JPWO2020018222A5 - - Google Patents
Download PDFInfo
- Publication number
- JPWO2020018222A5 JPWO2020018222A5 JP2021502498A JP2021502498A JPWO2020018222A5 JP WO2020018222 A5 JPWO2020018222 A5 JP WO2020018222A5 JP 2021502498 A JP2021502498 A JP 2021502498A JP 2021502498 A JP2021502498 A JP 2021502498A JP WO2020018222 A5 JPWO2020018222 A5 JP WO2020018222A5
- Authority
- JP
- Japan
- Prior art keywords
- computing device
- compliance
- configuration setting
- server
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims 17
Claims (20)
前記サーバとコンピューティングデバイスとを通信可能に結合するネットワークを介してアクセス可能な前記コンピューティングデバイスから、第1のユーザが前記コンピューティングデバイスにログインしたことを示す第1の通知を受信するステップと、
前記第1のユーザと前記コンピューティングデバイスとに関連付けられた第1のコンフィギュレーション設定を、前記サーバによって維持されるリファレンスから取得するステップであって、前記リファレンスは、前記第1のユーザが前記コンピューティングデバイスにログインするときに前記コンピューティングデバイスが前記第1のコンフィギュレーション設定を実施することを指定する、取得するステップと、
前記第1のコンフィギュレーション設定がコンプライアンスルールを遵守していないと判定するステップと、
前記第1のコンフィギュレーション設定が前記コンプライアンスルールを遵守していないと判定することに基づいて、
前記コンピューティングデバイスが前記コンプライアンスルールを遵守していないものとして指定するステップと、および
前記コンピューティングデバイスによって実施されたときに、前記コンピューティングデバイスが前記コンプライアンスルールを遵守するようにする第2のコンフィギュレーション設定を、前記ネットワークを介して、前記コンピューティングデバイスに送信するステップと
を備える、方法。 It ’s a method implemented by the server,
A step of receiving a first notification indicating that a first user has logged in to the computing device from the computing device accessible via a network that communicatively couples the server and the computing device. ,
A step of retrieving a first configuration setting associated with the first user and the computing device from a reference maintained by the server, wherein the first user is the computing. The step to acquire, which specifies that the computing device performs the first configuration setting when logging in to the ing device, and
The step of determining that the first configuration setting does not comply with the compliance rule, and
Based on determining that the first configuration setting does not comply with the compliance rule.
A step that designates the computing device as non-compliance with the compliance rule, and a second configuration that causes the computing device to comply with the compliance rule when performed by the computing device. A method comprising the steps of transmitting an option setting over the network to the computing device.
前記コンピューティングデバイスが前記コンプライアンスルールを遵守していないと指定することに応答して、前記コンピューティングデバイスがコンプライアンスを遵守するまで、前記コンピューティングデバイスが前記ネットワークを介してアクセス可能なリソースにアクセスすることを阻止するステップ
をさらに備える、方法。 The method according to claim 1.
In response to specifying that the computing device is not in compliance with the compliance rule, the computing device accesses resources accessible through the network until the computing device is in compliance. A method with additional steps to prevent it.
前記ネットワークを介してアクセス可能な電子メールサーバ、
前記ネットワークを介してアクセス可能なデータリポジトリ、または
前記ネットワークを介してアクセス可能なアプリケーションサーバ
のうちの少なくとも1つを備える、方法。 The method according to claim 2, wherein the resource is
An email server accessible over the network,
A method comprising at least one of a data repository accessible over the network or an application server accessible over the network.
前記コンピューティングデバイスによって実施される暗号化設定、
前記コンピューティングデバイスによって実施されるセキュリティ設定、または
前記コンピューティングデバイスにインストールする必要のあるアプリケーションまたはオペレーティングシステムの少なくとも1つの最小バージョン
のうちの少なくとも1つを指定する、方法。 The method according to claim 1, wherein the first configuration setting is
Cryptographic settings performed by the computing device,
A method of specifying at least one of the security settings enforced by the computing device, or at least one minimum version of an application or operating system that needs to be installed on the computing device.
前記コンピューティングデバイスからアクノレッジメントを受信するステップであって、前記アクノレッジメントは、前記コンピューティングデバイスが第2のコンフィギュレーション設定を実施したことを示す、受信するステップと、
前記アクノレッジメントを受信することに応答して、前記コンピューティングデバイスが、変更された前記コンプライアンスルールを遵守しているものとして指定するステップと
をさらに備える方法。 The method according to claim 1.
A step of receiving an acknowledgment from the computing device, the acknowledgement being a receiving step indicating that the computing device has performed a second configuration setting.
A method further comprising a step of designating the computing device as being in compliance with the modified compliance rule in response to receiving the acknowledgement.
第2のユーザが前記コンピューティングデバイスにログインしたことを示す第2の通知を、前記コンピューティングデバイスから受信するステップと、
前記第2のユーザと前記コンピューティングデバイスとに関連付けられた第3のコンフィギュレーション設定を前記リファレンスから取得するステップであって、前記リファレンスは、前記第2のユーザが前記コンピューティングデバイスにログインするときに前記コンピューティングデバイスが前記第3のコンフィギュレーション設定を実施することを指定する、取得するステップと、
前記第3のコンフィギュレーション設定が前記コンプライアンスルールに遵守していると判定するステップと、および
前記第3のコンフィギュレーション設定が前記コンプライアンスルールを遵守していると判定することに応答して、前記コンピューティングデバイスがコンプライアンスに遵守しているものとして指定するステップと
をさらに備える、方法。 The method according to claim 1.
A step of receiving a second notification from the computing device indicating that the second user has logged in to the computing device, and
A step of retrieving a third configuration setting associated with the second user and the computing device from the reference, wherein the reference is when the second user logs in to the computing device. And the steps to acquire, which specify that the computing device performs the third configuration setting.
The computing in response to the step of determining that the third configuration setting complies with the compliance rule and in response to determining that the third configuration setting complies with the compliance rule. A method further comprising a step to specify that the ing device is in compliance.
少なくとも1つのプロセッサ回路と、
前記少なくとも1つのプロセッサ回路によって実行されるよう構成されたプログラムコードを格納する少なくとも1つのメモリとを備え、前記プログラムコードは、
前記サーバとコンピューティングデバイスを通信可能に結合するネットワークを介してアクセス可能な前記コンピューティングデバイスから、第1のユーザが前記コンピューティングデバイスにログインしたことを示す第1の通知を受信し、
前記第1のユーザと前記コンピューティングデバイスとに関連付けられた第1のコンフィギュレーション設定を前記サーバによって維持されるリファレンスから取得し、前記リファレンスは、前記第1のユーザが前記コンピューティングデバイスにログインするときに前記コンピューティングデバイスが前記第1のコンフィギュレーション設定を実施することを指定しており、
前記第1のコンフィギュレーション設定がコンプライアンスルールを遵守していないと判定し、
前記第1のコンフィギュレーション設定が前記コンプライアンスルールを遵守していないと判定することに基づいて、
前記コンピューティングデバイスが前記コンプライアンスルールを遵守していないものとして指定し、および
前記コンピューティングデバイスによって実施されたときに、前記コンピューティングデバイスがコンプライアンスルールを遵守するようにする第2のコンフィギュレーション設定を、前記ネットワークを介して、前記コンピューティングデバイスに送信する
ように構成されるコンプライアンスエンジンを備える、サーバ。 It ’s a server,
With at least one processor circuit,
The program code comprises at least one memory for storing the program code configured to be executed by the at least one processor circuit.
A first notification indicating that the first user has logged in to the computing device is received from the computing device accessible via a network that communicatively couples the server and the computing device.
The first configuration settings associated with the first user and the computing device are obtained from a reference maintained by the server, which the first user logs in to the computing device. Occasionally, the computing device specifies that the first configuration setting should be performed.
It is determined that the first configuration setting does not comply with the compliance rule, and it is determined.
Based on determining that the first configuration setting does not comply with the compliance rule.
A second configuration setting that specifies that the computing device does not comply with the compliance rule and causes the computing device to comply with the compliance rule when implemented by the computing device. A server comprising a compliance engine configured to transmit over the network to the computing device.
前記コンピューティングデバイスが前記コンプライアンスルールを遵守していないと指定することに応答して、前記コンピューティングデバイスがコンプライアンスを遵守するまで、前記コンピューティングデバイスが前記ネットワークを介してアクセス可能なリソースにアクセスすることを阻止するようさらに構成される、サーバ。 The server according to claim 8, wherein the compliance engine is
In response to specifying that the computing device is not in compliance with the compliance rules, the computing device accesses resources accessible through the network until the computing device is in compliance. A server that is further configured to prevent that.
前記ネットワークを介してアクセス可能な電子メールサーバ、
前記ネットワークを介してアクセス可能なデータリポジトリ、または
前記ネットワークを介してアクセス可能なアプリケーションサーバ
のうち少なくとも1つを備える、サーバ。 The server according to claim 9, wherein the resource is
An email server accessible over the network,
A server comprising at least one of a data repository accessible over the network or an application server accessible over the network.
前記コンピューティングデバイスによって実施される暗号化設定、
前記コンピューティングデバイスによって実施されるセキュリティ設定、または、
前記コンピューティングデバイスにインストールする必要のあるアプリケーションまたはオペレーティングシステムのうちの少なくとも1つの最小バージョン
のうちの少なくとも1つを指定する、サーバ。 The server according to claim 8, wherein the first configuration setting is
Cryptographic settings performed by the computing device,
Security settings implemented by the computing device, or
A server that specifies at least one of the minimum versions of at least one of the applications or operating systems that need to be installed on the computing device.
前記コンピューティングデバイスからアクノレッジメントを受信し、前記アクノレッジメントは、前記コンピューティングデバイスが前記第2のコンフィギュレーション設定を実施したことを示しており、
前記アクノレッジメントを受信することに応答して、前記コンピューティングデバイスが変更された前記コンプライアンスルールを遵守しているものとして指定する
ようさらに構成される、サーバ。 The server according to claim 8, wherein the compliance engine is
The acknowledgment is received from the computing device, which indicates that the computing device has performed the second configuration setting.
A server further configured to designate the computing device as being in compliance with the modified compliance rules in response to receiving the acknowledgement.
第2のユーザが前記コンピューティングデバイスにログインしたことを示す第2の通知を、前記コンピューティングデバイスから受信し、
前記第2のユーザと前記コンピューティングデバイスとに関連付けられた第3のコンフィギュレーション設定を前記リファレンスから取得し、前記リファレンスは、前記第2のユーザが前記コンピューティングデバイスにログインするときに前記コンピューティングデバイスが前記第3のコンフィギュレーション設定を実施することを指定しており、
前記第3のコンフィギュレーション設定が前記コンプライアンスルールを遵守していると判定し、
前記第3のコンフィギュレーション設定が前記コンプライアンスルールを遵守していると判定することに応答して、前記コンピューティングデバイスがコンプライアンスを遵守しているものとして指定する
ようにさらに構成される、サーバ。 The server according to claim 8, wherein the compliance engine is
A second notification indicating that the second user has logged in to the computing device is received from the computing device.
A third configuration setting associated with the second user and the computing device is obtained from the reference, which references the computing when the second user logs in to the computing device. It specifies that the device will perform the third configuration setting above.
It is determined that the third configuration setting complies with the compliance rule, and it is determined.
A server further configured to designate the computing device as being in compliance in response to determining that the third configuration setting is in compliance with the compliance rule.
前記サーバとコンピューティングデバイスとを通信可能に結合するネットワークを介してアクセス可能な前記コンピューティングデバイスから、第1のユーザが前記コンピューティングデバイスにログインしたことを示す第1の通知を受信するステップと、
前記第1のユーザと前記コンピューティングデバイスとに関連付けられた第1のコンフィギュレーション設定を、前記サーバによって維持されるリファレンスから取得するステップであって、前記リファレンスは、前記第1のユーザが前記コンピューティングデバイスにログインするときに前記コンピューティングデバイスが前記第1のコンフィギュレーション設定を実施することを指定する、取得するステップと、
前記第1のコンフィギュレーション設定がコンプライアンスルールを遵守していないと判定するステップと、
前記第1のコンフィギュレーション設定が前記コンプライアンスルールを遵守していないと判定することに基づいて、
前記コンピューティングデバイスが、前記コンプライアンスルールを遵守していないものとして指定するステップと、および
前記コンピューティングデバイスによって実施されたときに、前記コンピューティングデバイスが前記コンプライアンスルールを遵守するようにする第2のコンフィギュレーション設定を、前記ネットワークを介して、前記コンピューティングデバイスに送信するステップと
を備える、コンピュータ可読記憶媒体。 A computer-readable storage medium that records program instructions that execute a method when executed by at least one processor of the server.
A step of receiving a first notification indicating that a first user has logged in to the computing device from the computing device accessible via a network that communicatively couples the server and the computing device. ,
A step of retrieving a first configuration setting associated with the first user and the computing device from a reference maintained by the server, wherein the first user is the computing. The step to acquire, which specifies that the computing device performs the first configuration setting when logging in to the ing device, and
The step of determining that the first configuration setting does not comply with the compliance rule, and
Based on determining that the first configuration setting does not comply with the compliance rule.
A step of designating the computing device as non-compliance with the compliance rule, and a second step of ensuring that the computing device complies with the compliance rule when performed by the computing device. A computer-readable storage medium comprising the steps of transmitting configuration settings over the network to the computing device.
前記コンピューティングデバイスが前記コンプライアンスルールを遵守していないと指定することに応答して、前記コンピューティングデバイスがコンプライアンスを遵守するまで、前記コンピューティングデバイスが前記ネットワークを介してアクセス可能なリソースにアクセスすることを阻止するステップをさらに備える、コンピュータ可読記憶媒体。 The computer-readable storage medium according to claim 15, wherein the method is:
In response to specifying that the computing device is not in compliance with the compliance rule, the computing device accesses resources accessible through the network until the computing device is in compliance. A computer-readable storage medium with additional steps to prevent it from happening.
前記ネットワークを介してアクセス可能な電子メールサーバ、
前記ネットワークを介してアクセス可能なデータリポジトリ、または
前記ネットワークを介してアクセス可能なアプリケーションサーバ
のうちの少なくとも1つを備える、コンピュータ可読記憶媒体。 The computer-readable storage medium according to claim 16, wherein the resource is.
An email server accessible over the network,
A computer-readable storage medium comprising at least one of a data repository accessible over the network or an application server accessible over the network.
前記コンピューティングデバイスの第3のコンフィギュレーション設定が変更されたことのインジケーションを前記コンピューティングデバイスから受信するステップ
をさらに備える、コンピュータ可読記憶媒体。 The computer-readable storage medium according to claim 15, wherein the method is:
A computer-readable storage medium further comprising the step of receiving an indication from the computing device that a third configuration setting of the computing device has been changed.
前記コンピューティングデバイスによって実施される暗号化設定、
前記コンピューティングデバイスによって実施されるセキュリティ設定、または、
前記コンピューティングデバイスにインストールする必要のあるアプリケーションまたはオペレーティングシステムの少なくとも1つの最小バージョン
のうちの少なくとも1つを指定する、コンピュータ可読記憶媒体。 The computer-readable storage medium according to claim 15, wherein the first configuration setting is.
Cryptographic settings performed by the computing device,
Security settings implemented by the computing device, or
A computer-readable storage medium that specifies at least one of at least one minimal version of an application or operating system that needs to be installed on the computing device.
前記コンピューティングデバイスからアクノレッジメントを受信するステップであって、前記アクノレッジメントは、前記コンピューティングデバイスが第2のコンフィギュレーション設定を実施したことを示す、受信するステップと、
前記アクノレッジメントを受信することに応答して、前記コンピューティングデバイスが、変更された前記コンプライアンスルールを遵守しているものとして指定するステップと
をさらに備える、コンピュータ可読記憶媒体。 The computer-readable storage medium according to claim 15, wherein the method is:
A step of receiving an acknowledgment from the computing device, the acknowledgement being a receiving step indicating that the computing device has performed a second configuration setting.
A computer-readable storage medium further comprising a step of designating the computing device as being in compliance with the modified compliance rule in response to receiving the acknowledgement.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/037,201 US20200028879A1 (en) | 2018-07-17 | 2018-07-17 | Queryless device configuration determination-based techniques for mobile device management |
US16/037,201 | 2018-07-17 | ||
PCT/US2019/037839 WO2020018222A1 (en) | 2018-07-17 | 2019-06-19 | Queryless device configuration determination-based techniques for mobile device management |
Publications (3)
Publication Number | Publication Date |
---|---|
JP2021531573A JP2021531573A (en) | 2021-11-18 |
JPWO2020018222A5 true JPWO2020018222A5 (en) | 2022-06-27 |
JP7398430B2 JP7398430B2 (en) | 2023-12-14 |
Family
ID=67297261
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2021502498A Active JP7398430B2 (en) | 2018-07-17 | 2019-06-19 | Query-free device configuration decision-based techniques for mobile device management |
Country Status (6)
Country | Link |
---|---|
US (3) | US20200028879A1 (en) |
EP (1) | EP3808053B1 (en) |
JP (1) | JP7398430B2 (en) |
KR (1) | KR20210027372A (en) |
CN (1) | CN112805980B (en) |
WO (1) | WO2020018222A1 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11184223B2 (en) | 2018-07-31 | 2021-11-23 | Microsoft Technology Licensing, Llc | Implementation of compliance settings by a mobile device for compliance with a configuration scenario |
US11038892B2 (en) * | 2018-11-19 | 2021-06-15 | Vmware, Inc. | Dynamically generating restriction profiles for managed devices |
US11398951B2 (en) * | 2019-01-21 | 2022-07-26 | Vmware, Inc. | Automatic generation of configurations for IoT endpoints |
US11599375B2 (en) * | 2020-02-03 | 2023-03-07 | EMC IP Holding Company LLC | System and method virtual appliance creation |
US20220103358A1 (en) * | 2021-12-08 | 2022-03-31 | Intel Corporation | Cloud key access mechanism |
CN115103422A (en) * | 2022-06-17 | 2022-09-23 | 北京奔图信息技术有限公司 | Network distribution method, electronic device and readable storage medium |
Family Cites Families (119)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7546629B2 (en) | 2002-03-06 | 2009-06-09 | Check Point Software Technologies, Inc. | System and methodology for security policy arbitration |
US7644432B2 (en) | 2003-10-10 | 2010-01-05 | Bea Systems, Inc. | Policy inheritance through nested groups |
WO2005064498A1 (en) * | 2003-12-23 | 2005-07-14 | Trust Digital, Llc | System and method for enforcing a security policy on mobile devices using dynamically generated security profiles |
WO2006034407A2 (en) | 2004-09-23 | 2006-03-30 | Airclic, Inc. | Mobile process automation method |
US7516478B2 (en) * | 2005-06-03 | 2009-04-07 | Microsoft Corporation | Remote management of mobile devices |
US8626128B2 (en) * | 2011-04-07 | 2014-01-07 | Microsoft Corporation | Enforcing device settings for mobile devices |
US9332424B2 (en) | 2005-08-05 | 2016-05-03 | Qualcomm Incorporated | Centrally managed solution for all device management activities |
WO2007031981A2 (en) | 2005-09-15 | 2007-03-22 | One-Fone Ltd. | Incorporating a mobile device into a peer-to-peer network |
US7870490B2 (en) | 2005-11-15 | 2011-01-11 | Microsoft Corporation | On-the-fly device configuration and management |
US7685263B2 (en) | 2006-12-19 | 2010-03-23 | Blue Coat Systems, Inc. | Method and system for configuring a device with a wireless mobile configurator |
US7987471B2 (en) | 2007-01-26 | 2011-07-26 | Microsoft Corporation | Mobile device management proxy system |
US8997091B1 (en) | 2007-01-31 | 2015-03-31 | Emc Corporation | Techniques for compliance testing |
US8949340B2 (en) | 2007-02-05 | 2015-02-03 | Boadin Technology, LLC | Systems and methods for organizing content for mobile media services |
US20080201705A1 (en) | 2007-02-15 | 2008-08-21 | Sun Microsystems, Inc. | Apparatus and method for generating a software dependency map |
US8634788B2 (en) | 2007-03-02 | 2014-01-21 | Aegis Mobility, Inc. | System and methods for monitoring the context associated with a mobile communication device |
US20090049518A1 (en) | 2007-08-08 | 2009-02-19 | Innopath Software, Inc. | Managing and Enforcing Policies on Mobile Devices |
US7676573B2 (en) | 2008-02-08 | 2010-03-09 | Microsoft Corporation | Node monitor client cache synchronization for mobile device management |
KR20110040934A (en) | 2008-08-08 | 2011-04-20 | 이노패스 소프트웨어, 아이엔시. | Intelligent mobile device management client |
US8261354B2 (en) | 2008-09-17 | 2012-09-04 | International Business Machines Corporation | System, method and program product for dynamically performing an audit and security compliance validation in an operating environment |
US9781148B2 (en) | 2008-10-21 | 2017-10-03 | Lookout, Inc. | Methods and systems for sharing risk responses between collections of mobile communications devices |
US20100205159A1 (en) | 2009-02-10 | 2010-08-12 | Jun Li | System and method for managing data |
US8898748B2 (en) * | 2009-05-21 | 2014-11-25 | Mobile Iron, Inc. | Remote verification for configuration updates |
US8750178B2 (en) | 2009-06-01 | 2014-06-10 | Qualcomm Incorporated | Connection manager for a wireless communication device |
JP5340041B2 (en) | 2009-06-05 | 2013-11-13 | エヌ・ティ・ティ・コミュニケーションズ株式会社 | Access control system, access control method, and program |
US8336080B2 (en) | 2009-06-26 | 2012-12-18 | Symbol Technologies, Inc. | Methods and apparatus for rating device security and automatically assessing security compliance |
US20110246499A1 (en) | 2010-03-30 | 2011-10-06 | Yuval Carmel | Method and system for evaluating compliance within a configuration-management system |
US8473743B2 (en) * | 2010-04-07 | 2013-06-25 | Apple Inc. | Mobile device management |
US8719780B2 (en) | 2010-06-29 | 2014-05-06 | Oracle International Corporation | Application server with a protocol-neutral programming model for developing telecommunications-based applications |
US9557983B1 (en) | 2010-12-29 | 2017-01-31 | Emc Corporation | Flexible storage application deployment mechanism |
US8813167B2 (en) | 2010-12-30 | 2014-08-19 | Apple Inc. | Dynamic device configuration using predicates |
US20120216281A1 (en) | 2011-02-22 | 2012-08-23 | PCTEL Secure LLC | Systems and Methods for Providing a Computing Device Having a Secure Operating System Kernel |
US9369433B1 (en) | 2011-03-18 | 2016-06-14 | Zscaler, Inc. | Cloud based social networking policy and compliance systems and methods |
US9065800B2 (en) | 2011-03-18 | 2015-06-23 | Zscaler, Inc. | Dynamic user identification and policy enforcement in cloud-based secure web gateways |
EP2700008A4 (en) | 2011-04-19 | 2015-09-30 | Hewlett Packard Development Co | Scheduling map and reduce tasks of jobs for execution according to performance goals |
JPWO2012161118A1 (en) | 2011-05-20 | 2014-07-31 | 日本放送協会 | Terminal cooperation system, receiver and reception method |
WO2012161125A1 (en) | 2011-05-20 | 2012-11-29 | 日本放送協会 | Receiver, program and receiving method |
US9071518B2 (en) * | 2011-07-01 | 2015-06-30 | Fiberlink Communications Corporation | Rules based actions for mobile device management |
US9037642B2 (en) | 2011-08-29 | 2015-05-19 | Fiberlink Communications Corporation | Platform for deployment and distribution of modules to endpoints |
US8756651B2 (en) | 2011-09-27 | 2014-06-17 | Amazon Technologies, Inc. | Policy compliance-based secure data access |
US20140032733A1 (en) | 2011-10-11 | 2014-01-30 | Citrix Systems, Inc. | Policy-Based Application Management |
US9756501B2 (en) | 2011-10-24 | 2017-09-05 | Blackberry Limited | System and method for wireless device configuration |
EP2783535B1 (en) | 2011-11-25 | 2016-09-14 | Bandwidthx Inc. | System for providing intelligent network access selection for a mobile wireless device |
US8713646B2 (en) | 2011-12-09 | 2014-04-29 | Erich Stuntebeck | Controlling access to resources on a network |
US9378390B2 (en) | 2012-03-30 | 2016-06-28 | Nokia Technologies Oy | Method and apparatus for policy adaption based on application policy compliance analysis |
US20140064068A1 (en) | 2012-08-30 | 2014-03-06 | Qualcomm Incorporated | Interactions between ran-based and legacy wlan mobility |
WO2014047168A1 (en) * | 2012-09-18 | 2014-03-27 | Citrix Systems, Inc. | Mobile device management and security |
US20140108558A1 (en) | 2012-10-12 | 2014-04-17 | Citrix Systems, Inc. | Application Management Framework for Secure Data Sharing in an Orchestration Framework for Connected Devices |
US20140109176A1 (en) | 2012-10-15 | 2014-04-17 | Citrix Systems, Inc. | Configuring and providing profiles that manage execution of mobile applications |
US10382275B1 (en) | 2012-10-22 | 2019-08-13 | Amazon Technologies, Inc. | Automated infrastructure configuration |
CN103001955B (en) | 2012-11-22 | 2017-05-31 | 南京中兴软件有限责任公司 | Method and system, the maintaining method and device of service condition that service downloading accelerates |
US20140148140A1 (en) | 2012-11-29 | 2014-05-29 | Lg Cns Co., Ltd. | Policy-based mobile device management system (mdms) based on access history information |
US9473417B2 (en) | 2013-03-14 | 2016-10-18 | Airwatch Llc | Controlling resources used by computing devices |
US9420002B1 (en) | 2013-03-14 | 2016-08-16 | Mark McGovern | Authorization server access system |
US9819682B2 (en) * | 2013-03-15 | 2017-11-14 | Airwatch Llc | Certificate based profile confirmation |
US10652242B2 (en) * | 2013-03-15 | 2020-05-12 | Airwatch, Llc | Incremental compliance remediation |
US8850049B1 (en) * | 2013-03-29 | 2014-09-30 | Citrix Systems, Inc. | Providing mobile device management functionalities for a managed browser |
US9985850B2 (en) * | 2013-03-29 | 2018-05-29 | Citrix Systems, Inc. | Providing mobile device management functionalities |
EP3020252A1 (en) | 2013-07-10 | 2016-05-18 | Ciaran Hynes | Method and apparatus for limiting the use of a mobile communications device |
US9894099B1 (en) * | 2013-07-12 | 2018-02-13 | Palo Alto Networks, Inc. | Automatically configuring mobile devices and applying policy based on device state |
US9705919B1 (en) * | 2013-07-12 | 2017-07-11 | Palo Alto Networks, Inc. | Security policy enforcement for mobile devices based on device state |
US20150052616A1 (en) | 2013-08-14 | 2015-02-19 | L-3 Communications Corporation | Protected mode for securing computing devices |
US20150244743A1 (en) | 2014-02-21 | 2015-08-27 | Airwatch Llc | Risk assessment for managed client devices |
US10129242B2 (en) * | 2013-09-16 | 2018-11-13 | Airwatch Llc | Multi-persona devices and management |
JP6484929B2 (en) | 2013-10-17 | 2019-03-20 | 株式会社リコー | Device management apparatus, program, device management system, and security setting method |
US9721111B2 (en) | 2013-10-24 | 2017-08-01 | Internet Infrastructure Services Corporation | Methods of dynamically securing electronic devices and other communications through environmental and system measurements leveraging tailored trustworthy spaces |
WO2015064076A1 (en) | 2013-10-30 | 2015-05-07 | 日本電気株式会社 | Communication terminal management system, management method, management server, terminal control method, and communication terminal |
US9614745B2 (en) | 2014-01-09 | 2017-04-04 | Citrix Systems, Inc. | Systems and methods for cloud-based probing and diagnostics |
WO2015152894A1 (en) | 2014-04-01 | 2015-10-08 | Hewlett-Packard Development Company, L.P. | Device-type based content management |
US9848330B2 (en) | 2014-04-09 | 2017-12-19 | Microsoft Technology Licensing, Llc | Device policy manager |
US9584515B2 (en) | 2014-04-30 | 2017-02-28 | Citrix Systems, Inc. | Enterprise system authentication and authorization via gateway |
US10924554B2 (en) | 2014-05-05 | 2021-02-16 | Citrix Systems, Inc. | Application customization |
US20150365293A1 (en) * | 2014-06-13 | 2015-12-17 | Uber Technologies, Inc. | Enforcing policies based on information received from external systems |
US9900801B2 (en) | 2014-08-08 | 2018-02-20 | Parallel Wireless, Inc. | Congestion and overload reduction |
US20160042010A1 (en) | 2014-08-11 | 2016-02-11 | Cox Communications, Inc. | Systems and Methods of Facilities Location |
US9647897B2 (en) | 2014-08-20 | 2017-05-09 | Jamf Software, Llc | Dynamic grouping of managed devices |
US9652212B2 (en) * | 2014-09-24 | 2017-05-16 | Oracle International Corporation | Managing change events for devices in an enterprise system |
US9444849B2 (en) * | 2014-10-06 | 2016-09-13 | The Boeing Company | Enforcing policy compliance on a device |
US9762557B2 (en) * | 2014-10-28 | 2017-09-12 | Microsoft Technology Licensing, Llc | Policy settings configuration with signals |
US10063594B2 (en) * | 2014-12-16 | 2018-08-28 | OPSWAT, Inc. | Network access control with compliance policy check |
WO2016115633A1 (en) | 2015-01-21 | 2016-07-28 | FusionPipe Software Solutions Inc. | Enhanced security authentication methods, systems and media |
US11245725B2 (en) * | 2015-04-24 | 2022-02-08 | Matthew B. TREVATHAN | Dynamically updating policy controls for mobile devices and applications |
US10979280B2 (en) | 2015-08-12 | 2021-04-13 | Airwatch Llc | Managing devices through secondary communication channels |
US10452497B2 (en) | 2015-08-14 | 2019-10-22 | Oracle International Corporation | Restoration of UI state in transactional systems |
US10419514B2 (en) | 2015-08-14 | 2019-09-17 | Oracle International Corporation | Discovery of federated logins |
US10021542B2 (en) | 2015-08-28 | 2018-07-10 | Airwatch Llc | Providing access to applications with varying enrollment levels |
US10296765B2 (en) | 2015-09-30 | 2019-05-21 | International Business Machines Corporation | Multi-level security enforcement |
US9967287B2 (en) | 2015-10-27 | 2018-05-08 | Airwatch Llc | Detection of offline attempts to circumvent security policies |
EP3193256B1 (en) | 2016-01-12 | 2018-08-01 | Politechnika Poznanska | A fault-tolerant data processing computer system and method for implementing a distributed two-tier state machine |
US9990222B2 (en) | 2016-03-18 | 2018-06-05 | Airwatch Llc | Enforcing compliance rules against hypervisor and virtual machine using host management component |
US10552823B1 (en) | 2016-03-25 | 2020-02-04 | Early Warning Services, Llc | System and method for authentication of a mobile device |
US10389705B2 (en) | 2016-03-30 | 2019-08-20 | Airwatch Llc | Associating user accounts with enterprise workspaces |
US10225740B2 (en) | 2016-05-12 | 2019-03-05 | Zscaler, Inc. | Multidimensional risk profiling for network access control of mobile devices through a cloud based security system |
US20170329966A1 (en) | 2016-05-13 | 2017-11-16 | Qualcomm Incorporated | Electronic device based security management |
US10595202B2 (en) | 2016-05-23 | 2020-03-17 | Citrix Systems, Inc. | Dynamic access to hosted applications |
US10003670B2 (en) * | 2016-06-17 | 2018-06-19 | Airwatch Llc | Remote provisioning and enrollment of enterprise devices with on-premises domain controllers |
US20180063088A1 (en) | 2016-09-01 | 2018-03-01 | Airwatch Llc | Hypervisor network profiles to facilitate vpn tunnel |
US10592676B2 (en) | 2016-10-28 | 2020-03-17 | Tala Security, Inc. | Application security service |
US10243946B2 (en) | 2016-11-04 | 2019-03-26 | Netskope, Inc. | Non-intrusive security enforcement for federated single sign-on (SSO) |
US10362095B2 (en) | 2016-11-04 | 2019-07-23 | Airwatch Llc | Distributed network diagnostics of enterprise devices utilizing device management |
US10505983B2 (en) * | 2016-11-09 | 2019-12-10 | Airwatch Llc | Enforcing enterprise requirements for devices registered with a registration service |
US20180157457A1 (en) | 2016-12-01 | 2018-06-07 | Airwatch Llc | Enforcing display sharing profiles on a client device sharing display activity with a display sharing application |
US10402558B2 (en) | 2016-12-16 | 2019-09-03 | Blackberry Limited | Device restrictions during events |
US10652278B2 (en) | 2016-12-19 | 2020-05-12 | Forescout Technologies, Inc. | Compliance monitoring |
US10547712B2 (en) | 2017-03-14 | 2020-01-28 | Vmware, Inc | Reserving physical resources based upon a physical identifier |
US11228591B2 (en) | 2017-03-29 | 2022-01-18 | MobileIron, Inc. | Correlating mobile device and app usage with cloud service usage to provide security |
US10620941B2 (en) | 2017-04-11 | 2020-04-14 | Dell Products L.P. | Updating and rolling back known good states of information handling systems |
US11316897B2 (en) | 2017-05-19 | 2022-04-26 | Vmware, Inc. | Applying device policies using a management token |
US11227032B1 (en) | 2017-05-24 | 2022-01-18 | Amazon Technologies, Inc. | Dynamic posture assessment to mitigate reverse engineering |
US10437625B2 (en) * | 2017-06-16 | 2019-10-08 | Microsoft Technology Licensing, Llc | Evaluating configuration requests in a virtual machine |
US10104710B1 (en) | 2017-06-19 | 2018-10-16 | Global Tel*Link Corporation | Dual mode transmission in a controlled environment |
US11243756B1 (en) | 2017-08-14 | 2022-02-08 | Amazon Technologies, Inc. | Extensible resource compliance management |
KR102387657B1 (en) | 2017-08-23 | 2022-04-19 | 삼성전자주식회사 | Method for connecting external device throught usb interface and electronic device therefor |
WO2019083909A1 (en) | 2017-10-24 | 2019-05-02 | Antenna Audio, Inc. | Systems and methods for multimedia tours |
US10810055B1 (en) | 2017-12-14 | 2020-10-20 | Amazon Technologies, Inc. | Request simulation for ensuring compliance |
US10944794B2 (en) * | 2018-04-25 | 2021-03-09 | Dell Products L.P. | Real-time policy selection and deployment based on changes in context |
US10776495B2 (en) | 2018-05-10 | 2020-09-15 | Microsoft Technology Licensing, Llc | Systems and methods for attributing security vulnerabilities to a configuration of a client device |
US11271812B2 (en) | 2018-06-29 | 2022-03-08 | Forescout Technologies, Inc. | Segmentation management including visualization, configuration, simulation, or a combination thereof |
US10802821B2 (en) * | 2018-07-24 | 2020-10-13 | Vmware, Inc. | Firmware management |
US11184223B2 (en) | 2018-07-31 | 2021-11-23 | Microsoft Technology Licensing, Llc | Implementation of compliance settings by a mobile device for compliance with a configuration scenario |
-
2018
- 2018-07-17 US US16/037,201 patent/US20200028879A1/en not_active Abandoned
-
2019
- 2019-06-19 CN CN201980047014.XA patent/CN112805980B/en active Active
- 2019-06-19 KR KR1020217001286A patent/KR20210027372A/en not_active Application Discontinuation
- 2019-06-19 WO PCT/US2019/037839 patent/WO2020018222A1/en unknown
- 2019-06-19 JP JP2021502498A patent/JP7398430B2/en active Active
- 2019-06-19 EP EP19740112.8A patent/EP3808053B1/en active Active
-
2021
- 2021-06-30 US US17/363,988 patent/US11811832B2/en active Active
-
2023
- 2023-05-05 US US18/313,104 patent/US20230421616A1/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10972282B2 (en) | Distributed logging of application events in a blockchain | |
US11232080B2 (en) | Systems and methods for providing access to a data file stored at a data storage system | |
US20180157700A1 (en) | Storing and verifying event logs in a blockchain | |
US10430592B2 (en) | Integrity checking for computing devices | |
US9313604B1 (en) | Network service request throttling system | |
JP2006164268A5 (en) | ||
WO2020119271A1 (en) | Block chain-based screen recording evidence obtaining method, system, and electronic device | |
JP6633059B2 (en) | Rating files | |
US11405363B2 (en) | File upload control for client-side applications in proxy solutions | |
US9787791B2 (en) | Managing a data cache for a computer system | |
CN111125017B (en) | Data storage method and device based on tree structure and computer equipment | |
US20150350341A1 (en) | Application gateway for cloud computing systems | |
US20150106870A1 (en) | Anomaly detection on web client | |
CN112214519B (en) | Data query method, device, equipment and readable medium | |
US20140365659A1 (en) | Load controller framework | |
US20180097817A1 (en) | Generating short-term signatures for accessing cloud storage | |
JPWO2020018222A5 (en) | ||
US9665732B2 (en) | Secure Download from internet marketplace | |
JPWO2020027954A5 (en) | ||
EP3574428A1 (en) | Safe data access through any data channel | |
US11847174B2 (en) | System and method for geo-locked documents | |
US11176011B2 (en) | Apparatus and method for transmitting fuzzing data for one-way protocol software fuzzing | |
TWI732291B (en) | System and method for providing preloaded content according to role rights | |
CN116860699A (en) | File management method, system, computer device and computer readable storage medium | |
CN117240866A (en) | Communication method, electronic device, system, and storage medium |