WO2014046888A3 - Controlling distribution of resources on a network - Google Patents

Controlling distribution of resources on a network Download PDF

Info

Publication number
WO2014046888A3
WO2014046888A3 PCT/US2013/058530 US2013058530W WO2014046888A3 WO 2014046888 A3 WO2014046888 A3 WO 2014046888A3 US 2013058530 W US2013058530 W US 2013058530W WO 2014046888 A3 WO2014046888 A3 WO 2014046888A3
Authority
WO
WIPO (PCT)
Prior art keywords
resources
distribution
client device
distribution service
rules
Prior art date
Application number
PCT/US2013/058530
Other languages
French (fr)
Other versions
WO2014046888A2 (en
Inventor
John Marshall
Erich Stuntebeck
Gopinath Jayaprakash
John Joseph MANTON
Jonathan Blake BRANNON
Original Assignee
Sky Socket, Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sky Socket, Llc filed Critical Sky Socket, Llc
Priority to EP17201693.3A priority Critical patent/EP3301604B1/en
Priority to AU2013318418A priority patent/AU2013318418A1/en
Priority to EP13839147.9A priority patent/EP2898444B1/en
Publication of WO2014046888A2 publication Critical patent/WO2014046888A2/en
Publication of WO2014046888A3 publication Critical patent/WO2014046888A3/en
Priority to AU2016256794A priority patent/AU2016256794B2/en
Priority to AU2019202689A priority patent/AU2019202689B2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/61Time-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • H04W12/64Location-dependent; Proximity-dependent using geofenced areas

Abstract

Disclosed are various embodiments for controlling distribution of resources on a network. In one embodiment, a distribution service receives a request from a client device to access resources hosted by a distribution service. In response, the distribution service determines whether the client device is authorized to access the distribution service. The distribution service identifies which of the resources hosted by the distribution service are accessible to the client device based on the resource grouping identifiers associated with the client device. The distribution service determines which distribution rules are associated with the identified resources, the distribution rules including location rules and time rules. The distribution service then transmits the identified resources and identified distribution rules to the client device, where the resources are configured to be exclusively accessible via a containerized client application on the client device while the client device satisfies the distribution rules associated with the resources.
PCT/US2013/058530 2012-09-20 2013-09-06 Controlling distribution of resources on a network WO2014046888A2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
EP17201693.3A EP3301604B1 (en) 2012-09-20 2013-09-06 Controlling distribution of resources on a network
AU2013318418A AU2013318418A1 (en) 2012-09-20 2013-09-06 Controlling distribution of resources on a network
EP13839147.9A EP2898444B1 (en) 2012-09-20 2013-09-06 Controlling distribution of resources on a network
AU2016256794A AU2016256794B2 (en) 2012-09-20 2016-11-11 Controlling distribution of resources on a network
AU2019202689A AU2019202689B2 (en) 2012-09-20 2019-04-17 Controlling distribution of resources on a network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/623,627 2012-09-20
US13/623,627 US9705813B2 (en) 2012-02-14 2012-09-20 Controlling distribution of resources on a network

Publications (2)

Publication Number Publication Date
WO2014046888A2 WO2014046888A2 (en) 2014-03-27
WO2014046888A3 true WO2014046888A3 (en) 2014-07-31

Family

ID=50342537

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2013/058530 WO2014046888A2 (en) 2012-09-20 2013-09-06 Controlling distribution of resources on a network

Country Status (4)

Country Link
US (1) US9705813B2 (en)
EP (2) EP2898444B1 (en)
AU (3) AU2013318418A1 (en)
WO (1) WO2014046888A2 (en)

Families Citing this family (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120089232A1 (en) 2009-03-27 2012-04-12 Jennifer Hagyoung Kang Choi Medical devices with galvanic particulates
US8695060B2 (en) 2011-10-10 2014-04-08 Openpeak Inc. System and method for creating secure applications
US9705813B2 (en) 2012-02-14 2017-07-11 Airwatch, Llc Controlling distribution of resources on a network
US9680763B2 (en) 2012-02-14 2017-06-13 Airwatch, Llc Controlling distribution of resources in a network
US10404615B2 (en) 2012-02-14 2019-09-03 Airwatch, Llc Controlling distribution of resources on a network
US10257194B2 (en) * 2012-02-14 2019-04-09 Airwatch Llc Distribution of variably secure resources in a networked environment
US20140281539A1 (en) * 2012-03-30 2014-09-18 Goldman, Sachs & Co. Secure Mobile Framework With Operating System Integrity Checking
US9247432B2 (en) * 2012-10-19 2016-01-26 Airwatch Llc Systems and methods for controlling network access
US9215280B2 (en) * 2013-03-13 2015-12-15 Unisys Corporation Systems and methods for downloading multiple files
US20140280955A1 (en) 2013-03-14 2014-09-18 Sky Socket, Llc Controlling Electronically Communicated Resources
US9767323B2 (en) * 2013-03-15 2017-09-19 International Business Machines Corporation Spatial security for stored data
KR102067276B1 (en) * 2013-05-30 2020-02-11 삼성전자주식회사 Apparatus and method for executing application
US9185099B2 (en) 2013-09-23 2015-11-10 Airwatch Llc Securely authorizing access to remote resources
US9591562B2 (en) * 2013-10-31 2017-03-07 Aruba Networks, Inc. Provisioning access point bandwidth based on predetermined events
USD760237S1 (en) * 2013-12-05 2016-06-28 Airwatch Llc Display screen with a graphical user interface for a management console application
RU2653984C2 (en) * 2013-12-05 2018-05-15 Закрытое акционерное общество "Лаборатория Касперского" Method and system for associating device management agents with device user
US9817987B2 (en) * 2013-12-23 2017-11-14 Dropbox, Inc. Restricting access to content
US9813421B2 (en) 2014-05-20 2017-11-07 Box, Inc. Systems and methods for secure resource access and network communication
US10243953B2 (en) * 2014-05-20 2019-03-26 Box, Inc. Systems and methods for secure resource access and network communication
US9497197B2 (en) 2014-05-20 2016-11-15 Box, Inc. Systems and methods for secure resource access and network communication
US8938547B1 (en) 2014-09-05 2015-01-20 Openpeak Inc. Method and system for data usage accounting in a computing device
US20160071040A1 (en) 2014-09-05 2016-03-10 Openpeak Inc. Method and system for enabling data usage accounting through a relay
US11061991B2 (en) 2014-09-05 2021-07-13 Airwatch, Llc Secure document sharing
US9350818B2 (en) 2014-09-05 2016-05-24 Openpeak Inc. Method and system for enabling data usage accounting for unreliable transport communication
US9232013B1 (en) 2014-09-05 2016-01-05 Openpeak Inc. Method and system for enabling data usage accounting
US9100390B1 (en) 2014-09-05 2015-08-04 Openpeak Inc. Method and system for enrolling and authenticating computing devices for data usage accounting
US10332140B2 (en) * 2014-11-26 2019-06-25 Paypal, Inc. Line management based on user tolerance
US9825834B2 (en) * 2015-03-30 2017-11-21 Airwatch Llc Network speed detection
US11079893B2 (en) * 2015-04-15 2021-08-03 Airwatch Llc Remotely restricting client devices
US10509574B2 (en) * 2016-02-08 2019-12-17 Microsoft Technology Licensing, Llc Container credentialing by host
US10180834B2 (en) * 2016-02-29 2019-01-15 Airwatch Llc Provisioning of applications deployed on client devices
ES2632167B1 (en) * 2016-03-07 2018-03-09 Shokesu, S.L. SYSTEM OF MONITORING AND EXTRACTION OF PUBLIC INFORMATION OF USERS REGISTERED IN SOCIAL NETWORKS, ACCOMMODATED IN SERVERS AND CLOUDS OF SOCIAL NETWORK DATA
US10834188B2 (en) 2016-03-23 2020-11-10 International Business Machines Corporation Distribution of data in cloud storage based on policies maintained in metadata
US20170279812A1 (en) * 2016-03-23 2017-09-28 International Business Machines Corporation Encryption and decryption of data in a cloud storage based on indications in metadata
US10437654B2 (en) * 2016-05-12 2019-10-08 Accenture Global Solutions Limited Context-aware application programming interface response management
RU2724639C2 (en) * 2016-06-24 2020-06-25 Акционерное общество "Лаборатория Касперского" Method of binding an unregistered device control agent with a user
US10516759B2 (en) * 2016-11-14 2019-12-24 Dell Products, Lp System and method for centralized management of software services
CN108289080B (en) * 2017-01-09 2021-02-05 阿里巴巴集团控股有限公司 Method, device and system for accessing file system
WO2019028397A1 (en) * 2017-08-03 2019-02-07 Tfc Holding, Llc System and method for controlling access to data associated with a venue-centric event
WO2019213316A1 (en) * 2018-05-01 2019-11-07 Hotshots Technologies S.À.R.L. Multi-modal access policy enforcement
US10440537B1 (en) * 2018-12-11 2019-10-08 Vmware, Inc. Defining automations for enrolled user devices
US11455411B2 (en) * 2019-04-25 2022-09-27 Motorola Mobility Llc Controlling content visibility on a computing device based on computing device location
US11562051B2 (en) 2019-04-25 2023-01-24 Motorola Mobility Llc Varying computing device behavior for different authenticators
US11329990B2 (en) * 2019-05-17 2022-05-10 Imprivata, Inc. Delayed and provisional user authentication for medical devices
US11388239B2 (en) 2019-06-10 2022-07-12 Vmware, Inc. Previewing impacted entities in automated device definitions
US11134081B2 (en) * 2019-10-31 2021-09-28 International Business Machines Corporation Authentication mechanism utilizing location corroboration
CN110865817B (en) * 2019-11-01 2024-04-05 湖北省楚天云有限公司 Cloud computing platform resource metering method and system
WO2021155953A1 (en) * 2020-02-07 2021-08-12 Nokia Technologies Oy Controlling and monitoring access in a network
JP2021189675A (en) * 2020-05-28 2021-12-13 株式会社リコー Service provision system, information processing system, and use authority allocating method
US11483221B2 (en) * 2021-01-27 2022-10-25 Vmware, Inc. Launcher application with connectivity detection for shared mobile devices
US11363050B1 (en) 2021-03-25 2022-06-14 Bank Of America Corporation Information security system and method for incompliance detection in data transmission

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090001006A1 (en) * 2007-06-29 2009-01-01 Gianluca Pardini Integrated suction and draining device for the tank of a dishwashing machine and dishwashing machine including such a device
US20090222880A1 (en) * 2008-03-03 2009-09-03 Tresys Technology, Llc Configurable access control security for virtualization
US7895296B1 (en) * 2006-12-29 2011-02-22 Google, Inc. Local storage for web based native applications
US20120150577A1 (en) * 2010-12-14 2012-06-14 Microsoft Corporation Meeting lifecycle management
WO2012098596A1 (en) * 2011-01-20 2012-07-26 Nec Corporation Communication system, control device, policy management device, communication method, and program

Family Cites Families (144)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5666530A (en) 1992-12-02 1997-09-09 Compaq Computer Corporation System for automatic synchronization of common file between portable computer and host computer via communication channel selected from a plurality of usable channels there between
US6748318B1 (en) 1993-05-18 2004-06-08 Arrivalstar, Inc. Advanced notification systems and methods utilizing a computer network
US6618668B1 (en) 2000-04-26 2003-09-09 Arrivalstar, Inc. System and method for obtaining vehicle schedule information in an advance notification system
US6278936B1 (en) 1993-05-18 2001-08-21 Global Research Systems, Inc. System and method for an advance notification system for monitoring and reporting proximity of a vehicle
US5864683A (en) 1994-10-12 1999-01-26 Secure Computing Corporartion System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US6226622B1 (en) 1995-11-27 2001-05-01 Alan James Dabbiere Methods and devices utilizing a GPS tracking system
US5974238A (en) 1996-08-07 1999-10-26 Compaq Computer Corporation Automatic data synchronization between a handheld and a host computer using pseudo cache including tags and logical data elements
US6708221B1 (en) 1996-12-13 2004-03-16 Visto Corporation System and method for globally and securely accessing unified information in a computer network
US6085192A (en) 1997-04-11 2000-07-04 Roampage, Inc. System and method for securely synchronizing multiple copies of a workspace element in a network
US6131116A (en) 1996-12-13 2000-10-10 Visto Corporation System and method for globally accessing computer services
US6023708A (en) 1997-05-29 2000-02-08 Visto Corporation System and method for using a global translator to synchronize workspace elements across a network
US7287271B1 (en) 1997-04-08 2007-10-23 Visto Corporation System and method for enabling secure access to services in a computer network
US20060195595A1 (en) 2003-12-19 2006-08-31 Mendez Daniel J System and method for globally and securely accessing unified information in a computer network
US6766454B1 (en) 1997-04-08 2004-07-20 Visto Corporation System and method for using an authentication applet to identify and authenticate a user in a computer network
US5961590A (en) 1997-04-11 1999-10-05 Roampage, Inc. System and method for synchronizing electronic mail between a client site and a central site
US6606662B2 (en) 1997-06-11 2003-08-12 Canon Kabushiki Kaisha Portable terminal apparatus and communication method thereof
US6269369B1 (en) 1997-11-02 2001-07-31 Amazon.Com Holdings, Inc. Networked personal contact manager
US6151606A (en) 1998-01-16 2000-11-21 Visto Corporation System and method for using a workspace data manager to access, manipulate and synchronize network data
JPH11224288A (en) * 1998-02-06 1999-08-17 Hitachi Ltd Use condition sale type digital contents sale electronic mall system
US20030110084A1 (en) 1998-03-04 2003-06-12 Martin Forest Eberhard Secure content distribution system
US7792297B1 (en) 1998-03-31 2010-09-07 Piccionelli Greg A System and process for limiting distribution of information on a communication network based on geographic location
US6779118B1 (en) 1998-05-04 2004-08-17 Auriq Systems, Inc. User specific automatic data redirection system
US6233341B1 (en) 1998-05-19 2001-05-15 Visto Corporation System and method for installing and using a temporary certificate at a remote site
US6131096A (en) 1998-10-05 2000-10-10 Visto Corporation System and method for updating a remote database in a network
US6463470B1 (en) 1998-10-26 2002-10-08 Cisco Technology, Inc. Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows
US6370629B1 (en) 1998-10-29 2002-04-09 Datum, Inc. Controlling access to stored information based on geographical location and date and time
US7373517B1 (en) 1999-08-19 2008-05-13 Visto Corporation System and method for encrypting and decrypting files
US6560772B1 (en) 1999-10-15 2003-05-06 International Business Machines Corporation Method, system, and program for accessing data in different environments
US7363361B2 (en) 2000-08-18 2008-04-22 Akamai Technologies, Inc. Secure content delivery system
WO2001046833A2 (en) 1999-12-23 2001-06-28 Logistics.Com, Inc. Bid positioning system
US7739334B1 (en) 2000-03-17 2010-06-15 Visto Corporation System and method for automatically forwarding email and email events via a computer network to a server computer
US20010047335A1 (en) 2000-04-28 2001-11-29 Martin Arndt Secure payment method and apparatus
AU2001261784B2 (en) 2000-05-22 2006-12-14 Manhattan Associates System, method and apparatus for integrated supply chain management
US7225231B2 (en) 2000-09-20 2007-05-29 Visto Corporation System and method for transmitting workspace elements across a network
US20020055967A1 (en) 2000-11-08 2002-05-09 Coussement Stefaan Valere Albert System for reporting client status information to communications-center agents
US7660902B2 (en) 2000-11-20 2010-02-09 Rsa Security, Inc. Dynamic file access control and management
US7702785B2 (en) 2001-01-31 2010-04-20 International Business Machines Corporation Methods, systems and computer program products for selectively allowing users of a multi-user system access to network resources
US7350229B1 (en) * 2001-03-07 2008-03-25 Netegrity, Inc. Authentication and authorization mapping for a computer network
US7603703B2 (en) 2001-04-12 2009-10-13 International Business Machines Corporation Method and system for controlled distribution of application code and content data within a computer network
US7228383B2 (en) 2001-06-01 2007-06-05 Visto Corporation System and method for progressive and hierarchical caching
US7284045B1 (en) 2001-06-01 2007-10-16 Visto Corporation Method and system for determining information to access an electronic mail account
US7444375B2 (en) 2001-06-19 2008-10-28 Visto Corporation Interactive voice and text message system
US7064688B2 (en) 2001-07-09 2006-06-20 Good Technology, Inc. System and method for compressing data on a bandwidth-limited network
US20030009595A1 (en) 2001-07-09 2003-01-09 Roger Collins System and method for compressing data using field-based code word generation
EP1451718B1 (en) 2001-10-23 2012-08-08 Beechwood Limited Partnership System and method for merging remote and local data in a single user interface
CA2467404A1 (en) 2001-11-15 2003-05-30 Visto Corporation System and methods for asychronous synchronization
US6741232B1 (en) 2002-01-23 2004-05-25 Good Technology, Inc. User interface for a data processing apparatus
US7606938B2 (en) 2002-03-01 2009-10-20 Enterasys Networks, Inc. Verified device locations in a data network
US7458098B2 (en) 2002-03-08 2008-11-25 Secure Computing Corporation Systems and methods for enhancing electronic communication security
US8094591B1 (en) 2002-03-19 2012-01-10 Good Technology, Inc. Data carrier detector for a packet-switched communication network
US7788382B1 (en) 2002-03-26 2010-08-31 Good Technology, Inc. Server initiated synchronization
US7447506B1 (en) 2002-03-29 2008-11-04 Good Technology, Inc. Apparatus and method for reducing network congestion
US7310535B1 (en) 2002-03-29 2007-12-18 Good Technology, Inc. Apparatus and method for reducing power consumption in a wireless device
US6726106B1 (en) 2002-04-02 2004-04-27 Good Technology, Inc. Power management and device illumination mechanisms for a personal digital assistant
US20030204716A1 (en) 2002-04-24 2003-10-30 Rockwood Troy Dean System and methods for digital content distribution
US7447799B2 (en) 2002-04-24 2008-11-04 Good Technology, Inc. System and method for automatically updating a wireless device
US6727856B1 (en) 2002-06-06 2004-04-27 Good Technology, Inc. Antenna system for a wireless device
US7032181B1 (en) 2002-06-18 2006-04-18 Good Technology, Inc. Optimized user interface for small screen devices
CA2391717A1 (en) 2002-06-26 2003-12-26 Ibm Canada Limited-Ibm Canada Limitee Transferring data and storing metadata across a network
US9357013B2 (en) * 2002-07-26 2016-05-31 International Business Machines Corporation Client-side script to application communication system
AU2003259893B2 (en) 2002-08-09 2009-03-12 Blackberry Limited System and method for preventing access to data on a compromised remote device
US7665125B2 (en) 2002-09-23 2010-02-16 Heard Robert W System and method for distribution of security policies for mobile devices
US20060190984A1 (en) 2002-09-23 2006-08-24 Credant Technologies, Inc. Gatekeeper architecture/features to support security policy maintenance and distribution
US7437752B2 (en) 2002-09-23 2008-10-14 Credant Technologies, Inc. Client architecture for portable device with security policies
US7665118B2 (en) 2002-09-23 2010-02-16 Credant Technologies, Inc. Server, computer memory, and method to support security policy maintenance and distribution
US7827607B2 (en) 2002-11-27 2010-11-02 Symantec Corporation Enhanced client compliancy using database of security sensor data
US7308703B2 (en) 2002-12-18 2007-12-11 Novell, Inc. Protection of data accessible by a mobile device
US7353533B2 (en) 2002-12-18 2008-04-01 Novell, Inc. Administration of protection of data accessible by a mobile device
EP1634162B1 (en) 2003-01-31 2010-07-14 Visto Corporation Asynchronous real-time retrieval of data
EP1618478A4 (en) 2003-03-13 2007-10-03 Drm Technologies L L C Secure streaming container
US7203959B2 (en) 2003-03-14 2007-04-10 Symantec Corporation Stream scanning through network proxy servers
US6995749B2 (en) 2003-03-28 2006-02-07 Good Technology, Inc. Auto font magnification mechanism
GB0308991D0 (en) 2003-04-17 2003-05-28 Psion Digital Ltd A data access replication or communication system comprising a distributed software application
US7275073B2 (en) 2003-05-07 2007-09-25 Good Technology, Inc. System and method for notifying mobile devices based on device type and network capabilities
US7890091B2 (en) 2003-05-08 2011-02-15 Good Technology, Inc. Collaborative data and intelligent synchronization for mobile devices
US7840631B2 (en) 2003-05-09 2010-11-23 Good Technology, Inc. Multimedia control with one-click device selection
US20040224703A1 (en) 2003-05-09 2004-11-11 Takaki Steven M. Method and system for enhancing venue participation by venue participants
US7184801B2 (en) 2003-05-12 2007-02-27 Good Technology, Inc. Mobile application builder
US7515717B2 (en) 2003-07-31 2009-04-07 International Business Machines Corporation Security containers for document components
US7735122B1 (en) 2003-08-29 2010-06-08 Novell, Inc. Credential mapping
US7594224B2 (en) 2003-10-10 2009-09-22 Bea Systems, Inc. Distributed enterprise security system
US7421741B2 (en) 2003-10-20 2008-09-02 Phillips Ii Eugene B Securing digital content system and method
US7039394B2 (en) 2003-11-25 2006-05-02 Good Technology, Inc. Communication system and method for compressing information sent by a communication device to a target portable communication device
BRPI0508991A (en) 2004-03-18 2007-08-28 Manhattan Associates Inc shipping management system and method for shipping planning optimization
US7454623B2 (en) 2004-06-16 2008-11-18 Blame Canada Holdings Inc Distributed hierarchical identity management system authentication mechanisms
US7475152B2 (en) 2004-09-20 2009-01-06 International Business Machines Corporation Approach to provide self-protection function to web content at client side
US7620001B2 (en) 2004-10-13 2009-11-17 Good Technology, Inc. Communication system and method with mobile devices
US8001082B1 (en) 2004-10-28 2011-08-16 Good Technology, Inc. System and method of data security in synchronizing data with a wireless device
JP2006260201A (en) * 2005-03-17 2006-09-28 Hitachi Ltd Distributed authentication system and communication controller
US7970386B2 (en) 2005-06-03 2011-06-28 Good Technology, Inc. System and method for monitoring and maintaining a wireless device
US7590403B1 (en) 2005-06-07 2009-09-15 Good Technology, Inc. Wireless device dormancy override
US20070136492A1 (en) 2005-12-08 2007-06-14 Good Technology, Inc. Method and system for compressing/decompressing data for communication with wireless devices
US7836303B2 (en) * 2005-12-09 2010-11-16 University Of Washington Web browser operating system
US8006289B2 (en) 2005-12-16 2011-08-23 International Business Machines Corporation Method and system for extending authentication methods
US8621549B2 (en) 2005-12-29 2013-12-31 Nextlabs, Inc. Enforcing control policies in an information management system
US7620392B1 (en) 2006-02-27 2009-11-17 Good Technology, Inc. Method and system for distributing and updating software in wireless devices
US7702322B1 (en) 2006-02-27 2010-04-20 Good Technology, Llc Method and system for distributing and updating software in wireless devices
US7917641B2 (en) 2006-03-14 2011-03-29 Tangoe, Inc. Apparatus and method for provisioning wireless data communication devices
CN101449272A (en) 2006-03-31 2009-06-03 维斯托公司 System and method for searching disparate datastores via a remote device
US8745227B2 (en) 2006-06-07 2014-06-03 Apple Inc. Distributed secure content delivery
US7823186B2 (en) 2006-08-24 2010-10-26 Novell, Inc. System and method for applying security policies on multiple assembly caches
US8046823B1 (en) 2006-10-03 2011-10-25 Stamps.Com Inc. Secure application bridge server
US8538028B2 (en) 2006-11-20 2013-09-17 Toposis Corporation System and method for secure electronic communication services
US20080134296A1 (en) 2006-11-30 2008-06-05 Ofer Amitai System and method of network authorization by scoring
EP2126713A2 (en) 2007-02-19 2009-12-02 Ondeego, Inc. Methods and system to create applications and distribute applications to a remote device
US8060074B2 (en) 2007-07-30 2011-11-15 Mobile Iron, Inc. Virtual instance architecture for mobile device management systems
US9225823B2 (en) * 2007-08-31 2015-12-29 Sony Corporation Portable electronic devices and methods for downloading applications based on presence of the portable electronic device in a defined geographical region
EP2218015A4 (en) 2007-11-05 2012-08-08 Visto Corp Service management system for providing service related message prioritization in a mobile client
US8677141B2 (en) 2007-11-23 2014-03-18 Microsoft Corporation Enhanced security and performance of web applications
US9185554B2 (en) 2008-02-15 2015-11-10 Appcentral, Inc. System and methods to store, retrieve, manage, augment and monitor applications on appliances
US8990911B2 (en) 2008-03-30 2015-03-24 Emc Corporation System and method for single sign-on to resources across a network
US20090260064A1 (en) 2008-04-15 2009-10-15 Problem Resolution Enterprise, Llc Method and process for registering a device to verify transactions
US8910255B2 (en) 2008-05-27 2014-12-09 Microsoft Corporation Authentication for distributed secure content management system
JP5383335B2 (en) 2008-07-03 2014-01-08 キヤノン株式会社 Data transmission apparatus, transmission control method, and program
US8763071B2 (en) 2008-07-24 2014-06-24 Zscaler, Inc. Systems and methods for mobile application security classification and enforcement
EP2342652A4 (en) 2008-09-05 2012-05-30 Visto Corp System, apparatus and associated methodology for enriching contact of a remote client
BRPI0823115A2 (en) 2008-11-04 2015-06-16 Nokia Siemens Networks Oy Service Access Control
US8260320B2 (en) 2008-11-13 2012-09-04 Apple Inc. Location specific content
US8909925B2 (en) 2008-11-17 2014-12-09 Prakash Baskaran System to secure electronic content, enforce usage policies and provide configurable functionalities
US8412957B2 (en) * 2008-12-16 2013-04-02 SAP France S.A. Encryption and decryption of records in accordance with group access vectors
US20100212016A1 (en) 2009-02-18 2010-08-19 Microsoft Corporation Content protection interoperrability
JPWO2010106772A1 (en) 2009-03-17 2012-09-20 日本電気株式会社 Distributed processing system and distributed processing method
US9197417B2 (en) * 2009-04-24 2015-11-24 Microsoft Technology Licensing, Llc Hosted application sandbox model
US20100299152A1 (en) 2009-05-20 2010-11-25 Mobile Iron, Inc. Selective Management of Mobile Devices in an Enterprise Environment
US8695058B2 (en) 2009-05-20 2014-04-08 Mobile Iron, Inc. Selective management of mobile device data in an enterprise environment
US8898748B2 (en) 2009-05-21 2014-11-25 Mobile Iron, Inc. Remote verification for configuration updates
US20100299362A1 (en) 2009-05-24 2010-11-25 Roger Frederick Osmond Method for controlling access to data containers in a computer system
US9047458B2 (en) 2009-06-19 2015-06-02 Deviceauthority, Inc. Network access protection
WO2011022053A1 (en) 2009-08-18 2011-02-24 Errol David Naiman System and methods for device management
US8984657B2 (en) 2009-09-08 2015-03-17 Appcentral, Inc. System and method for remote management of applications downloaded to a personal portable wireless appliance
JP5370131B2 (en) 2009-12-22 2013-12-18 セイコーエプソン株式会社 Image display apparatus and control method
EP2537102A4 (en) 2010-02-15 2017-08-23 Unwired Planet International Limited Scripting/proxy systems, methods and circuit arrangements
US8166106B2 (en) 2010-04-15 2012-04-24 Microsoft Corporation Targeting applications based on mobile operator
US9135434B2 (en) 2010-04-19 2015-09-15 Appcentral, Inc. System and method for third party creation of applications for mobile appliances
CN103262024B (en) 2010-05-09 2015-05-13 思杰系统有限公司 Methods and systems for forcing an application to store data in a secure storage location
US9350708B2 (en) 2010-06-01 2016-05-24 Good Technology Corporation System and method for providing secured access to services
US9558476B2 (en) 2010-07-01 2017-01-31 Good Technology Holdings Limited Method and device for editing workspace data objects
US9576068B2 (en) 2010-10-26 2017-02-21 Good Technology Holdings Limited Displaying selected portions of data sets on display devices
US8566923B2 (en) 2011-02-01 2013-10-22 Rockwell Automation Technologies, Inc. Enhanced organization and automatic navigation of display screens facilitating automation control
US20120246719A1 (en) 2011-03-21 2012-09-27 International Business Machines Corporation Systems and methods for automatic detection of non-compliant content in user actions
US20130045729A1 (en) * 2011-08-17 2013-02-21 Microsoft Corporation Location-based promotion of applications
US8756651B2 (en) 2011-09-27 2014-06-17 Amazon Technologies, Inc. Policy compliance-based secure data access
US8713646B2 (en) 2011-12-09 2014-04-29 Erich Stuntebeck Controlling access to resources on a network
US9705813B2 (en) 2012-02-14 2017-07-11 Airwatch, Llc Controlling distribution of resources on a network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7895296B1 (en) * 2006-12-29 2011-02-22 Google, Inc. Local storage for web based native applications
US20090001006A1 (en) * 2007-06-29 2009-01-01 Gianluca Pardini Integrated suction and draining device for the tank of a dishwashing machine and dishwashing machine including such a device
US20090222880A1 (en) * 2008-03-03 2009-09-03 Tresys Technology, Llc Configurable access control security for virtualization
US20120150577A1 (en) * 2010-12-14 2012-06-14 Microsoft Corporation Meeting lifecycle management
WO2012098596A1 (en) * 2011-01-20 2012-07-26 Nec Corporation Communication system, control device, policy management device, communication method, and program

Also Published As

Publication number Publication date
AU2016256794A1 (en) 2016-12-01
AU2019202689A1 (en) 2019-05-09
EP2898444A2 (en) 2015-07-29
AU2013318418A1 (en) 2015-02-19
EP2898444B1 (en) 2018-01-10
EP2898444A4 (en) 2016-04-27
AU2019202689B2 (en) 2021-02-25
US20130254401A1 (en) 2013-09-26
WO2014046888A2 (en) 2014-03-27
AU2016256794B2 (en) 2019-01-17
EP3301604B1 (en) 2021-03-17
EP3301604A1 (en) 2018-04-04
US9705813B2 (en) 2017-07-11

Similar Documents

Publication Publication Date Title
WO2014046888A3 (en) Controlling distribution of resources on a network
AU2014235181A8 (en) Certificate based profile confirmation
GB201204687D0 (en) Communication privacy
GB2542290A (en) Wireless local area network access
GB201317600D0 (en) Device pinning capability for enterprise cloud service and storage accounts
BR112014018399A8 (en) SOCIAL HOTSPOT
MX2017008742A (en) Methods and systems for managing permissions to access mobile device resources.
EP3252607A4 (en) Network function virtualization management and orchestration device, system, management method, and program
WO2014057347A3 (en) Method and apparatus for automated deployment of geographically distributed applications within a cloud
WO2012145544A3 (en) Device resource sharing for network resource conservation
WO2014025687A3 (en) Systems and methods for provisioning and using multiple trusted security zones on an electronic device
WO2012161435A3 (en) Social information management method and system adapted thereto
WO2014081698A3 (en) Delegate authorization in cloud-based storage system
EP3343364A4 (en) Accelerator virtualization method and apparatus, and centralized resource manager
WO2013044107A3 (en) Authentication procedures for managing mobile device applications
WO2013029051A3 (en) Systems and methods of host-aware resource management involving cluster-based resource pools
WO2011130711A3 (en) Cross-domain identity management for a whitelist-based online secure device privisioning framework
WO2014098884A3 (en) Location-based authentication scheme
NZ721862A (en) Application hosting within a secured framework in a fueling environment
WO2014088438A3 (en) Load balancing in handwritten signature authentification system
WO2014123895A3 (en) Server-initiated paging cycles
WO2015099635A3 (en) Resource classification using resource requests
WO2014210054A3 (en) Managing client access to a plurality of computing systems
WO2013009481A3 (en) Systems and methods for network commerce
MX2017001731A (en) Managing private and public service set utilization.

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13839147

Country of ref document: EP

Kind code of ref document: A2

WWE Wipo information: entry into national phase

Ref document number: 2013839147

Country of ref document: EP

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13839147

Country of ref document: EP

Kind code of ref document: A2

ENP Entry into the national phase

Ref document number: 2013318418

Country of ref document: AU

Date of ref document: 20130906

Kind code of ref document: A