff; Jeremy M. | Device security system |
US6085192A (en) | 1997-04-11 | 2000-07-04 | Roampage, Inc. | System and method for securely synchronizing multiple copies of a workspace element in a network |
US6023708A (en) | 1997-05-29 | 2000-02-08 | Visto Corporation | System and method for using a global translator to synchronize workspace elements across a network |
US6401112B1 (en) | 1997-01-29 | 2002-06-04 | Palm, Inc. | Method and apparatus for synchronizing an Email client on a portable computer system with an Email client on a desktop computer |
US6006274A (en) | 1997-01-30 | 1999-12-21 | 3Com Corporation | Method and apparatus using a pass through personal computer connected to both a local communication link and a computer network for indentifying and synchronizing a preferred computer with a portable computer |
US6778651B1 (en) * | 1997-04-03 | 2004-08-17 | Southwestern Bell Telephone Company | Apparatus and method for facilitating service management of communications services in a communications network |
US5958007A (en) | 1997-05-13 | 1999-09-28 | Phase Three Logic, Inc. | Automatic and secure system for remote access to electronic mail and the internet |
US5999947A (en) | 1997-05-27 | 1999-12-07 | Arkona, Llc | Distributing database differences corresponding to database change events made to a database table located on a server computer |
US5903881A (en) * | 1997-06-05 | 1999-05-11 | Intuit, Inc. | Personal online banking with integrated online statement and checkbook user interface |
US6128739A (en) * | 1997-06-17 | 2000-10-03 | Micron Electronics, Inc. | Apparatus for locating a stolen electronic device using electronic mail |
FI104667B (fi) * | 1997-07-14 | 2000-04-14 | Nokia Networks Oy | Liittymäpalvelun toteuttaminen |
US5940843A (en) * | 1997-10-08 | 1999-08-17 | Multex Systems, Inc. | Information delivery system and method including restriction processing |
US6085191A (en) | 1997-10-31 | 2000-07-04 | Sun Microsystems, Inc. | System and method for providing database access control in a secure distributed network |
US6034621A (en) * | 1997-11-18 | 2000-03-07 | Lucent Technologies, Inc. | Wireless remote synchronization of data between PC and PDA |
US6151606A (en) | 1998-01-16 | 2000-11-21 | Visto Corporation | System and method for using a workspace data manager to access, manipulate and synchronize network data |
US6594765B2 (en) * | 1998-09-29 | 2003-07-15 | Softvault Systems, Inc. | Method and system for embedded, automated, component-level control of computer systems and other complex systems |
WO1999051018A1 (en) * | 1998-03-30 | 1999-10-07 | Micro Computer Technology, Inc. | System and method for remotely initializing, operating and monitoring a general-purpose computer |
US6832320B1 (en) * | 1998-07-28 | 2004-12-14 | Hewlett-Packard Development Company, L.P. | Ownership tag on power-up screen |
US7136645B2 (en) | 1998-10-09 | 2006-11-14 | Netmotion Wireless, Inc. | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
US6553375B1 (en) | 1998-11-25 | 2003-04-22 | International Business Machines Corporation | Method and apparatus for server based handheld application and database management |
US7315836B1 (en) * | 1999-01-11 | 2008-01-01 | Teq Development | Method for obtaining and allocating investment income based on the capitalization of intellectual property |
SE515488C2 (sv) | 1999-01-29 | 2001-08-13 | Telia Ab | Metod och system för stöldskydd av data i en handdator |
US7430668B1 (en) * | 1999-02-15 | 2008-09-30 | Hewlett-Packard Development Company, L.P. | Protection of the configuration of modules in computing apparatus |
EP1041483A1 (en) * | 1999-03-30 | 2000-10-04 | International Business Machines Corporation | Discovering stolen or lost network-attachable computer systems |
US6725379B1 (en) * | 1999-08-11 | 2004-04-20 | Dell Products L.P. | Stolen computer detection and protection |
US7216110B1 (en) * | 1999-10-18 | 2007-05-08 | Stamps.Com | Cryptographic module for secure processing of value-bearing items |
US6389542B1 (en) | 1999-10-27 | 2002-05-14 | Terence T. Flyntz | Multi-level secure computer with token-based access control |
IL132915A (en) * | 1999-11-14 | 2004-05-12 | Networks Assoc Tech Inc | Method for secure function execution by calling address validation |
US20020002685A1 (en) * | 2000-01-10 | 2002-01-03 | Youngtack Shim | Secure computer |
US8706627B2 (en) * | 2000-02-10 | 2014-04-22 | Jon Shore | Apparatus, systems and methods for wirelessly transacting financial transfers , electronically recordable authorization transfers, and other information transfers |
AU2001247791A1 (en) * | 2000-03-23 | 2001-10-03 | Tingo Inc. | System and method for managing user-specific data |
US7047426B1 (en) | 2000-04-27 | 2006-05-16 | Warranty Corporation Of America | Portable computing device communication system and method |
US6847825B1 (en) * | 2000-09-14 | 2005-01-25 | Lojack Corporation | Method and system for portable cellular phone voice communication and positional location data communication |
US6813487B1 (en) | 2000-10-18 | 2004-11-02 | David Alan Trommelen | Method and apparatus for securing data stored in a remote electronic device |
US20020066034A1 (en) * | 2000-10-24 | 2002-05-30 | Schlossberg Barry J. | Distributed network security deception system |
US20040068721A1 (en) | 2000-11-17 | 2004-04-08 | O'neill Patrick | Network for updating firmware and / or software in wireless communication devices |
US6725444B2 (en) | 2000-12-14 | 2004-04-20 | Communication Technologies, Inc. | System and method for programmable removal of sensitive information from computing systems |
JP3511171B2 (ja) | 2001-03-30 | 2004-03-29 | 富士通カンタムデバイス株式会社 | 高周波半導体装置 |
US7024698B2 (en) * | 2001-04-27 | 2006-04-04 | Matsushita Electric Industrial Co., Ltd. | Portable information processing device having data evacuation function and method thereof |
US7340438B2 (en) * | 2001-05-21 | 2008-03-04 | Nokia Corporation | Method and apparatus for managing and enforcing user privacy |
AU2002322109A1 (en) * | 2001-06-13 | 2002-12-23 | Intruvert Networks, Inc. | Method and apparatus for distributed network security |
JP2003005905A (ja) | 2001-06-22 | 2003-01-10 | Matsushita Electric Ind Co Ltd | 電子機器 |
WO2003009620A1 (en) | 2001-07-18 | 2003-01-30 | Wizard Mobile Solutions Limited | Data security device |
US7159120B2 (en) * | 2001-11-19 | 2007-01-02 | Good Technology, Inc. | Method and system for protecting data within portable electronic devices |
US7496957B2 (en) | 2002-01-02 | 2009-02-24 | Hewlett-Packard Development Company, L.P. | System and method for preventing use of a wireless device |
US7024214B2 (en) * | 2002-02-26 | 2006-04-04 | Microsoft Corporation | Synchronizing over a number of synchronization mechanisms using flexible rules |
GB0211644D0 (en) * | 2002-05-21 | 2002-07-03 | Wesby Philip B | System and method for remote asset management |
EP1535159B1 (en) | 2002-08-09 | 2016-03-02 | Good Technology Corporation | System and method for preventing access to data on a compromised remote device |
US20040098715A1 (en) | 2002-08-30 | 2004-05-20 | Parixit Aghera | Over the air mobile device software management |
US7921182B2 (en) | 2002-12-31 | 2011-04-05 | Hewlett-Packard Development Company, L.P. | Management of service components installed in an electronic device in a mobile services network |
US7480907B1 (en) | 2003-01-09 | 2009-01-20 | Hewlett-Packard Development Company, L.P. | Mobile services network for update of firmware/software in mobile handsets |
ATE441994T1 (de) | 2003-04-03 | 2009-09-15 | Nokia Corp | Verwaltung von kontext-bezogener information mit einer mobilstation |
GB0308991D0 (en) | 2003-04-17 | 2003-05-28 | Psion Digital Ltd | A data access replication or communication system comprising a distributed software application |
US7987449B1 (en) | 2003-05-22 | 2011-07-26 | Hewlett-Packard Development Company, L.P. | Network for lifecycle management of firmware and software in electronic devices |
EP1639435A4 (en) | 2003-06-27 | 2009-12-30 | Hewlett Packard Development Co | SYSTEM AND METHOD FOR DOWNLOADING UPDATE PACKAGES INTO A MOBILE HAND APPARATUS IN A CARRIER NETWORK |
US7624393B2 (en) | 2003-09-18 | 2009-11-24 | International Business Machines Corporation | Computer application and methods for autonomic upgrade maintenance of computer hardware, operating systems and application software |
US7260380B2 (en) | 2003-12-18 | 2007-08-21 | Sap Aktiengesellschaft | Storing and synchronizing data on a removable storage medium |
US8635661B2 (en) | 2003-12-23 | 2014-01-21 | Mcafee, Inc. | System and method for enforcing a security policy on mobile devices using dynamically generated security profiles |
US7844964B2 (en) | 2004-09-23 | 2010-11-30 | Hewlett Packard Development Company, L.P. | Network for mass distribution of configuration, firmware and software updates |
CA2601937C (en) | 2005-04-18 | 2013-01-22 | Research In Motion Limited | Implementing data-compatibility-based version scheme |
US7970386B2 (en) | 2005-06-03 | 2011-06-28 | Good Technology, Inc. | System and method for monitoring and maintaining a wireless device |
US20070093243A1 (en) | 2005-10-25 | 2007-04-26 | Vivek Kapadekar | Device management system |
US7702322B1 (en) | 2006-02-27 | 2010-04-20 | Good Technology, Llc | Method and system for distributing and updating software in wireless devices |
JP5151091B2 (ja) | 2006-08-24 | 2013-02-27 | 株式会社ジェイテクト | 研削条件決定方法 |
JP6332858B2 (ja) | 2014-08-29 | 2018-05-30 | 株式会社大一商会 | 遊技機 |
-
2003
- 2003-08-09 EP EP03785295.1A patent/EP1535159B1/en not_active Expired - Lifetime
- 2003-08-09 CN CNB038224976A patent/CN100380337C/zh not_active Expired - Lifetime
- 2003-08-09 CA CA 2495083 patent/CA2495083A1/en not_active Abandoned
- 2003-08-09 EP EP20100185486 patent/EP2375336B1/en not_active Expired - Lifetime
- 2003-08-09 EP EP15171944.0A patent/EP2955896B1/en not_active Expired - Lifetime
- 2003-08-09 AU AU2003259893A patent/AU2003259893B2/en not_active Expired
- 2003-08-09 JP JP2004528143A patent/JP4612416B2/ja not_active Expired - Lifetime
- 2003-08-09 WO PCT/US2003/025795 patent/WO2004015576A1/en active Application Filing
- 2003-08-09 US US10/637,267 patent/US8012219B2/en active Active
-
2005
- 2005-02-08 IL IL16676205A patent/IL166762A0/xx unknown
-
2010
- 2010-09-17 US US12/885,061 patent/US8696765B2/en not_active Expired - Lifetime
-
2014
- 2014-02-27 US US14/192,802 patent/US9083707B2/en not_active Expired - Lifetime
-
2015
- 2015-07-02 US US14/791,078 patent/US9672371B2/en not_active Expired - Lifetime
-
2017
- 2017-04-28 US US15/499,995 patent/US9965643B2/en not_active Expired - Lifetime
-
2018
- 2018-04-26 US US15/963,843 patent/US11017105B2/en not_active Expired - Lifetime
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002011101A (ja) * | 1989-05-15 | 2002-01-15 | Advanced Cardiovascular Systems Inc | 加熱されたバルーン要素を有する拡張カテーテル |
JPH07193865A (ja) * | 1993-09-13 | 1995-07-28 | Casio Comput Co Ltd | 携帯端末装置およびそのセキュリティ方法 |
JPH08314805A (ja) * | 1995-05-19 | 1996-11-29 | Nec Corp | 無線携帯端末不正使用防止システム及びその実施方法 |
JPH1069436A (ja) * | 1996-05-14 | 1998-03-10 | Fujitsu Ltd | セキュリティー機能を備えた記憶媒体および記憶媒体のリモート・セキュリティー・システム |
JPH1115715A (ja) * | 1997-06-20 | 1999-01-22 | Nec Corp | データ共有システム |
JPH11134297A (ja) * | 1997-08-29 | 1999-05-21 | Compaq Computer Corp | 遠隔セキュリティ・システム |
JPH11298600A (ja) * | 1998-04-16 | 1999-10-29 | Sony Corp | 携帯電話装置 |
JP2001230858A (ja) * | 2000-02-17 | 2001-08-24 | Mitsubishi Electric Corp | 携帯電話システム及び携帯電話機 |
WO2002012985A2 (en) * | 2000-08-09 | 2002-02-14 | Datawipe Management Services Limited. | Personal data device and protection system and method for storing and protecting personal data |
JP2002216099A (ja) * | 2001-01-16 | 2002-08-02 | Joho Net:Kk | 携帯型データ記録端末 |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007233989A (ja) * | 2006-02-06 | 2007-09-13 | Fujitsu Business Systems Ltd | 情報漏洩防止プログラム、情報漏洩防止方法および情報漏洩防止装置 |
JP2016532956A (ja) * | 2013-07-30 | 2016-10-20 | ドロップボックス, インコーポレイテッド | リンク解除されたデバイスにおける未同期コンテンツ・アイテムの管理技術 |
US9749408B2 (en) | 2013-07-30 | 2017-08-29 | Dropbox, Inc. | Techniques for managing unsynchronized content items at unlinked devices |
JP2016532955A (ja) * | 2013-08-01 | 2016-10-20 | ドロップボックス, インコーポレイテッド | 接続デバイスでの強制暗号化 |
JP2018041487A (ja) * | 2013-08-01 | 2018-03-15 | ドロップボックス, インコーポレイテッド | 接続デバイスでの強制暗号化 |
JP2022121295A (ja) * | 2021-02-08 | 2022-08-19 | ソフトバンク株式会社 | 画像解析装置、プログラム、及び管理方法 |
JP7321198B2 (ja) | 2021-02-08 | 2023-08-04 | ソフトバンク株式会社 | 画像解析装置、プログラム、及び管理方法 |
Also Published As
Publication number | Publication date |
---|---|
EP2375336A1 (en) | 2011-10-12 |
US20170228553A1 (en) | 2017-08-10 |
US8696765B2 (en) | 2014-04-15 |
US9672371B2 (en) | 2017-06-06 |
US20140181918A1 (en) | 2014-06-26 |
EP2955896B1 (en) | 2017-10-18 |
US20150310222A1 (en) | 2015-10-29 |
EP1535159A4 (en) | 2007-07-25 |
EP1535159A1 (en) | 2005-06-01 |
CN1685316A (zh) | 2005-10-19 |
US8012219B2 (en) | 2011-09-06 |
EP1535159B1 (en) | 2016-03-02 |
AU2003259893A1 (en) | 2004-02-25 |
IL166762A0 (en) | 2006-01-15 |
CN100380337C (zh) | 2008-04-09 |
US11017105B2 (en) | 2021-05-25 |
US20040117310A1 (en) | 2004-06-17 |
CA2495083A1 (en) | 2004-02-19 |
EP2375336B1 (en) | 2013-06-26 |
WO2004015576A1 (en) | 2004-02-19 |
JP4612416B2 (ja) | 2011-01-12 |
US20110004941A1 (en) | 2011-01-06 |
EP2955896A1 (en) | 2015-12-16 |
US9083707B2 (en) | 2015-07-14 |
US9965643B2 (en) | 2018-05-08 |
US20180253564A1 (en) | 2018-09-06 |
AU2003259893B2 (en) | 2009-03-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4612416B2 (ja) | 危殆化した遠隔装置上のデータへのアクセスを防止するシステムおよび方法 | |
JP5270694B2 (ja) | 機密ファイルを保護するためのクライアント・コンピュータ、及びそのサーバ・コンピュータ、並びにその方法及びコンピュータ・プログラム | |
EP1166211B1 (en) | Network vault | |
EP2017767A1 (en) | File management system and method, and mobile terminal | |
EP1590916A2 (en) | Adaptive transparent encryption | |
JP2007316789A (ja) | クライアントシステム、サーバシステム、これらの制御方法、制御プログラム、データ消去システム及び方法 | |
JPWO2020066493A1 (ja) | 情報処理システム、情報処理方法及び情報処理プログラム | |
JP2002140239A (ja) | 情報管理システム及び情報管理方法及びシステム制御装置 | |
JP4769241B2 (ja) | アクセス権限制御システム | |
WO2002029516A2 (en) | Method and system for escrowing of decryption keys | |
KR100401178B1 (ko) | 인터넷 개인 금고 서비스 및 그 방법 | |
JP2010026557A (ja) | 機器管理システム | |
JP2005215797A (ja) | 端末装置、サーバ、グループウェアシステム、グループウェア方法、および、グループウェアプログラム | |
JP4411577B2 (ja) | データ保護装置及びシステム | |
JP2004078860A (ja) | データ保護装置及びシステム | |
GB2370890A (en) | Information management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20060807 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20091027 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20100107 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20100115 |
|
RD03 | Notification of appointment of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7423 Effective date: 20100225 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20100226 |
|
RD04 | Notification of resignation of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7424 Effective date: 20100311 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20100326 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20100326 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20100402 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20100427 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20100921 |
|
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20101015 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20131022 Year of fee payment: 3 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 4612416 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
S531 | Written request for registration of change of domicile |
Free format text: JAPANESE INTERMEDIATE CODE: R313531 |
|
S533 | Written request for registration of change of name |
Free format text: JAPANESE INTERMEDIATE CODE: R313533 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20131022 Year of fee payment: 3 |
|
R350 | Written notification of registration of transfer |
Free format text: JAPANESE INTERMEDIATE CODE: R350 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
S111 | Request for change of ownership or part of ownership |
Free format text: JAPANESE INTERMEDIATE CODE: R313113 |
|
S531 | Written request for registration of change of domicile |
Free format text: JAPANESE INTERMEDIATE CODE: R313531 |
|
R350 | Written notification of registration of transfer |
Free format text: JAPANESE INTERMEDIATE CODE: R350 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
S111 | Request for change of ownership or part of ownership |
Free format text: JAPANESE INTERMEDIATE CODE: R313113 |
|
R350 | Written notification of registration of transfer |
Free format text: JAPANESE INTERMEDIATE CODE: R350 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
EXPY | Cancellation because of completion of term |