Movatterモバイル変換


[0]ホーム

URL:


US20140108793A1 - Controlling mobile device access to secure data - Google Patents

Controlling mobile device access to secure data
Download PDF

Info

Publication number
US20140108793A1
US20140108793A1US14/039,632US201314039632AUS2014108793A1US 20140108793 A1US20140108793 A1US 20140108793A1US 201314039632 AUS201314039632 AUS 201314039632AUS 2014108793 A1US2014108793 A1US 2014108793A1
Authority
US
United States
Prior art keywords
data
application
mobile device
secure container
policy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/039,632
Inventor
Gary Barton
Zhongmin Lang
Nitin Desai
James Robert Walker
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Citrix Systems Inc
Original Assignee
Citrix Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Citrix Systems IncfiledCriticalCitrix Systems Inc
Priority to US14/039,632priorityCriticalpatent/US20140108793A1/en
Priority to US14/041,911prioritypatent/US8959579B2/en
Assigned to CITRIX SYSTEMS INC.reassignmentCITRIX SYSTEMS INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: BARTON, GARY, DESAI, NITIN, LANG, ZHONGMIN, WALKER, JAMES
Priority to PCT/US2013/063856prioritypatent/WO2014062420A1/en
Priority to EP13780457.1Aprioritypatent/EP2909786B1/en
Priority to CN201380065726.7Aprioritypatent/CN104903910B/en
Publication of US20140108793A1publicationCriticalpatent/US20140108793A1/en
Priority to US14/607,593prioritypatent/US9602474B2/en
Priority to US15/422,761prioritypatent/US9858428B2/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Various aspects of the disclosure relate to providing secure containers or data vaults for data of one or more managed applications. In some embodiments, each managed application may be assigned its own private data vault and/or may be assigned a shared data vault that is accessible to at least one other managed application. As the managed application executes, calls for access to the data may be intercepted and redirected to the secure containers. Data stored in a secure container may be encrypted according to a policy. Other aspects relate to deleting data from a secure container, such as via a selective wipe of data associated with a managed application. Further aspects relate to configuring and creating the secure containers, retrieving key information required to encrypt/decrypt the data stored in the secure containers, and publishing the managed applications, policy information and key information for download to a mobile device.

Description

Claims (20)

We claim:
1. A method, comprising:
intercepting, by a mobile device, a read or write operation from a managed application executing on the mobile device;
accessing, based on the read or write operation, a secure container that is a logical interface into which read or write operations are redirected and in which data is in an encrypted form;
determining to perform a selective wipe of data associated with the managed application;
deleting encrypted data from the secure container; and
transmitting a selective wipe acknowledgement to an access gateway, wherein the acknowledgement includes a listing of secure containers that included data that was deleted during the selective wipe.
2. The method ofclaim 1, wherein the secure container includes a file system and access manager different from an unsecured location of the mobile device and wherein accessing the secure container is managed by a client agent installed on the mobile device.
3. The method ofclaim 1, wherein the secure container is a private data vault that is accessible to only the managed application.
4. The method ofclaim 1, wherein the secure container is a shared data vault that is accessible only to the managed application and one or more other managed applications.
5. The method ofclaim 1, wherein the read or write operation includes a read operation of particular data, and the method further comprises:
retrieving an encrypted form of the particular data from the secure container based on a file system and access manager of the secure container;
decrypting the encrypted form of the particular data, resulting in a decrypted form of the particular data, wherein said decrypting uses a key received via the access gateway through which a resource required by the managed application is accessible; and
providing the decrypted form of the particular data to the managed application.
6. The method ofclaim 1, wherein the read or write operation includes a write operation of particular data, and the method further comprises:
encrypting the particular data, resulting in an encrypted form of the particular data, wherein said encrypting uses a key received via the access gateway through which a resource required by the managed application is accessible; and
providing the encrypted form of the particular data for storage to the secure container, said storage being based on a file system and access manager of the secure container.
7. The method ofclaim 1, further comprising monitoring operating conditions of the mobile device, and wherein determining to perform the selective wipe is based on the operating conditions violating a policy received by the mobile device via the access gateway through which a resource required by the managed application is accessible.
8. The method ofclaim 1, further comprising:
configuring the secure container based on a policy received by the mobile device via the access gateway through which a resource required by the managed application is accessible; and
configuring a policy-aware interception layer to perform said intercepting of the read or write operation.
9. The method ofclaim 1, wherein the secure container is located remotely from the mobile device, and wherein accessing the secure container includes transmitting the read or write operations via an application-specific virtual private network (VPN) tunnel.
10. The method ofclaim 1, wherein the managed application includes a virtualized application, and the encrypted data includes data generated or used by the virtualized application.
11. An apparatus, comprising:
at least one processor; and
memory storing executable instructions configured to, when executed by the at least one processor, cause the apparatus to:
intercept a read or write operation from a managed application executing on the apparatus;
access, based on the read or write operation, a secure container that is a logical interface into which read or write operations are redirected and in which data is in an encrypted form;
determine to perform a selective wipe of data associated with the managed application;
delete encrypted data from the secure container; and
transmit a selective wipe acknowledgement to an access gateway, wherein the acknowledgement includes a listing of secure containers that included data that was deleted during the selective wipe.
12. The apparatus ofclaim 11, wherein the secure container includes a file system and access manager different from an unsecured location of the apparatus and wherein accessing the secure container is managed by a client agent installed on the apparatus.
13. The apparatus ofclaim 11, wherein the secure container is a private data vault that is accessible to only the managed application or is a shared data vault that is accessible only to the managed application and one or more other managed applications.
14. The apparatus ofclaim 11, wherein the read or write operation includes a read operation of particular data, and wherein the executable instructions are configured to, when executed by the at least one processor, further cause the apparatus to:
retrieve an encrypted form of the particular data from the secure container based on a file system and access manager of the secure container;
decrypt the encrypted form of the particular data, resulting in a decrypted form of the particular data, wherein said decrypting uses a key received via the access gateway through which a resource required by the managed application is accessible; and
provide the decrypted form of the particular data to the managed application.
15. The apparatus ofclaim 11, wherein the read or write operation includes a write operation of particular data, and wherein the executable instructions are configured to, when executed by the at least one processor, further cause the apparatus to:
encrypt the particular data, resulting in an encrypted form of the particular data, wherein said encrypting uses a key received via the access gateway through which a resource required by the managed application is accessible; and
provide the encrypted form of the particular data for storage to the secure container, said storage being based on a file system and access manager of the secure container.
16. The apparatus ofclaim 11, wherein the executable instructions are configured to, when executed by the at least one processor, further cause the apparatus to:
configure the secure container based on a policy received by the apparatus via the access gateway through which a resource required by the managed application is accessible; and
configure a policy-aware interception layer to perform said intercepting of the read or write operation; and
monitor operating conditions of the apparatus;
wherein determining to perform the selective wipe is based on the operating conditions violating the policy received.
17. One or more non-transitory computer-readable media storing instructions configured to, when executed, cause at least one computing device to:
intercept a read or write operation from a managed application executing on the at least one computing device;
access, based on the read or write operation, a secure container that is a logical interface into which read or write operations are redirected and in which data is in an encrypted form;
determine to perform a selective wipe of data associated with the managed application;
delete encrypted data from the secure container; and
transmit a selective wipe acknowledgement to an access gateway, wherein the acknowledgement includes a listing of secure containers that included data that was deleted during the selective wipe.
18. The one or more non-transitory computer-readable media ofclaim 17, wherein the instructions are configured to, when executed, further cause said at least one computing device to monitor operating conditions of the at least one computing device; and
wherein determining to perform the selective wipe is based on the operating conditions violating a policy received by the at least one computing device via the access gateway through which a resource required by the managed application is accessible.
19. The one or more non-transitory computer-readable media ofclaim 17, wherein the instructions are configured to, when executed, further cause said at least one computing device to:
configure the secure container based on a policy received by the at least one computing device via the access gateway through which a resource required by the managed application is accessible; and
configure a policy-aware interception layer to perform said intercepting of the read or write operation.
20. The one or more non-transitory computer-readable media ofclaim 17, wherein the read or write operation includes a read operation of particular data, and wherein the instructions are configured to, when executed, further cause said at least one computing device to:
retrieve an encrypted form of the particular data from the secure container based on a file system and access manager of the secure container;
decrypt the encrypted form of the particular data, resulting in a decrypted form of the particular data, wherein said decrypting uses a key received via the access gateway through which a resource required by the managed application is accessible; and
provide the decrypted form of the particular data to the managed application.
US14/039,6322012-10-162013-09-27Controlling mobile device access to secure dataAbandonedUS20140108793A1 (en)

Priority Applications (7)

Application NumberPriority DateFiling DateTitle
US14/039,632US20140108793A1 (en)2012-10-162013-09-27Controlling mobile device access to secure data
US14/041,911US8959579B2 (en)2012-10-162013-09-30Controlling mobile device access to secure data
PCT/US2013/063856WO2014062420A1 (en)2012-10-162013-10-08Controlling mobile device access to secure data
EP13780457.1AEP2909786B1 (en)2012-10-162013-10-08Controlling mobile device access to secure data
CN201380065726.7ACN104903910B (en)2012-10-162013-10-08 Control mobile device access to secure data
US14/607,593US9602474B2 (en)2012-10-162015-01-28Controlling mobile device access to secure data
US15/422,761US9858428B2 (en)2012-10-162017-02-02Controlling mobile device access to secure data

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US201261714293P2012-10-162012-10-16
US201361806577P2013-03-292013-03-29
US201361861910P2013-08-022013-08-02
US14/039,632US20140108793A1 (en)2012-10-162013-09-27Controlling mobile device access to secure data

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US14/041,911ContinuationUS8959579B2 (en)2012-10-162013-09-30Controlling mobile device access to secure data

Publications (1)

Publication NumberPublication Date
US20140108793A1true US20140108793A1 (en)2014-04-17

Family

ID=50476540

Family Applications (4)

Application NumberTitlePriority DateFiling Date
US14/039,632AbandonedUS20140108793A1 (en)2012-10-162013-09-27Controlling mobile device access to secure data
US14/041,911ActiveUS8959579B2 (en)2012-10-162013-09-30Controlling mobile device access to secure data
US14/607,593Expired - Fee RelatedUS9602474B2 (en)2012-10-162015-01-28Controlling mobile device access to secure data
US15/422,761ActiveUS9858428B2 (en)2012-10-162017-02-02Controlling mobile device access to secure data

Family Applications After (3)

Application NumberTitlePriority DateFiling Date
US14/041,911ActiveUS8959579B2 (en)2012-10-162013-09-30Controlling mobile device access to secure data
US14/607,593Expired - Fee RelatedUS9602474B2 (en)2012-10-162015-01-28Controlling mobile device access to secure data
US15/422,761ActiveUS9858428B2 (en)2012-10-162017-02-02Controlling mobile device access to secure data

Country Status (4)

CountryLink
US (4)US20140108793A1 (en)
EP (1)EP2909786B1 (en)
CN (1)CN104903910B (en)
WO (1)WO2014062420A1 (en)

Cited By (74)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20120079609A1 (en)*2010-09-242012-03-29Research In Motion LimitedMethod for establishing a plurality of modes of operation on a mobile device
US20140215636A1 (en)*2013-01-312014-07-31Optim CorporationPortable terminal, document management method, and portable terminal program
US20140282103A1 (en)*2013-03-162014-09-18Jerry Alan CrandallData sharing
US20140325499A1 (en)*2013-04-302014-10-30Vmware, Inc.Static redirection for objective c
US20140366157A1 (en)*2013-06-072014-12-11Apple Inc.Multiple containers assigned to an application
US20150020214A1 (en)*2013-07-112015-01-15Open Text S.A.System and method for access control using network verification
US8984274B1 (en)2013-01-292015-03-17Microstrategy IncorporatedSecure data updates
US20150106904A1 (en)*2013-10-102015-04-16Fujitsu LimitedCommunication terminal and communication processing method
US20150121506A1 (en)*2013-10-242015-04-30Internet Infrastructure Services CorporationMethods of dynamically securing electronic devices and other communications through environmental and system measurements leveraging tailored trustworthy spaces
US20150271207A1 (en)*2014-03-192015-09-24Symantec CorporationSystems and methods for providing targeted data loss prevention on unmanaged computing devices
US20150339484A1 (en)*2014-05-222015-11-26Tata Consultancy Services LimitedAccessing Enterprise Data
US20150358353A1 (en)*2014-06-062015-12-10Microsoft CorporationEnhanced selective wipe for compromised devices
US20150378709A1 (en)*2014-06-272015-12-31International Business Machines CorporationInstallation of Software Applications on Mobile Devices Based on Positions Thereof
US20160044039A1 (en)*2014-08-072016-02-11Alcatel LucentPrivacy-aware personal data store
US20160087993A1 (en)*2014-09-192016-03-24Microsoft CorporationSelectively Managing Datasets
US20160196296A1 (en)*2015-01-022016-07-07KCura CorporationMethods and apparatus for deleting a plurality of documents associated with an electronic document review application
US9436527B2 (en)*2014-12-052016-09-06Sybase, Inc.Memory management of a device accessing applications
US20160307002A1 (en)*2014-06-102016-10-20Tencent Technology (Shenzhen) Company LimitedMethod and apparatus for displaying information content
WO2016022556A3 (en)*2014-08-052017-05-04Openpeak Inc.Method and system for runtime injection of secure applications
WO2017082808A1 (en)*2015-11-112017-05-18Authentico Technologies AbMethod and system for user authentication
US20170147829A1 (en)*2015-11-242017-05-25Bank Of America CorporationReversible Redaction and Tokenization Computing System
US20170147828A1 (en)*2015-11-242017-05-25Bank Of America CorporationReversible Redaction and Tokenization Computing System
US9703572B2 (en)*2015-06-052017-07-11Airwatch LlcManaged application detection logic
WO2017122854A1 (en)*2016-01-152017-07-20(주) 글루시스Home network system based on container virtualization technology
US20170222977A1 (en)*2016-02-012017-08-03Airwatch LlcConfiguring network security based on device management characteristics
US9760359B2 (en)2014-11-182017-09-12International Business Machines CorporationHealthcare as a service—downloadable enterprise application
US20180013729A1 (en)*2016-07-062018-01-11Adp, LlcSecure Application Communication System
US20180062944A1 (en)*2016-09-012018-03-01Cisco Technology, Inc.Api rate limiting for cloud native application
US9917841B1 (en)*2015-07-302018-03-13Sprint Communications Company L.P.Branding and improper operation detection on a user equipment
US9967055B2 (en)2011-08-082018-05-08Blackberry LimitedSystem and method to increase link adaptation performance with multi-level feedback
US20180248915A1 (en)*2013-09-202018-08-30Open Text Sa UlcApplication gateway architecture with multi-level security policy and rule promulgations
US20180348979A1 (en)*2017-06-022018-12-06Oracle International CorporationInter-application sharing
US20190058728A1 (en)*2017-07-312019-02-21Harman International Industries, IncorporatedData protection and security for in-vehicle systems
US10334024B2 (en)*2016-01-202019-06-25Samsung Electronics Co., Ltd.Electronic communication device
US10346628B2 (en)*2015-12-162019-07-09Architecture Technology CorporationMulti-domain application execution management
US10430091B2 (en)2015-08-072019-10-01Samsung Electronics Co., Ltd.Electronic device and method for storing security information thereof
US20190333002A1 (en)*2013-03-132019-10-31Promega CorporationRadio frequency identification system
WO2019215498A1 (en)*2018-05-092019-11-14Lapsechain SaSecure method and system for the delayed sharing of data between a sender user and a plurality of recipient users, with remote creation of a container
WO2019215492A1 (en)*2018-05-092019-11-14Lapsechain SaSecure method for the delayed sharing of data between a sender user and a recipient user, with local creation of a container
WO2019215497A1 (en)*2018-05-092019-11-14Lapsechain SaSecure method for the delayed sharing of data between a sender user and a plurality of recipient users, with local creation of a container
WO2019215495A1 (en)*2018-05-092019-11-14Lapsechain SaSecure method and system for the delayed sharing of data between at least one sender user and at least one recipient user
WO2019215493A1 (en)*2018-05-092019-11-14Lapsechain SaSecure method and system for the delayed sharing of data between a plurality of sender users and a recipient user
WO2019215491A1 (en)*2018-05-092019-11-14Lapsechain SaSecure system and method for the delayed sharing of data between a sender user and a recipient user, with remote creation of a container
WO2019215494A1 (en)*2018-05-092019-11-14Lapsechain SaSecure method and system for the delayed sharing of data between a plurality of sender users and a plurality of recipient users
US10491603B1 (en)*2019-03-072019-11-26Lookout, Inc.Software component substitution based on rule compliance for computing device context
US10516980B2 (en)2015-10-242019-12-24Oracle International CorporationAutomatic redisplay of a user interface including a visualization
US10599486B1 (en)2018-09-212020-03-24Citrix Systems, Inc.Systems and methods for intercepting and enhancing SaaS application calls via embedded browser
US10628580B2 (en)*2016-01-102020-04-21Apple Inc.Containers shared by multiple users of a device
US10664488B2 (en)2014-09-252020-05-26Oracle International CorporationSemantic searches in a business intelligence system
US10699024B2 (en)2014-12-312020-06-30Citrix Systems, Inc.Shared secret vault for applications with single sign on
CN111711612A (en)*2020-05-252020-09-25数篷科技(深圳)有限公司Communication control method, method and device for processing communication request
US10795775B2 (en)*2015-10-292020-10-06Datto, Inc.Apparatuses, methods, and systems for storage and analysis of SaaS data and non-SaaS data for businesses and other organizations
US10798546B1 (en)*2015-06-032020-10-06Airslate, Inc.Method and apparatus for dynamically reconfiguring mobile devices from primary to secondary services based on pushed data
US10824756B2 (en)2013-09-202020-11-03Open Text Sa UlcHosted application gateway architecture with multi-level security policy and rule promulgations
CN112313652A (en)*2018-05-042021-02-02思杰系统有限公司 System and method for providing data loss prevention via embedded browser
US10917587B2 (en)2017-06-022021-02-09Oracle International CorporationImporting and presenting data
US10956593B2 (en)*2018-02-152021-03-23International Business Machines CorporationSharing of data among containers running on virtualized operating systems
US11062299B2 (en)*2017-10-242021-07-13BBPOS LimitedSystem and method for indicating entry of personal identification number
US11102248B2 (en)2013-09-202021-08-24Open Text Sa UlcSystem and method for remote wipe
WO2021173716A1 (en)*2020-02-272021-09-02Virtru CorporationMethods and systems for securing containerized applications
US11303536B2 (en)*2017-04-262022-04-12Vmware, Inc.Simplified cloud-based enterprise mobility management provisioning
US11323445B2 (en)*2019-12-032022-05-03Blackberry LimitedMethods and systems for accessing a network
US11334583B2 (en)2014-09-252022-05-17Oracle International CorporationTechniques for semantic searching
US11388037B2 (en)2016-02-252022-07-12Open Text Sa UlcSystems and methods for providing managed services
US11449815B2 (en)2018-11-082022-09-20Airslate, Inc.Automated electronic document workflows
US20220337409A1 (en)*2021-04-202022-10-20Coinbase Il Rd Ltd.System and method for data encryption using key derivation
US11593075B2 (en)2015-11-032023-02-28Open Text Sa UlcStreamlined fast and efficient application building and customization systems and methods
US11614857B2 (en)2017-06-022023-03-28Oracle International CorporationImporting, interpreting, and presenting data
CN116016666A (en)*2022-12-212023-04-25中盈优创资讯科技有限公司API release realization method and device
US12182789B2 (en)*2019-09-192024-12-31Google LlcApplication and platform for integrating microapps using application programming interfaces (APIs)
US12210596B2 (en)2018-05-092025-01-28Stripe, Inc.Terminal hardware configuration system
US12216673B2 (en)2014-09-252025-02-04Oracle International CorporationTechniques for semantic searching
US12229542B2 (en)2021-10-152025-02-18International Business Machines CorporationDynamic virtual network access
US12327293B2 (en)2013-03-132025-06-10Promega CorporationRadio frequency identification system

Families Citing this family (150)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10511630B1 (en)*2010-12-102019-12-17CellSec, Inc.Dividing a data processing device into separate security domains
WO2012099617A1 (en)2011-01-202012-07-26Box.Net, Inc.Real time notification of activities that occur in a web-based collaboration environment
WO2013009337A2 (en)2011-07-082013-01-17Arnold GoldbergDesktop application for access and interaction with workspaces in a cloud-based content management system and synchronization mechanisms thereof
US9197718B2 (en)2011-09-232015-11-24Box, Inc.Central management and control of user-contributed content in a web-based collaboration environment and management console thereof
US8695060B2 (en)2011-10-102014-04-08Openpeak Inc.System and method for creating secure applications
US9098474B2 (en)2011-10-262015-08-04Box, Inc.Preview pre-generation based on heuristics and algorithmic prediction/assessment of predicted user behavior for enhancement of user experience
US11210610B2 (en)2011-10-262021-12-28Box, Inc.Enhanced multimedia content preview rendering in a cloud content management system
US9773051B2 (en)2011-11-292017-09-26Box, Inc.Mobile platform file and folder selection functionalities for offline access and synchronization
US11232481B2 (en)2012-01-302022-01-25Box, Inc.Extended applications of multimedia content previews in the cloud-based content management system
US9965745B2 (en)2012-02-242018-05-08Box, Inc.System and method for promoting enterprise adoption of a web-based collaboration environment
US9195636B2 (en)2012-03-072015-11-24Box, Inc.Universal file type preview for mobile devices
US9575981B2 (en)2012-04-112017-02-21Box, Inc.Cloud service enabled to handle a set of files depicted to a user as a single file in a native operating system
US9413587B2 (en)2012-05-022016-08-09Box, Inc.System and method for a third-party application to access content within a cloud-based platform
GB2514947B (en)2012-05-042015-06-17Box IncRepository redundancy implementation of a system which incrementally updates clients with events that occured via a cloud-enabled platform
US9691051B2 (en)2012-05-212017-06-27Box, Inc.Security enhancement through application access control
US8914900B2 (en)2012-05-232014-12-16Box, Inc.Methods, architectures and security mechanisms for a third-party application to access content in a cloud-based platform
US9712510B2 (en)2012-07-062017-07-18Box, Inc.Systems and methods for securely submitting comments among users via external messaging applications in a cloud-based platform
GB2505072A (en)2012-07-062014-02-19Box IncIdentifying users and collaborators as search results in a cloud-based system
US9355228B2 (en)2012-07-132016-05-31Angel Secure Networks, Inc.System and method for policy driven protection of remote computing environments
US9794256B2 (en)2012-07-302017-10-17Box, Inc.System and method for advanced control tools for administrators in a cloud-based service
GB2513671A (en)2012-08-272014-11-05Box IncServer side techniques for reducing database workload in implementing selective subfolder synchronization in a cloud-based environment
US9135462B2 (en)2012-08-292015-09-15Box, Inc.Upload and download streaming encryption to/from a cloud-based platform
US9117087B2 (en)*2012-09-062015-08-25Box, Inc.System and method for creating a secure channel for inter-application communication based on intents
US9195519B2 (en)2012-09-062015-11-24Box, Inc.Disabling the self-referential appearance of a mobile application in an intent via a background registration
US9292833B2 (en)2012-09-142016-03-22Box, Inc.Batching notifications of activities that occur in a web-based collaboration environment
US10200256B2 (en)2012-09-172019-02-05Box, Inc.System and method of a manipulative handle in an interactive mobile user interface
US10915492B2 (en)2012-09-192021-02-09Box, Inc.Cloud-based platform enabled with media content indexed for text-based searches and/or metadata extraction
US9959420B2 (en)2012-10-022018-05-01Box, Inc.System and method for enhanced security and management mechanisms for enterprise administrators in a cloud-based environment
US9495364B2 (en)2012-10-042016-11-15Box, Inc.Enhanced quick search features, low-barrier commenting/interactive features in a collaboration platform
US9665349B2 (en)2012-10-052017-05-30Box, Inc.System and method for generating embeddable widgets which enable access to a cloud-based collaboration platform
US10235383B2 (en)2012-12-192019-03-19Box, Inc.Method and apparatus for synchronization of items with read-only permissions in a cloud-based environment
US9396245B2 (en)2013-01-022016-07-19Box, Inc.Race condition handling in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform
US9953036B2 (en)2013-01-092018-04-24Box, Inc.File system monitoring in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform
EP2755151A3 (en)2013-01-112014-09-24Box, Inc.Functionalities, features and user interface of a synchronization client to a cloud-based environment
EP2757491A1 (en)2013-01-172014-07-23Box, Inc.Conflict resolution, retry condition management, and handling of problem files for the synchronization client to a cloud-based platform
US10846074B2 (en)2013-05-102020-11-24Box, Inc.Identification and handling of items to be ignored for synchronization with a cloud-based platform by a synchronization client
US10725968B2 (en)2013-05-102020-07-28Box, Inc.Top down delete or unsynchronization on delete of and depiction of item synchronization with a synchronization client to a cloud-based platform
GB2515192B (en)2013-06-132016-12-14Box IncSystems and methods for synchronization event building and/or collapsing by a synchronization component of a cloud-based platform
US9805050B2 (en)2013-06-212017-10-31Box, Inc.Maintaining and updating file system shadows on a local device by a synchronization client of a cloud-based platform
WO2015026447A2 (en)*2013-07-082015-02-26Openpeak Inc.Method and system for selective application of device policies
US9535924B2 (en)2013-07-302017-01-03Box, Inc.Scalability improvement in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform
WO2015018059A1 (en)*2013-08-092015-02-12Empire Technology Development LlcData cache on cloud platform
US9535909B2 (en)2013-09-132017-01-03Box, Inc.Configurable event-based automation architecture for cloud-based collaboration platforms
US10509527B2 (en)2013-09-132019-12-17Box, Inc.Systems and methods for configuring event-based automation in cloud-based collaboration platforms
US9213684B2 (en)2013-09-132015-12-15Box, Inc.System and method for rendering document in web browser or mobile device regardless of third-party plug-in software
US9471798B2 (en)2013-09-202016-10-18Oracle International CorporationAuthorization policy objects sharable across applications, persistence model, and application-level decision-combining algorithm
US9501315B2 (en)2014-01-102016-11-22Citrix Systems, Inc.Management of unmanaged user accounts and tasks in a multi-account mobile application
US9563445B2 (en)2014-05-052017-02-07Citrix Systems, Inc.Remote assistance for managed mobile devices
US10114945B2 (en)*2014-05-052018-10-30Citrix Systems, Inc.Clock rollback security
US9609019B2 (en)2014-05-072017-03-28Attivo Networks Inc.System and method for directing malicous activity to a monitoring system
US20150326592A1 (en)*2014-05-072015-11-12Attivo Networks Inc.Emulating shellcode attacks
CN103984904A (en)*2014-05-272014-08-13深圳市欧珀通信软件有限公司Method and device for preventing screen locking code of mobile terminal from being cracked
US10530854B2 (en)2014-05-302020-01-07Box, Inc.Synchronization of permissioned content in cloud-based environments
WO2015198336A2 (en)*2014-06-232015-12-30Vaultize Technologies Private LimitedRemotely managed data loss prevention/protection in electronic devices
US20150381610A1 (en)*2014-06-302015-12-31Mcafee, Inc.Location-based data security
US11507663B2 (en)2014-08-112022-11-22Sentinel Labs Israel Ltd.Method of remediating operations performed by a program and system thereof
US9710648B2 (en)2014-08-112017-07-18Sentinel Labs Israel Ltd.Method of malware detection and system thereof
US9894119B2 (en)2014-08-292018-02-13Box, Inc.Configurable metadata-based automation and content classification architecture for cloud-based collaboration platforms
US10038731B2 (en)2014-08-292018-07-31Box, Inc.Managing flow-based interactions with cloud-based shared content
US9232013B1 (en)*2014-09-052016-01-05Openpeak Inc.Method and system for enabling data usage accounting
US9100390B1 (en)2014-09-052015-08-04Openpeak Inc.Method and system for enrolling and authenticating computing devices for data usage accounting
US20160071040A1 (en)2014-09-052016-03-10Openpeak Inc.Method and system for enabling data usage accounting through a relay
US9350818B2 (en)2014-09-052016-05-24Openpeak Inc.Method and system for enabling data usage accounting for unreliable transport communication
US8938547B1 (en)2014-09-052015-01-20Openpeak Inc.Method and system for data usage accounting in a computing device
US10261672B1 (en)*2014-09-162019-04-16Amazon Technologies, Inc.Contextual launch interfaces
US9501269B2 (en)*2014-09-302016-11-22Advanced Micro Devices, Inc.Automatic source code generation for accelerated function calls
WO2016081561A1 (en)*2014-11-202016-05-26Attivo Networks Inc.System and method for directing malicious activity to a monitoring system
US20160267279A1 (en)*2015-03-022016-09-15Cirrus Lender Services, Inc.Web application perpetually encrypted obscured filesystem
US9232078B1 (en)2015-03-162016-01-05Openpeak Inc.Method and system for data usage accounting across multiple communication networks
US10142371B2 (en)2015-04-242018-11-27Oracle International CorporationAuthorization policy customization and authorization policy lockdown
US10171437B2 (en)2015-04-242019-01-01Oracle International CorporationTechniques for security artifacts management
US10104086B2 (en)2015-04-242018-10-16Oracle International CorporationTechniques for fine grained protection of resources in an access management environment
US9992204B2 (en)2015-05-062018-06-05International Business Machines CorporationVirtual machine access control in mobile computing device based on positional range from beacon signal
WO2016177843A1 (en)2015-05-072016-11-10Thanksys NvA security approach for storing credentials for offline use and copy-protected vault content in devices
WO2016179536A1 (en)*2015-05-072016-11-1051 Maps, Inc.Secure container platform for resource access and placement on unmanaged and unsecured devices
US10277601B1 (en)*2015-05-112019-04-30Google LlcSystem and method for recursive propagating application access control
US10699020B2 (en)2015-07-022020-06-30Oracle International CorporationMonitoring and alert services and data encryption management
US9584518B1 (en)*2015-09-092017-02-28Callware Technologies, Inc.Dynamic communications controller
US10157103B2 (en)*2015-10-202018-12-18Veeam Software AgEfficient processing of file system objects for image level backups
US9325742B1 (en)2015-11-202016-04-26International Business Machines CorporationAdding an encryption policy in a streaming environment
US10033704B2 (en)2015-11-292018-07-24International Business Machines CorporationSecuring enterprise data on mobile devices
CN105550577A (en)*2015-12-312016-05-04宇龙计算机通信科技(深圳)有限公司Security control method and system for terminal container
US10282210B2 (en)*2016-06-132019-05-07Huawei Technologies Co., Ltd.System and method for virtual hardware control
US10257197B2 (en)*2016-07-142019-04-09Sap SePrivate data access controls in mobile applications
US20180082053A1 (en)*2016-09-212018-03-22Telefonaktiebolaget Lm Ericsson (Publ)Application token through associated container
US11616812B2 (en)2016-12-192023-03-28Attivo Networks Inc.Deceiving attackers accessing active directory data
US11695800B2 (en)2016-12-192023-07-04SentinelOne, Inc.Deceiving attackers accessing network data
TWI673667B (en)*2017-01-252019-10-01楊建綱 Built-in smart security mobile device
US10404691B2 (en)2017-03-022019-09-03Bank Of America CorporationPreventing unauthorized access to secured information systems using authentication tokens
WO2018226790A1 (en)2017-06-092018-12-13ORock Holdings, LLCSecure network-accessible system for executing remote applications
CN107256362B (en)*2017-06-132020-11-27深信服科技股份有限公司Application-level file system isolation method and device
CN107315966B (en)*2017-06-222020-10-23湖南国科微电子股份有限公司Solid state disk data encryption method and system
US10438006B2 (en)*2017-07-272019-10-08Citrix Systems, Inc.Secure information storage
EP3643040A4 (en)2017-08-082021-06-09SentinelOne, Inc. METHODS, SYSTEMS AND DEVICES FOR DYNAMIC MODELING AND GROUPING OF END POINTS FOR ONBOARD NETWORKING
US10326771B2 (en)2017-10-192019-06-18Sherpas Cyber Security Group, Inc.Secure file transaction system
US10972445B2 (en)*2017-11-012021-04-06Citrix Systems, Inc.Dynamic crypto key management for mobility in a cloud environment
US10956563B2 (en)*2017-11-222021-03-23Aqua Security Software, Ltd.System for securing software containers with embedded agent
US10997283B2 (en)*2018-01-082021-05-04Aqua Security Software, Ltd.System for securing software containers with encryption and embedded agent
US10121020B1 (en)2018-01-192018-11-06Capital One Services, LlcSystems and methods of providing access to secure data
US11470115B2 (en)2018-02-092022-10-11Attivo Networks, Inc.Implementing decoys in a network environment
AU2018409900B2 (en)2018-02-222021-12-02Citrix Systems, Inc.Providing security to mobile devices via image evaluation operations that electronically analyze image data received from cameras of the mobile devices
WO2019174019A1 (en)*2018-03-152019-09-19华为技术有限公司Application program data protection method and terminal
US11256815B2 (en)*2018-06-122022-02-22Western Digital Technologies, Inc.Object storage system with secure object replication
US11792216B2 (en)*2018-06-262023-10-17Suse LlcApplication layer data protection for containers in a containerization environment
US11637694B2 (en)2018-07-162023-04-25Winkk, Inc.Secret material exchange and authentication cryptography operations
US11036876B2 (en)*2018-08-202021-06-15Cisco Technology, Inc.Attribute-based encryption for microservices
US11659003B2 (en)2018-08-302023-05-23International Business Machines CorporationSafe shell container facilitating inspection of a virtual container
US10949569B2 (en)2018-10-172021-03-16International Business Machines CorporationAdaptive on-device storage management across multiple applications
WO2020086657A1 (en)*2018-10-232020-04-30Syzygy Software Labs L.L.C.Method and system for administration and monitoring of a heterogeneous environment comprising hardware and software systems
CN109543389B (en)*2018-12-252020-01-21广州市维腾网络科技有限公司Information protection method and system
CN110008732B (en)*2018-12-292023-02-24创新先进技术有限公司Data association method, device and equipment
US11516205B2 (en)*2019-03-132022-11-29Gigamon Inc.Managing decryption of network flows through a network appliance
US11190512B2 (en)2019-04-172021-11-30Microsoft Technology Licensing, LlcIntegrity attestation of attestation component
US11392467B2 (en)2019-04-172022-07-19Microsoft Technology Licensing, LlcFailover between decentralized identity stores
US11429743B2 (en)2019-04-292022-08-30Microsoft Technology Licensing, LlcLocalization of DID-related claims and data
US11381567B2 (en)2019-04-292022-07-05Microsoft Technology Licensing, LlcExecution of an application within a scope of user-granted permission
US11222137B2 (en)2019-05-032022-01-11Microsoft Technology Licensing, LlcStoring and executing an application in a user's personal storage with user granted permission
US11411959B2 (en)*2019-05-032022-08-09Microsoft Technology Licensing, LlcExecution of application in a container within a scope of user-granted permission
US11003771B2 (en)2019-05-032021-05-11Microsoft Technology Licensing, LlcSelf-help for DID claims
US11310034B2 (en)*2019-05-082022-04-19Citrix Systems, Inc.Systems and methods for securing offline data
EP3973427A4 (en)2019-05-202023-06-21Sentinel Labs Israel Ltd.Systems and methods for executable code detection, automatic feature extraction and position independent code detection
US11409880B2 (en)2019-07-112022-08-09International Business Machines CorporationBlackbox security for containers
GB2592455B (en)*2019-09-232023-10-25Fisher Rosemount Systems IncSecure off-premises access of process control data by a mobile device
US12143419B2 (en)2019-12-102024-11-12Winkk, Inc.Aggregated trust framework
US11588794B2 (en)*2019-12-102023-02-21Winkk, Inc.Method and apparatus for secure application framework and platform
US12132763B2 (en)2019-12-102024-10-29Winkk, Inc.Bus for aggregated trust framework
US12341790B2 (en)2019-12-102025-06-24Winkk, Inc.Device behavior analytics
US12153678B2 (en)2019-12-102024-11-26Winkk, Inc.Analytics with shared traits
US12335399B2 (en)2019-12-102025-06-17Winkk, Inc.User as a password
US11553337B2 (en)2019-12-102023-01-10Winkk, Inc.Method and apparatus for encryption key exchange with enhanced security through opti-encryption channel
TWI735208B (en)*2020-04-202021-08-01宜鼎國際股份有限公司Data protection system and method
US20220159029A1 (en)*2020-11-132022-05-19Cyberark Software Ltd.Detection of security risks based on secretless connection data
US11880482B2 (en)*2020-12-102024-01-23International Business Machines CorporationSecure smart containers for controlling access to data
CN112507329B (en)*2020-12-112024-07-23海信电子科技(武汉)有限公司Safety protection method and device
US11579857B2 (en)2020-12-162023-02-14Sentinel Labs Israel Ltd.Systems, methods and devices for device fingerprinting and automatic deployment of software in a computing network using a peer-to-peer approach
CN112596740B (en)*2020-12-282024-12-17北京千方科技股份有限公司Program deployment method and device
US11895133B2 (en)2021-04-052024-02-06Bank Of America CorporationSystems and methods for automated device activity analysis
US11790076B2 (en)2021-06-032023-10-17International Business Machines CorporationVault password controller for remote resource access authentication
US11843943B2 (en)2021-06-042023-12-12Winkk, Inc.Dynamic key exchange for moving target
US12095751B2 (en)2021-06-042024-09-17Winkk, Inc.Encryption for one-way data stream
US11899782B1 (en)2021-07-132024-02-13SentinelOne, Inc.Preserving DLL hooks
EP4170490A1 (en)*2021-10-192023-04-26Siemens AktiengesellschaftPrioritizing of access from a container entity to a file in a file system resource
US20230214248A1 (en)*2022-01-062023-07-06Red Hat, Inc.Controlling Container Commands Issued In A Distributed Computing Environment
US11606432B1 (en)*2022-02-152023-03-14Accenture Global Solutions LimitedCloud distributed hybrid data storage and normalization
CN114884993B (en)*2022-05-072023-12-22杭州天宽科技有限公司Virtualized android system for enhancing data security
CN115118778B (en)*2022-06-282024-06-07中国农业银行股份有限公司Data processing method, device, equipment and medium
US12438731B2 (en)2022-09-212025-10-07Winkk, Inc.Diophantine system for digital signatures
CN115664797A (en)*2022-10-242023-01-31中国电信股份有限公司Information transmission method, device, equipment and storage medium
CN116956331B (en)*2023-09-182023-12-19中孚安全技术有限公司File system encryption isolation method, system, equipment and medium applied to Linux
CN117573275A (en)*2023-11-142024-02-20中电云计算技术有限公司 A safe reading and writing method and system for trusted container applications based on TrustZone

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090037686A1 (en)*2007-07-302009-02-05Mendonca John JApplication inspection tool for determining a security partition
US20100279652A1 (en)*2009-05-012010-11-04Apple Inc.Remotely Locating and Commanding a Mobile Device
US20120054853A1 (en)*2010-08-242012-03-01International Business Machines CorporationSystems and methods to control device endpoint behavior using personae and policies

Family Cites Families (556)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JPH08263438A (en)1994-11-231996-10-11Xerox CorpDistribution and use control system of digital work and access control method to digital work
US5898830A (en)1996-10-171999-04-27Network Engineering SoftwareFirewall providing enhanced network security and user transparency
US5805803A (en)1997-05-131998-09-08Digital Equipment CorporationSecure web tunnel
US6249866B1 (en)1997-09-162001-06-19Microsoft CorporationEncrypting file system and method
JP3001489B2 (en)1998-01-162000-01-24新潟日本電気ソフトウェア株式会社 TCP / IP communication network browser device
US6151606A (en)1998-01-162000-11-21Visto CorporationSystem and method for using a workspace data manager to access, manipulate and synchronize network data
US6154172A (en)1998-03-312000-11-28Piccionelli; Gregory A.System and process for limiting distribution of information on a communication network based on geographic location
US6219694B1 (en)1998-05-292001-04-17Research In Motion LimitedSystem and method for pushing information from a host system to a mobile data communication device having a shared electronic address
US6480096B1 (en)*1998-07-082002-11-12Motorola, Inc.Method and apparatus for theft deterrence and secure data retrieval in a communication device
US6158010A (en)1998-10-282000-12-05Crosslogix, Inc.System and method for maintaining security in a distributed computer network
US7140005B2 (en)1998-12-212006-11-21Intel CorporationMethod and apparatus to test an instruction sequence
US7130831B2 (en)1999-02-082006-10-31Copyright Clearance Center, Inc.Limited-use browser and security system
US6609198B1 (en)1999-08-052003-08-19Sun Microsystems, Inc.Log-on service providing credential level change without loss of session continuity
SI1212732T1 (en)1999-08-312004-10-31American Express Travel Related Services Company, Inc.Methods and apparatus for conducting electronic transactions
US6356933B2 (en)1999-09-072002-03-12Citrix Systems, Inc.Methods and apparatus for efficiently transmitting interactive application data between a client and a server using markup language
GB2354350B (en)1999-09-172004-03-24Mitel CorpPolicy representations and mechanisms for the control of software
US20030236861A1 (en)2000-03-032003-12-25Johnson Scott C.Network content delivery system with peer to peer processing components
JP4348818B2 (en)2000-03-102009-10-21ソニー株式会社 Data distribution system and method, and data recording medium
EP1134643A3 (en)2000-03-142007-01-17Sony CorporationInformation providing apparatus and method, information processing apparatus and method, program storage medium, program, and information providing system
US6859879B2 (en)2000-05-262005-02-22International Business Machine CorporationMethod and system for secure pervasive access
US7065652B1 (en)2000-06-212006-06-20Aladdin Knowledge Systems, Ltd.System for obfuscating computer code upon disassembly
GB2366691B (en)2000-08-312002-11-06F Secure OyjWireless device management
US7689510B2 (en)2000-09-072010-03-30Sonic SolutionsMethods and system for use in network management of content
US6883098B1 (en)2000-09-202005-04-19International Business Machines CorporationMethod and computer system for controlling access by applications to this and other computer systems
US20020112047A1 (en)2000-12-052002-08-15Rakesh KushwahaSystem and method for wireless data terminal management using general packet radio service network
US20080214300A1 (en)2000-12-072008-09-04IgtMethods for electronic data security and program authentication
US7904468B2 (en)2008-02-272011-03-08Research In Motion LimitedMethod and software for facilitating interaction with a personal information manager application at a wireless communication device
US7640320B2 (en)2001-01-182009-12-29Yahoo! Inc.Method and system for managing digital content, including streaming media
US6732278B2 (en)2001-02-122004-05-04Baird, Iii Leemon C.Apparatus and method for authenticating access to a network resource
US7437429B2 (en)2001-02-132008-10-14Microsoft CorporationSystem and method for providing transparent access to distributed authoring and versioning files including encrypted files
US7502861B1 (en)2001-02-162009-03-10Swsoft Holding, Ltd.System and method for providing services for offline servers using the same network address
US20020120607A1 (en)2001-02-282002-08-29Lumenati, Inc.File sharing system for serving content from a computer
CA2439373A1 (en)2001-03-142002-09-19Nokia CorporationRealization of presence management
US7302571B2 (en)2001-04-122007-11-27The Regents Of The University Of MichiganMethod and system to maintain portable computer data secure and authentication token for use therein
US20020180790A1 (en)2001-05-312002-12-05International Business Machines CorporationSystem and method for encapsulating software components in an application program interface using a proxy object
JP3861625B2 (en)2001-06-132006-12-20ソニー株式会社 Data transfer system, data transfer device, recording device, and data transfer method
US20050198379A1 (en)2001-06-132005-09-08Citrix Systems, Inc.Automatically reconnecting a client across reliable and persistent communication sessions
US6621766B2 (en)2001-08-012003-09-16Fossil, Inc.Flexible timepiece in multiple environments
US8218829B2 (en)2001-08-202012-07-10Polycom, Inc.System and method for using biometrics technology in conferencing
DE60223264T2 (en)2001-08-292008-08-14Research In Motion Ltd., Waterloo SYSTEM AND METHOD FOR ADDRESSING A MOBILE DEVICE IN AN IP-BASED WIRELESS NETWORK
US8560709B1 (en)2004-02-252013-10-15F5 Networks, Inc.System and method for dynamic policy based access over a virtual private network
US7143443B2 (en)2001-10-012006-11-28Ntt Docomo, Inc.Secure sharing of personal devices among different users
US7904392B2 (en)2001-10-252011-03-08Panasonic CorporationContent usage rule management system
US7631084B2 (en)2001-11-022009-12-08Juniper Networks, Inc.Method and system for providing secure access to private networks with client redirection
US7159120B2 (en)2001-11-192007-01-02Good Technology, Inc.Method and system for protecting data within portable electronic devices
US20030103075A1 (en)2001-12-032003-06-05Rosselot Robert CharlesSystem and method for control of conference facilities and equipment
US7950066B1 (en)2001-12-212011-05-24Guardian Data Storage, LlcMethod and system for restricting use of a clipboard application
WO2003060671A2 (en)2002-01-042003-07-24Lab 7 Networks, Inc.Communication security system
JP2003202929A (en)2002-01-082003-07-18Ntt Docomo Inc Delivery method and delivery system
JP4386732B2 (en)2002-01-082009-12-16セブン ネットワークス, インコーポレイテッド Mobile network connection architecture
US7873985B2 (en)2002-01-082011-01-18Verizon Services Corp.IP based security applications using location, port and/or device identifier information
US20030188193A1 (en)2002-03-282003-10-02International Business Machines CorporationSingle sign on for kerberos authentication
JP2003296210A (en)2002-04-032003-10-17Japan Research Institute Ltd Method and apparatus for creating profile setting file
US6804777B2 (en)2002-05-152004-10-12Threatguard, Inc.System and method for application-level virtual private network
US6950825B2 (en)2002-05-302005-09-27International Business Machines CorporationFine grained role-based access to system resources
AU2003238908A1 (en)2002-06-062003-12-22Green Border TechnologiesMethod and system for implementing a secure application execution environment using derived user accounts for internet content
US6946715B2 (en)2003-02-192005-09-20Micron Technology, Inc.CMOS image sensor and method of fabrication
JP4612416B2 (en)2002-08-092011-01-12ヴィスト・コーポレーション System and method for preventing access to data on compromised remote devices
US20060101422A1 (en)2002-08-232006-05-11Daniela Bourges-WaldeggProcessing application data
US7665125B2 (en)2002-09-232010-02-16Heard Robert WSystem and method for distribution of security policies for mobile devices
US7665118B2 (en)2002-09-232010-02-16Credant Technologies, Inc.Server, computer memory, and method to support security policy maintenance and distribution
US7437752B2 (en)2002-09-232008-10-14Credant Technologies, Inc.Client architecture for portable device with security policies
US7536562B2 (en)2002-10-172009-05-19Research In Motion LimitedSystem and method of security function activation for a mobile electronic device
FR2847752B1 (en)2002-11-272006-01-13At & T Corp METHOD AND SYSTEM FOR MANAGING THE EXCHANGE OF FILES ATTACHED TO E-MAIL
US7254831B2 (en)2002-12-042007-08-07Microsoft CorporationSharing a sign-in among software applications having secured features
US8332464B2 (en)2002-12-132012-12-11Anxebusiness Corp.System and method for remote network access
US9237514B2 (en)2003-02-282016-01-12Apple Inc.System and method for filtering access points presented to a user and locking onto an access point
US7353533B2 (en)2002-12-182008-04-01Novell, Inc.Administration of protection of data accessible by a mobile device
US7526800B2 (en)2003-02-282009-04-28Novell, Inc.Administration of protection of data accessible by a mobile device
US7917468B2 (en)2005-08-012011-03-29Seven Networks, Inc.Linking of personal information management data
EP1586998A4 (en)2003-01-202008-07-30Fujitsu Ltd COPYING DEVICE AND METHOD, AND PROGRAM FOR EXECUTING THE METHOD BY A COMPUTER
JP3928561B2 (en)2003-01-232007-06-13ソニー株式会社 Content distribution system, information processing apparatus or information processing method, and computer program
US8020192B2 (en)2003-02-282011-09-13Michael WrightAdministration of protection of data accessible by a mobile device
US9197668B2 (en)2003-02-282015-11-24Novell, Inc.Access control to files based on source information
US7779408B1 (en)2003-03-242010-08-17Sprint Spectrum L.P.Method and system for downloading and managing portable applications on a mobile device
AU2003229299A1 (en)2003-05-142005-01-21Threatguard, Inc.System and method for application-level virtual private network
US7543051B2 (en)2003-05-302009-06-02Borland Software CorporationMethod of non-intrusive analysis of secure and non-secure web application traffic in real-time
AU2003903501A0 (en)2003-07-072003-07-24Commonwealth Scientific And Industrial Research OrganisationA method of forming a reflective authentication device
US20050027862A1 (en)2003-07-182005-02-03Nguyen Tien LeSystem and methods of cooperatively load-balancing clustered servers
US7089594B2 (en)2003-07-212006-08-08July Systems, Inc.Application rights management in a mobile environment
US7574707B2 (en)2003-07-282009-08-11Sap AgInstall-run-remove mechanism
US7349913B2 (en)2003-08-212008-03-25Microsoft CorporationStorage platform for organizing, searching, and sharing data
SE527561C2 (en)2003-09-122006-04-11Secured Email Goeteborg AbElectronic mail transmission method in internet environment, involves storing seed for key generation provided from sender's terminal, in receiver's terminal
US20050076085A1 (en)2003-09-182005-04-07Vulcan Portals Inc.Method and system for managing email attachments for an electronic device
US7492472B2 (en)2003-10-302009-02-17Xerox CorporationMultimedia communications/collaboration hub
US8483227B2 (en)2003-11-202013-07-09International Business Machines CorporationControlling bandwidth reservations method and apparatus
US7415498B2 (en)2003-12-102008-08-19International Business Machines CorporationTime limited collaborative community role delegation policy
EP2184934B1 (en)2003-12-292012-12-05Telefonaktiebolaget L M Ericsson (PUBL)Method and apparatuses for single sign-on access to a service network through an access network
US9224131B2 (en)2003-12-292015-12-29International Business Machines CorporationSystem and method for facilitating collaboration in a shared email repository
US20050172241A1 (en)2004-01-082005-08-04International Business Machines CorporationSystem and method for improved direct system clipboard
US7269605B1 (en)2004-02-132007-09-11Avidian TechnologiesPersonal information manager data synchronization and augmentation
JP4665406B2 (en)2004-02-232011-04-06日本電気株式会社 Access control management method, access control management system, and terminal device with access control management function
US7720461B2 (en)2004-02-262010-05-18Research In Motion LimitedMobile communications device with security features
US20050193222A1 (en)2004-03-012005-09-01Greene William S.Providing secure data and policy exchange between domains in a multi-domain grid by use of a service ecosystem facilitating uses such as supply-chain integration with RIFD tagged items and barcodes
US7599991B2 (en)2004-03-102009-10-06Microsoft CorporationRules interface for implementing message rules on a mobile computing device
US7549048B2 (en)2004-03-192009-06-16Microsoft CorporationEfficient and secure authentication of computing systems
US7509672B1 (en)2004-04-012009-03-24Compuware CorporationCross-platform single sign-on data sharing
CN102355466B (en)2004-04-302016-01-20黑莓有限公司The system and method for deal with data transmission
US7487353B2 (en)2004-05-202009-02-03International Business Machines CorporationSystem, method and program for protecting communication
US7492946B2 (en)2004-05-242009-02-17Michael James ElderSystem, method and computer program for an integrated digital workflow for processing a paper form
US7631360B2 (en)2004-06-122009-12-08Microsoft CorporationHardware protection
JP2006013747A (en)2004-06-242006-01-12Murata Mach LtdElectronic mail server apparatus and electronic mail network system
US8363650B2 (en)2004-07-232013-01-29Citrix Systems, Inc.Method and systems for routing packets from a gateway to an endpoint
US20060048142A1 (en)2004-09-022006-03-02Roese John JSystem and method for rapid response network policy implementation
US20060080432A1 (en)2004-09-032006-04-13Spataro Jared MSystems and methods for collaboration
EP1817686A4 (en)2004-09-132007-12-05Research In Motion LtdEnabling category-based filtering
US8839090B2 (en)2004-09-162014-09-16International Business Machines CorporationSystem and method to capture and manage input values for automatic form fill
DE102004045147A1 (en)2004-09-172006-03-23Fujitsu Ltd., Kawasaki A setting information distribution apparatus, method, program and medium, authentication setting transfer apparatus, method, program and medium, and setting information receiving program
US8463946B2 (en)2004-09-172013-06-11Caterpillar Inc.Method for automatic radio operational mode selection
US7949706B2 (en)2004-09-242011-05-24At&T Intellectual Property I, L.P.Automatic electronic publishing
US7984192B2 (en)2004-09-272011-07-19Citrix Systems, Inc.System and method for assigning unique identifiers to each remote display protocol session established via an intermediary device
JP2006094258A (en)2004-09-272006-04-06Nippon Telegr & Teleph Corp <Ntt> Terminal device, policy enforcement method thereof, and program thereof
US7721328B2 (en)2004-10-012010-05-18Salesforce.Com Inc.Application identity design
US7496954B1 (en)2004-11-222009-02-24Sprint Communications Company L.P.Single sign-on system and method
US20060085826A1 (en)2004-10-182006-04-20Funk James MAggregated program guide for download and view video on demand service
US20090228714A1 (en)2004-11-182009-09-10Biogy, Inc.Secure mobile device with online vault
US20060112428A1 (en)2004-11-232006-05-25Nokia CorporationDevice having a locking feature and a method, means and software for utilizing the feature
JP2006155522A (en)2004-12-012006-06-15Canon Inc WEB browser operation method and operation device
US8478849B2 (en)2004-12-072013-07-02Pure Networks LLC.Network administration tool
US7900201B1 (en)2004-12-212011-03-01Zenprise, Inc.Automated remedying of problems in software application deployments
US20060141985A1 (en)2004-12-232006-06-29Motorola, Inc.Dynamic management for interface access permissions
US7562226B2 (en)2005-01-142009-07-14Citrix Systems, Inc.System and method for permission-based access using a shared account
US7788535B2 (en)2005-01-282010-08-31Nxp B.V.Means and method for debugging
US20060185004A1 (en)2005-02-112006-08-17Samsung Electronics Co., Ltd.Method and system for single sign-on in a network
US20060256739A1 (en)2005-02-192006-11-16Kenneth SeierFlexible multi-media data management
WO2006093917A2 (en)2005-02-282006-09-08Trust DigitalMobile data security system and methods
US7844958B2 (en)2005-03-112010-11-30Aptana, Inc.System and method for creating target byte code
EP1705598A3 (en)2005-03-202007-03-07ActivIdentity (Australia) Pty Ltd.Method and system for providing user access to a secure application
US7697737B2 (en)2005-03-252010-04-13Northrop Grumman Systems CorporationMethod and system for providing fingerprint enabled wireless add-on for personal identification number (PIN) accessible smartcards
US7472375B2 (en)2005-03-292008-12-30Intel CorporationCreating managed code from native code
US7631297B2 (en)2005-04-052009-12-08International Business Machines CorporationAutonomic computing: management agent utilizing action policy for operation
US7571475B2 (en)2005-04-052009-08-04Cisco Technology, Inc.Method and electronic device for triggering zeroization in an electronic device
US7490352B2 (en)2005-04-072009-02-10Microsoft CorporationSystems and methods for verifying trust of executable files
US20060248577A1 (en)2005-04-292006-11-02International Business Machines CorporationUsing SSO processes to manage security credentials in a provisioning management system
KR20080017313A (en)2005-05-192008-02-26퓨전원 인코포레이티드 Remote Cordless Phone Auto Destruction
US20070024646A1 (en)2005-05-232007-02-01Kalle SaarinenPortable electronic apparatus and associated method
US7970386B2 (en)2005-06-032011-06-28Good Technology, Inc.System and method for monitoring and maintaining a wireless device
FR2886801B1 (en)2005-06-072007-08-03Alcatel Sa NETWORK EQUIPMENT FOR PROVIDING MULTI-MODE MOBILE DATA TERMINALS NECESSARY FOR THE AUTOMATIC SELECTION OF RADIO ACCESS NETWORK INTERFACES DURING SERVICE SESSIONS
US7565689B2 (en)2005-06-082009-07-21Research In Motion LimitedVirtual private network for real-time data
US7793333B2 (en)2005-06-132010-09-07International Business Machines CorporationMobile authorization using policy based access control
US8495244B2 (en)2005-06-292013-07-23Jumpstart Wireless CorporationSystem and method for dynamic automatic communication path selection, distributed device synchronization and task delegation
US7529923B2 (en)2005-06-302009-05-05Intel CorporationOperating system mode transfer
US8682979B2 (en)2005-07-012014-03-25Email2 Scp Solutions Inc.Secure electronic mail system
US20070011749A1 (en)2005-07-112007-01-11Simdesk TechnologiesSecure clipboard function
US20070016771A1 (en)2005-07-112007-01-18Simdesk Technologies, Inc.Maintaining security for file copy operations
US20070016907A1 (en)2005-07-122007-01-18Fabio BenedettiMethod, system and computer program for automatic provisioning of resources to scheduled jobs
US9614964B2 (en)2005-08-192017-04-04Nextstep, Inc.Consumer electronic registration, control and support concierge device and method
US9864628B2 (en)2005-08-232018-01-09Blackberry LimitedMethod and system for transferring an application state from a first electronic device to a second electronic device
US20070049297A1 (en)2005-08-292007-03-01Janakiraman GopalanSystem and method for locating mobile devices through a direct-connection protocol
US20070283324A1 (en)2005-08-302007-12-06Geisinger Nile JSystem and method for creating programs that comprise several execution layers
KR100723700B1 (en)2005-08-312007-05-30에스케이 텔레콤주식회사 Method and system for remotely controlling the operation of mobile communication terminal
US7779458B1 (en)2005-09-202010-08-17Rockwell Collins, Inc.Situation aware mobile location ad hoc firewall
US20070072598A1 (en)2005-09-232007-03-29Coleman David TControlling wireless communication devices with media recording capabilities
US20070074033A1 (en)2005-09-292007-03-29Research In Motion LimitedAccount management in a system and method for providing code signing services
GB2430772A (en)2005-10-012007-04-04Knowledge Support Systems LtdUser interface method and apparatus
US7870493B2 (en)2005-10-032011-01-11Microsoft CorporationDistributed clipboard
US8037421B2 (en)2005-10-112011-10-11Research In Motion LimitedSystem and method for organizing application indicators on an electronic device
US8745223B2 (en)2005-10-142014-06-03Psion Inc.System and method of distributed license management
US7437755B2 (en)2005-10-262008-10-14Cisco Technology, Inc.Unified network and physical premises access control server
US20070100938A1 (en)2005-10-272007-05-03Bagley Elizabeth VParticipant-centered orchestration/timing of presentations in collaborative environments
WO2007053848A1 (en)2005-11-012007-05-10Mobile Armor, LlcCentralized dynamic security control for a mobile device network
JPWO2007055206A1 (en)2005-11-082009-04-30シャープ株式会社 COMMUNICATION DEVICE, COMMUNICATION METHOD, COMMUNICATION SYSTEM, PROGRAM, AND COMPUTER-READABLE RECORDING MEDIUM
US20070109983A1 (en)2005-11-112007-05-17Computer Associates Think, Inc.Method and System for Managing Access to a Wireless Network
US20070248085A1 (en)2005-11-122007-10-25Cranite SystemsMethod and apparatus for managing hardware address resolution
US8045958B2 (en)2005-11-212011-10-25Research In Motion LimitedSystem and method for application program operation on a wireless device
TWI405094B (en)2005-11-282013-08-11IbmSystem for preventing unauthorized acquisition of information, and method thereof
US20070136471A1 (en)2005-12-122007-06-14Ip3 NetworksSystems and methods for negotiating and enforcing access to network resources
GB2433794B (en)2005-12-212010-08-18Advanced Risc Mach LtdInterrupt controller utiilising programmable priority values
CN101351804A (en)2005-12-262009-01-21皇家飞利浦电子股份有限公司Method and apparatus for managing entitlement
US8621549B2 (en)2005-12-292013-12-31Nextlabs, Inc.Enforcing control policies in an information management system
US7716240B2 (en)2005-12-292010-05-11Nextlabs, Inc.Techniques and system to deploy policies intelligently
EP1967026A2 (en)2005-12-302008-09-10Telecom Italia S.p.A.Method for customizing the operation of a telephonic terminal
WO2007079499A2 (en)2006-01-042007-07-12Nytor, Inc.Trusted host platform
US20070174429A1 (en)2006-01-242007-07-26Citrix Systems, Inc.Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment
WO2007089503A2 (en)2006-01-262007-08-09Imprivata, Inc.Systems and methods for multi-factor authentication
US8132242B1 (en)2006-02-132012-03-06Juniper Networks, Inc.Automated authentication of software applications using a limited-use token
US7664865B2 (en)2006-02-152010-02-16Microsoft CorporationSecurely hosting a webbrowser control in a managed code environment
US8676973B2 (en)2006-03-072014-03-18Novell Intellectual Property Holdings, Inc.Light-weight multi-user browser
US7725922B2 (en)2006-03-212010-05-25Novell, Inc.System and method for using sandboxes in a managed shell
US20070226225A1 (en)2006-03-222007-09-27Yiu Timothy CMobile collaboration and communication system
US20070226034A1 (en)2006-03-232007-09-27Kyocera Wireless Corp.Wireless communication device meeting scheduler
US7774323B2 (en)2006-03-272010-08-10Sap Portals Israel Ltd.Method and apparatus for delivering managed applications to remote locations
KR101359324B1 (en)2006-03-272014-02-24텔레콤 이탈리아 소시에떼 퍼 아찌오니System for enforcing security policies on mobile communications devices
US9112897B2 (en)2006-03-302015-08-18Advanced Network Technology Laboratories Pte Ltd.System and method for securing a network session
WO2007113709A1 (en)2006-03-302007-10-11Koninklijke Philips Electronics N.V.Method and apparatus for assigning an application to a security restriction
WO2007117636A2 (en)2006-04-062007-10-18Smobile Systems, Inc.Malware detection system and method for comprssed data on mobile platforms
US8151323B2 (en)2006-04-122012-04-03Citrix Systems, Inc.Systems and methods for providing levels of access and action control via an SSL VPN appliance
US8181010B1 (en)2006-04-172012-05-15Oracle America, Inc.Distributed authentication user interface system
US20070261099A1 (en)2006-05-022007-11-08Broussard Scott JConfidential content reporting system and method with electronic mail verification functionality
US8700772B2 (en)2006-05-032014-04-15Cloud Systems, Inc.System and method for automating the management, routing, and control of multiple devices and inter-device connections
US8085891B2 (en)2006-05-292011-12-27Research In Motion LimitedSystem and method for management of mobile device communication
US20080046580A1 (en)2006-06-292008-02-21Nokia CorporationAccount creation system and call processing system
US20080027982A1 (en)2006-07-272008-01-31Ebay Inc.Indefinite caching expiration techniques
JP2008033751A (en)2006-07-312008-02-14Ziosoft IncUpdate method and update system
US8272048B2 (en)2006-08-042012-09-18Apple Inc.Restriction of program process capabilities
US8341747B2 (en)2006-08-082012-12-25International Business Machines CorporationMethod to provide a secure virtual machine launcher
US8234704B2 (en)2006-08-142012-07-31Quantum Security, Inc.Physical access control and security monitoring system utilizing a normalized data format
EP2054830A2 (en)2006-08-172009-05-06Neustar, Inc.System and method for managing domain policy for interconnected communication networks
US8903365B2 (en)2006-08-182014-12-02Ca, Inc.Mobile device management
US20080047006A1 (en)2006-08-212008-02-21Pantech Co., Ltd.Method for registering rights issuer and domain authority in digital rights management and method for implementing secure content exchange functions using the same
US8010995B2 (en)2006-09-082011-08-30International Business Machines CorporationMethods, systems, and computer program products for implementing inter-process integrity serialization
US8245285B1 (en)2006-09-222012-08-14Oracle America, Inc.Transport-level web application security on a resource-constrained device
US8327427B2 (en)2006-09-252012-12-04Rockstar Consortium Us LpSystem and method for transparent single sign-on
JP4959282B2 (en)2006-10-132012-06-20中国電力株式会社 Application operation control system and application operation control method
US9135444B2 (en)2006-10-192015-09-15Novell, Inc.Trusted platform module (TPM) assisted data center management
US8259568B2 (en)2006-10-232012-09-04Mcafee, Inc.System and method for controlling mobile device access to a network
CN101170401B (en)2006-10-272011-02-02鸿富锦精密工业(深圳)有限公司Email encryption/decryption system and its method
US8126128B1 (en)2006-11-012012-02-28At&T Intellectual Property I, LpLife cycle management of user-selected applications on wireless communications devices
US8095786B1 (en)2006-11-092012-01-10Juniper Networks, Inc.Application-specific network-layer virtual private network connections
US8281299B2 (en)2006-11-102012-10-02Purdue Research FoundationMap-closure: a general purpose mechanism for nonstandard interpretation
US8365258B2 (en)2006-11-162013-01-29Phonefactor, Inc.Multi factor authentication
US20080141335A1 (en)2006-12-082008-06-12Novell, Inc.Provisioning software with policy-appropriate capabilities
US9124650B2 (en)2006-12-132015-09-01Quickplay Media Inc.Digital rights management in a mobile environment
JP5070835B2 (en)2006-12-262012-11-14日本電気株式会社 Function limiting method for portable terminal and portable terminal
US8869189B2 (en)2006-12-292014-10-21Echostar Technologies L.L.C.Controlling access to content and/or services
CA2578472C (en)2007-01-122013-01-15Truecontext CorporationMethods and system for orchestrating services and data sharing on mobile devices
JP5133973B2 (en)2007-01-182013-01-30パナソニック株式会社 Obfuscation support device, obfuscation support method, program, and integrated circuit
US8214451B2 (en)2007-01-192012-07-03Alcatel LucentNetwork service version management
EP2122531B1 (en)2007-01-192014-10-01BlackBerry LimitedSelectively wiping a remote device
US8909702B2 (en)2007-01-292014-12-09Fuji Xerox Co., Ltd.System and method for coordination of devices in a presentation environment
US7644377B1 (en)2007-01-312010-01-05Hewlett-Packard Development Company, L.P.Generating a configuration of a system that satisfies constraints contained in models
US8132233B2 (en)2007-02-052012-03-06Hewlett-Packard Development Company, L.P.Dynamic network access control method and apparatus
US8250045B2 (en)2007-02-072012-08-21International Business Machines CorporationNon-invasive usage tracking, access control, policy enforcement, audit logging, and user action automation on software applications
US8095517B2 (en)2007-02-082012-01-10Blue Coat Systems, Inc.Method and system for policy-based protection of application data
US8074227B2 (en)2007-02-082011-12-06Microsoft CorporationUtilizing a first managed process to host at least a second managed process
US7761523B2 (en)2007-02-092010-07-20Research In Motion LimitedSchedulable e-mail filters
US8126506B2 (en)2007-02-142012-02-28Nuance Communications, Inc.System and method for securely managing data stored on mobile devices, such as enterprise mobility data
US8689334B2 (en)2007-02-282014-04-01Alcatel LucentSecurity protection for a customer programmable platform
US20080229117A1 (en)2007-03-072008-09-18Shin Kang GApparatus for preventing digital piracy
JP4973246B2 (en)2007-03-092012-07-11日本電気株式会社 Access right management system, server, and access right management program
WO2008114256A2 (en)2007-03-222008-09-25Neocleus Ltd.Trusted local single sign-on
CN101281461B (en)2007-04-042012-07-04国际商业机器公司Method and device for transfer applying dependent system environment
US8484693B2 (en)2007-04-272013-07-09Gregory W. CoxEfficient policy conflict detection
US20080270240A1 (en)2007-04-302008-10-30Viva ChuSystems and methods of managing tasks assigned to an individual
US10019570B2 (en)2007-06-142018-07-10Microsoft Technology Licensing, LlcProtection and communication abstractions for web browsers
US20080313257A1 (en)2007-06-152008-12-18Allen James DMethod and Apparatus for Policy-Based Transfer of an Application Environment
US8463253B2 (en)2007-06-212013-06-11Verizon Patent And Licensing Inc.Flexible lifestyle portable communications device
US8027518B2 (en)2007-06-252011-09-27Microsoft CorporationAutomatic configuration of devices based on biometric data
US20090006232A1 (en)2007-06-292009-01-01Gallagher Ken ASecure computer and internet transaction software and hardware and uses thereof
EP2031916B1 (en)2007-07-272011-12-21Research In Motion LimitedAdministration of policies for wireless devices in a wireless communication system
DE602008004958D1 (en)2007-07-272011-03-31Research In Motion Ltd Remote control in a wireless communication system
US8060074B2 (en)2007-07-302011-11-15Mobile Iron, Inc.Virtual instance architecture for mobile device management systems
EP2188730A4 (en)2007-08-082014-09-17Innopath Software Inc MANAGEMENT AND APPLICATION OF POLICIES IN MOBILE DEVICES
US20090049425A1 (en)2007-08-142009-02-19Aladdin Knowledge Systems Ltd.Code Obfuscation By Reference Linking
WO2009029296A1 (en)2007-08-312009-03-05At & T Mobility Ii LlcEnhanced messaging with language translation feature
EP2034687B1 (en)2007-09-042012-06-13Research In Motion LimitedSystem and method for processing attachments to messages sent to a mobile device
JP2009070073A (en)2007-09-122009-04-02Sumitomo Electric Ind Ltd Information processing apparatus and agent computer program
US20090077638A1 (en)2007-09-172009-03-19Novell, Inc.Setting and synching preferred credentials in a disparate credential store environment
US8554176B2 (en)2007-09-182013-10-08Qualcomm IncorporatedMethod and apparatus for creating a remotely activated secure backup service for mobile handsets
US8001278B2 (en)2007-09-282011-08-16Intel CorporationNetwork packet payload compression
KR100946824B1 (en)2007-10-312010-03-09(주)피엑스디 Digital broadcast widget system and widget output method
ES2662493T3 (en)2007-11-022018-04-06Qualcomm Incorporated Configurable event and resource arbitration management system
US8659427B2 (en)2007-11-092014-02-25Proxense, LlcProximity-sensor supporting multiple application services
US20090228963A1 (en)2007-11-262009-09-10Nortel Networks LimitedContext-based network security
WO2009076447A1 (en)2007-12-102009-06-18Courion CorporatonPolicy enforcement using esso
US8060596B1 (en)2007-12-262011-11-15Symantec CorporationMethods and systems for normalizing data loss prevention categorization information
US8453198B2 (en)2007-12-272013-05-28Hewlett-Packard Development Company, L.P.Policy based, delegated limited network access management
US8538376B2 (en)2007-12-282013-09-17Apple Inc.Event-based modes for electronic devices
US20090171906A1 (en)2008-01-022009-07-02Research In Motion LimitedSystem and method for providing information relating to an email being provided to an electronic device
US8918865B2 (en)2008-01-222014-12-23Wontok, Inc.System and method for protecting data accessed through a network connection
US20090199277A1 (en)2008-01-312009-08-06Norman James MCredential arrangement in single-sign-on environment
US20090199178A1 (en)2008-02-012009-08-06Microsoft CorporationVirtual Application Management
AU2009214668A1 (en)2008-02-152009-08-20Citrix Systems, Inc.Systems and methods for secure handling of secure attention sequences
JPWO2009104721A1 (en)2008-02-212011-06-23日本電気株式会社 Mobile terminal context efficiency utilization method and system
US20090222880A1 (en)2008-03-032009-09-03Tresys Technology, LlcConfigurable access control security for virtualization
US8078713B1 (en)2008-03-052011-12-13Full Armor CorporationDelivering policy settings with virtualized applications
US8607304B2 (en)2008-03-072013-12-10At&T Mobility Ii LlcSystem and method for policy-enabled mobile service gateway
US20130254660A1 (en)2008-03-132013-09-26Robb FujiokaTablet computer
US9747141B2 (en)2008-03-252017-08-29Qualcomm IncorporatedApparatus and methods for widget intercommunication in a wireless communication environment
WO2009145987A2 (en)2008-03-302009-12-03Symplified, Inc.System, method, and apparatus for single sign-on and managing access to resources across a network
US9576157B2 (en)2008-04-022017-02-21Yougetitback LimitedMethod for mitigating the unauthorized use of a device
US7966652B2 (en)2008-04-072011-06-21Safemashups Inc.Mashauth: using mashssl for efficient delegated authentication
CN101572678B (en)2008-04-302012-09-19北京明朝万达科技有限公司Mail attachment transparent privacy control method
US8156204B2 (en)2008-05-072012-04-10Chalk Media Service Corp.Method for enabling bandwidth management for mobile content delivery
US8549657B2 (en)2008-05-122013-10-01Microsoft CorporationOwner privacy in a shared mobile device
CN101588353B (en)2008-05-212012-09-19闪联信息技术工程中心有限公司Method, system and equipment for sharing files
JP5326363B2 (en)2008-05-302013-10-30株式会社リコー Image forming apparatus, authentication control method, and program
US8250207B2 (en)2009-01-282012-08-21Headwater Partners I, LlcNetwork based ambient services
US8406748B2 (en)2009-01-282013-03-26Headwater Partners I LlcAdaptive ambient services
US8924469B2 (en)2008-06-052014-12-30Headwater Partners I LlcEnterprise access control and accounting allocation for access networks
US8832777B2 (en)2009-03-022014-09-09Headwater Partners I LlcAdapting network policies based on device service processor configuration
US9069599B2 (en)2008-06-192015-06-30Servicemesh, Inc.System and method for a cloud computing abstraction layer with security zone facilities
US8204196B2 (en)2008-06-252012-06-19International Business Machines CorporationNotification to absent teleconference invitees
WO2010011467A1 (en)2008-06-292010-01-28Oceans' Edge, Inc.Mobile telephone firewall and compliance enforcement system and method
JP2011527465A (en)2008-06-302011-10-27モミニス リミテッド Generation and distribution of computer applications
US8156442B2 (en)2008-06-302012-04-10Nokia CorporationLife recorder and sharing
GB2462442A (en)2008-08-062010-02-10Zybert Computing LtdA remote server centrally controls access to data stored in a data container in an encrypted form
US8862672B2 (en)2008-08-252014-10-14Microsoft CorporationContent sharing and instant messaging
CN101350814A (en)2008-08-262009-01-21成都卫士通信息产业股份有限公司Safety remote access technology and gateway thereof
CN101662765B (en)2008-08-292013-08-07深圳富泰宏精密工业有限公司Encryption system and method of short message of mobile telephone
US8365183B2 (en)2008-09-022013-01-29Ca, Inc.System and method for dynamic resource provisioning for job placement
US8238256B2 (en)2008-09-082012-08-07Nugent Raymond MSystem and method for cloud computing
US8387110B1 (en)2010-02-102013-02-26Socialware, Inc.Method, system and computer program product for tagging content on uncontrolled web application
US8763102B2 (en)2008-09-192014-06-24Hewlett-Packard Development Company, L.P.Single sign on infrastructure
US20100083358A1 (en)2008-09-292010-04-01Perfios Software Solutions Pvt. LtdSecure Data Aggregation While Maintaining Privacy
US8528059B1 (en)2008-10-062013-09-03Goldman, Sachs & Co.Apparatuses, methods and systems for a secure resource access and placement platform
US20120137364A1 (en)2008-10-072012-05-31Mocana CorporationRemote attestation of a mobile device
US9836702B2 (en)2008-10-162017-12-05International Business Machines CorporationDigital rights management (DRM)-enabled policy management for an identity provider in a federated environment
US9026918B2 (en)2008-10-162015-05-05Accenture Global Services LimitedEnabling a user device to access enterprise data
EP2345205B1 (en)2008-11-062016-04-27McAfee, Inc.Apparatus and method for mediating connections between policy source servers, corporate repositories, and mobile devices
US20100150341A1 (en)2008-12-172010-06-17David DodgsonStorage security using cryptographic splitting
US20100146582A1 (en)*2008-12-042010-06-10Dell Products L.P.Encryption management in an information handling system
US20100146523A1 (en)2008-12-052010-06-10Tripod Ventures Inc./ Entreprises Tripod Inc.Browser environment application and local file server application system
US8931033B2 (en)2008-12-122015-01-06Microsoft CorporationIntegrating policies from a plurality of disparate management agents
US8245223B2 (en)2008-12-232012-08-14Microsoft CorporationNetworked deployment of multi-application customizations
US8505078B2 (en)2008-12-282013-08-06Qualcomm IncorporatedApparatus and methods for providing authorized device access
US8272030B1 (en)2009-01-212012-09-18Sprint Communications Company L.P.Dynamic security management for mobile communications device
US8856909B1 (en)2009-01-232014-10-07Juniper Networks, Inc.IF-MAP provisioning of resources and services
US20120005724A1 (en)2009-02-092012-01-05Imera Systems, Inc.Method and system for protecting private enterprise resources in a cloud computing environment
US20100228961A1 (en)2009-03-032010-09-09Erf Wireless, Inc.Hierarchical secure networks
US20100228825A1 (en)2009-03-062010-09-09Microsoft CorporationSmart meeting room
US20100235216A1 (en)2009-03-162010-09-16Microsoft CorporationIntegration of pre-meeting and post-meeting experience into a meeting lifecycle
CA2692741C (en)2009-03-312014-04-08Research In Motion LimitedRemote application storage
CN101854340B (en)2009-04-032015-04-01瞻博网络公司Behavior based communication analysis carried out based on access control information
KR20120013968A (en)2009-04-092012-02-15에이지스 모빌리티, 아이엔씨. Contextual mediation
US8660530B2 (en)2009-05-012014-02-25Apple Inc.Remotely receiving and communicating commands to a mobile device for execution by the mobile device
AU2010244945B2 (en)2009-05-052015-01-22Absolute Software CorporationDiscriminating data protection system
CN101888597A (en)2009-05-112010-11-17河北省烟草公司张家口市公司Mobile OA system of mobile phone terminal
EP2251986A1 (en)*2009-05-152010-11-17Nxp B.V.A near field communication device
US20100299152A1 (en)2009-05-202010-11-25Mobile Iron, Inc.Selective Management of Mobile Devices in an Enterprise Environment
US8695058B2 (en)2009-05-202014-04-08Mobile Iron, Inc.Selective management of mobile device data in an enterprise environment
US9858925B2 (en)2009-06-052018-01-02Apple Inc.Using context information to facilitate processing of commands in a virtual assistant
US9183534B2 (en)2009-06-122015-11-10Apple Inc.Devices with profile-based operating mode controls
US9141412B2 (en)2009-06-162015-09-22Microsoft Technology Licensing, LlcTerminal services application virtualization for compatibility
US8254957B2 (en)2009-06-162012-08-28Intel CorporationContext-based limitation of mobile device operation
US9621516B2 (en)2009-06-242017-04-11Vmware, Inc.Firewall configured with dynamic membership sets representing machine attributes
US8407190B2 (en)2009-06-302013-03-26Commvault Systems, Inc.Performing data storage operations with a cloud environment, including containerized deduplication, data pruning, and data transfer
US9386447B2 (en)2009-07-212016-07-05Scott Ferrill TibbittsMethod and system for controlling a mobile communication device
US8281381B2 (en)2009-08-032012-10-02Novell, Inc.Techniques for environment single sign on
US8392386B2 (en)2009-08-052013-03-05International Business Machines CorporationTracking file contents
US8566391B2 (en)2009-08-132013-10-22Hitachi, Ltd.System and method for evaluating application suitability in execution environment
WO2011026530A1 (en)2009-09-072011-03-10Tomtom International B.V.Navigation apparatus and method of supporting hands-free voice communication
US8200626B1 (en)2009-09-182012-06-12Sprint Communications Company L.P.Mobile device file management
US8972878B2 (en)2009-09-212015-03-03Avaya Inc.Screen icon manipulation by context and frequency of Use
JP4527802B2 (en)2009-10-192010-08-18日本電気株式会社 Computer system
US8850423B2 (en)2009-10-292014-09-30International Business Machines CorporationAssisting server migration
US8145199B2 (en)2009-10-312012-03-27BT Patent LLCControlling mobile device functions
EP2334034B1 (en)2009-11-112018-06-27BlackBerry LimitedUsing a trusted token and push for validating the request for single sign on
US8595284B2 (en)2009-12-142013-11-26Samsung Electronics Co., LtdWeb application script migration
US8499304B2 (en)2009-12-152013-07-30At&T Mobility Ii LlcMultiple mode mobile device
US9244533B2 (en)2009-12-172016-01-26Microsoft Technology Licensing, LlcCamera navigation for presentations
US8495746B2 (en)2009-12-182013-07-23Verizon Patent And Licensing Inc.Apparatuses, methods and systems of an application security management platform
US8533780B2 (en)2009-12-222013-09-10Cisco Technology, Inc.Dynamic content-based routing
WO2011091056A1 (en)2010-01-192011-07-28Servicemesh, Inc.System and method for a cloud computing abstraction layer
WO2011103385A1 (en)2010-02-222011-08-25Avaya Inc.Secure, policy-based communications security and file sharing across mixed media, mixed-communications modalities and extensible to cloud computing such as soa
US20110208797A1 (en)2010-02-222011-08-25Full Armor CorporationGeolocation-Based Management of Virtual Applications
US8468455B2 (en)2010-02-242013-06-18Novell, Inc.System and method for providing virtual desktop extensions on a client desktop
US8024469B1 (en)2010-03-052011-09-20Brass Monkey Inc.System and method for connecting network sockets between applications
US9355282B2 (en)2010-03-242016-05-31Red Hat, Inc.Using multiple display servers to protect data
US8433901B2 (en)2010-04-072013-04-30Apple Inc.System and method for wiping encrypted data on a device having file-level content protection
US20110252459A1 (en)2010-04-122011-10-13Walsh Robert EMultiple Server Access Management
US20110314534A1 (en)2010-04-142011-12-22Lee JamesSecured Execution Environments and Methods
US9584624B2 (en)2010-04-152017-02-28Blackberry LimitedMethod and system for transmitting an application to a device
US8555377B2 (en)2010-04-292013-10-08High Cloud SecuritySecure virtual machine
US8805968B2 (en)2010-05-032014-08-12Panzura, Inc.Accessing cached data from a peer cloud controller in a distributed filesystem
US8935384B2 (en)2010-05-062015-01-13Mcafee Inc.Distributed data revocation using data commands
US9282097B2 (en)2010-05-072016-03-08Citrix Systems, Inc.Systems and methods for providing single sign on access to enterprise SAAS and cloud hosted applications
US9461996B2 (en)2010-05-072016-10-04Citrix Systems, Inc.Systems and methods for providing a single click access to enterprise, SAAS and cloud hosted application
WO2011143094A2 (en)2010-05-092011-11-17Citrix Systems, Inc.Systems and methods for allocation of classes of service to network connections corresponding to virtual channels
EP2572338A4 (en)2010-05-212016-04-27Hsbc Technology & Services Usa IncAccount opening computer system architecture and process for implementing same
US20110296333A1 (en)2010-05-252011-12-01Bateman Steven SUser interaction gestures with virtual keyboard
JP2011248683A (en)2010-05-272011-12-08Canon IncCloud computing system, server computer, method for connecting device and program
US8549617B2 (en)2010-06-302013-10-01Juniper Networks, Inc.Multi-service VPN network client for mobile device having integrated acceleration
US8458787B2 (en)2010-06-302013-06-04Juniper Networks, Inc.VPN network client for mobile device having dynamically translated user home page
US8127350B2 (en)2010-06-302012-02-28Juniper Networks, Inc.Multi-service VPN network client for mobile device
US10142292B2 (en)2010-06-302018-11-27Pulse Secure LlcDual-mode multi-service VPN network client for mobile device
US9560036B2 (en)2010-07-082017-01-31International Business Machines CorporationCross-protocol federated single sign-on (F-SSO) for cloud enablement
US8429674B2 (en)2010-07-202013-04-23Apple Inc.Maintaining data states upon forced exit
US8474017B2 (en)2010-07-232013-06-25Verizon Patent And Licensing Inc.Identity management and single sign-on in a heterogeneous composite service scenario
JP5732767B2 (en)2010-07-262015-06-10富士通株式会社 PROCESSING DEVICE, PROCESSING METHOD, PROCESSING PROGRAM, COMPUTER-READABLE RECORDING MEDIUM CONTAINING THE PROGRAM
WO2012016091A2 (en)2010-07-282012-02-02Nextlabs, Inc.Protecting documents using policies and encryption
EP2599001A4 (en)2010-07-282013-07-31Admiemobile LlcSystems and methods for establishing and maintaining virtual computing clouds
US8539245B2 (en)2010-08-062013-09-17Intel CorporationApparatus and method for accessing a secure partition in non-volatile storage by a host system enabled after the system exits a first instance of a secure mode
US9936333B2 (en)2010-08-102018-04-03Microsoft Technology Licensing, LlcLocation and contextual-based mobile application promotion and delivery
US8739157B2 (en)2010-08-262014-05-27Adobe Systems IncorporatedSystem and method for managing cloud deployment configuration of an application
US9421460B2 (en)2010-08-312016-08-23Sony Interactive Entertainment Inc.Offline Progress of console game via portable device
US20120066691A1 (en)2010-09-142012-03-15Paul Keith BrantonPrivate application clipboard
US9582673B2 (en)2010-09-272017-02-28Microsoft Technology Licensing, LlcSeparation of duties checks from entitlement sets
US8958780B2 (en)2010-10-072015-02-17Blackberry LimitedProvisioning based on application and device capability
JP5620781B2 (en)2010-10-142014-11-05キヤノン株式会社 Information processing apparatus, control method thereof, and program
US20120110317A1 (en)2010-10-292012-05-03Verizon Patent And Licensing Inc.Content download manager
EP2638465A2 (en)2010-11-092013-09-18Openpeak Inc.Communication devices, networks, services and accompanying methods
US20120131116A1 (en)2010-11-152012-05-24Van Quy TuControlling data transfer on mobile devices
US8869307B2 (en)2010-11-192014-10-21Mobile Iron, Inc.Mobile posture-based policy, remediation and access control for enterprise resources
US8359016B2 (en)2010-11-192013-01-22Mobile Iron, Inc.Management of mobile applications
KR20120057734A (en)2010-11-222012-06-07삼성전자주식회사Server, device accessing server and control method
US9219744B2 (en)2010-12-082015-12-22At&T Intellectual Property I, L.P.Mobile botnet mitigation
US8918834B1 (en)2010-12-172014-12-23Amazon Technologies, Inc.Creating custom policies in a remote-computing environment
US8650620B2 (en)2010-12-202014-02-11At&T Intellectual Property I, L.P.Methods and apparatus to control privileges of mobile device applications
US8856950B2 (en)2010-12-212014-10-07Lg Electronics Inc.Mobile terminal and method of managing information therein including first operating system acting in first mode and second operating system acting in second mode
AU2011202837B2 (en)2010-12-212013-08-22Lg Electronics Inc.Mobile terminal and method of controlling a mode switching therein
US9110743B2 (en)2010-12-212015-08-18Microsoft Technology Licensing, LlcExtensible system action for sharing while remaining in context
AU2011202840B2 (en)2010-12-212014-04-17Lg Electronics Inc.Mobile terminal and method of controlling a mode switching therein
AU2011202838B2 (en)2010-12-212014-04-10Lg Electronics Inc.Mobile terminal and method of controlling a mode screen display therein
AU2011202832B2 (en)2010-12-212013-01-24Lg Electronics Inc.Mobile terminal and method of controlling a mode switching therein
EP2469404B1 (en)2010-12-222018-04-18Lg Electronics Inc.Mobile terminal and method of displaying information in accordance with a plurality of modes of use
US9178981B2 (en)2010-12-222015-11-03Lg Electronics Inc.Mobile terminal and method of sharing information therein
US8898487B2 (en)2010-12-272014-11-25Microsoft CorporationPower management via coordination and selective operation of timer-related tasks
US8931037B2 (en)2010-12-272015-01-06Microsoft CorporationPolicy-based access to virtualized applications
JP5017462B2 (en)2010-12-272012-09-05株式会社東芝 Information processing apparatus and removable media management method
US20120174237A1 (en)2010-12-312012-07-05Openpeak Inc.Location aware self-locking system and method for a mobile device
CN102591802A (en)2011-01-052012-07-18广州市国迈科技有限公司USB flash disk with stored files openable while irreproducible
US20120179909A1 (en)2011-01-062012-07-12Pitney Bowes Inc.Systems and methods for providing individual electronic document secure storage, retrieval and use
US9612855B2 (en)2011-01-102017-04-04International Business Machines CorporationVirtual machine migration based on the consent by the second virtual machine running of the target host
US9172766B2 (en)2011-01-102015-10-27Fiberlink Communications CorporationSystem and method for extending cloud services into the customer premise
US8898793B2 (en)2011-01-142014-11-25Nokia CorporationMethod and apparatus for adjusting context-based factors for selecting a security policy
US20120198570A1 (en)2011-02-012012-08-02Bank Of America CorporationGeo-Enabled Access Control
US8806569B2 (en)2011-02-072014-08-12Tufin Software Technologies Ltd.Method and system for analyzing security ruleset by generating a logically equivalent security rule-set
US10003672B2 (en)2011-02-092018-06-19Cisco Technology, Inc.Apparatus, systems and methods for deployment of interactive desktop applications on distributed infrastructures
US8549656B2 (en)2011-02-112013-10-01Mocana CorporationSecuring and managing apps on a device
US20120209949A1 (en)2011-02-142012-08-16Alexandros DeliyannisMethods and apparatus to monitor media content
US9544396B2 (en)2011-02-232017-01-10Lookout, Inc.Remote application installation and control for a mobile device
KR20120096983A (en)2011-02-242012-09-03삼성전자주식회사Malware detection method and mobile terminal therefor
WO2012118610A1 (en)2011-02-282012-09-07Siemens Enterprise Communications Gmbh & Co. KgApparatus and mechanism for dynamic assignment of survivability services to mobile devices
US20120233130A1 (en)2011-03-112012-09-13Nagarajan VedachalamSystem and method for archiving emails
US20120238206A1 (en)2011-03-142012-09-20Research In Motion LimitedCommunications device providing near field communication (nfc) secure element disabling features related methods
US8548443B2 (en)2011-03-162013-10-01Dell Products L.P.System and method for selectively restricting portable information handling system features
US9119017B2 (en)*2011-03-182015-08-25Zscaler, Inc.Cloud based mobile device security and policy enforcement
US8955142B2 (en)2011-03-212015-02-10Mocana CorporationSecure execution of unsecured apps on a device
US8812868B2 (en)2011-03-212014-08-19Mocana CorporationSecure execution of unsecured apps on a device
US8769305B2 (en)2011-03-212014-07-01Moncana CorporationSecure execution of unsecured apps on a device
WO2012128682A1 (en)2011-03-222012-09-27Telefonaktiebolaget L M Ericsson (Publ)Methods for exchanging user profile, profile mediator device, agents, computer programs and computer program products
US20120246191A1 (en)2011-03-242012-09-27True XiongWorld-Wide Video Context Sharing
US20120250106A1 (en)2011-03-302012-10-04Infosys Technologies Ltd.Method, device and system for updating an application on a mobile device
US20120254768A1 (en)2011-03-312012-10-04Google Inc.Customizing mobile applications
US8458802B2 (en)2011-04-022013-06-04Intel CorporationMethod and device for managing digital usage rights of documents
WO2012138804A2 (en)2011-04-042012-10-11Nextlabs, Inc.Protecting information using policies and encryption
KR20120118819A (en)2011-04-192012-10-29엘지전자 주식회사Mobile terminal and system for managing applications using the same
EP2523107B1 (en)2011-04-192018-11-07LG Electronics Inc.Mobile terminal and system for managing applications using the same
US9817677B2 (en)2011-04-222017-11-14Microsoft Technologies Licensing, LLCRule based data driven validation
US10187494B2 (en)2011-04-262019-01-22Acumera, Inc.Gateway device application development system
US9094400B2 (en)2011-04-272015-07-28International Business Machines CorporationAuthentication in virtual private networks
US9072972B2 (en)2011-04-282015-07-07Numecent Holdings LtdApplication distribution network
US8738772B2 (en)2011-05-022014-05-27Mitel Networks CorporationRegulating use of a mobile computing device for a user at a selected location
US8683556B2 (en)2011-05-042014-03-25Apple Inc.Electronic devices having adaptive security profiles and methods for selecting the same
US8839395B2 (en)2011-05-132014-09-16Cch IncorporatedSingle sign-on between applications
US9037723B2 (en)2011-05-312015-05-19Red Hat, Inc.Triggering workload movement based on policy stack having multiple selectable inputs
AU2012261972A1 (en)2011-06-012014-01-09Security First Corp.Systems and methods for secure distributed storage
US8578443B2 (en)2011-06-012013-11-05Mobileasap, Inc.Real-time mobile application management
KR101978180B1 (en)2011-06-092019-05-14삼성전자주식회사Method and system for controlling user experience with an application on a client device
US20120324568A1 (en)2011-06-142012-12-20Lookout, Inc., A California CorporationMobile web protection
US10333711B2 (en)2011-06-172019-06-25Microsoft Technology Licensing, LlcControlling access to protected objects
US20120331527A1 (en)2011-06-222012-12-27TerraWi, Inc.Multi-layer, geolocation-based network resource access and permissions
US8843998B2 (en)2011-06-272014-09-23Cliqr Technologies, Inc.Apparatus, systems and methods for secure and selective access to services in hybrid public-private infrastructures
KR101801577B1 (en)2011-06-282017-11-27엘지전자 주식회사Mobile terminal and Method for controlling display thereof
KR101819506B1 (en)2011-06-282018-01-17엘지전자 주식회사Mobile terminal and Method for controlling display thereof
EP2727042B1 (en)2011-07-012016-04-06Fiberlink Communications CorporationRules based actions for mobile device management
KR101844289B1 (en)2011-07-062018-04-02삼성전자 주식회사Method and apparatus for managing security of mobile terminal based on location information in mobile communication system
US20130014267A1 (en)2011-07-072013-01-10Farrugia Augustin JComputer protocol generation and obfuscation
WO2013006844A1 (en)2011-07-072013-01-10Cisco Technology, Inc.System and method for providing a message and an event based video services control plane
US8756665B2 (en)2011-07-082014-06-17International Business Machines CorporationAuthenticating a rich client from within an existing browser session
US8719919B2 (en)2011-07-122014-05-06Bank Of America CorporationService mediation framework
US9015320B2 (en)2011-07-122015-04-21Bank Of America CorporationDynamic provisioning of service requests
US9369307B2 (en)2011-07-122016-06-14Bank Of America CorporationOptimized service integration
US20130024928A1 (en)2011-07-222013-01-24Robert James BurkeSecure network communications for meters
US9424144B2 (en)2011-07-272016-08-23Microsoft Technology Licensing, LlcVirtual machine migration to minimize packet loss in virtualized network
US9942385B2 (en)2011-08-042018-04-10International Business Machines CorporationSystem and method for preventing and/or limiting use of a mobile device
US9171139B2 (en)2011-08-052015-10-27Vmware, Inc.Lock screens to access work environments on a personal mobile device
US9065826B2 (en)2011-08-082015-06-23Microsoft Technology Licensing, LlcIdentifying application reputation based on resource accesses
US8949929B2 (en)2011-08-102015-02-03Qualcomm IncorporatedMethod and apparatus for providing a secure virtual environment on a mobile device
US8738868B2 (en)2011-08-232014-05-27Vmware, Inc.Cooperative memory resource management for virtualized computing devices
KR20130023656A (en)2011-08-292013-03-08주식회사 팬택Portable multifunction device and method for controlling permission of application
US8898459B2 (en)2011-08-312014-11-25At&T Intellectual Property I, L.P.Policy configuration for mobile device applications
US20130059284A1 (en)2011-09-072013-03-07Teegee, LlcInteractive electronic toy and learning device system
US10063430B2 (en)2011-09-092018-08-28Cloudon Ltd.Systems and methods for workspace interaction with cloud-based applications
CN104185844B (en)2011-09-092018-06-05石器公司Key sharing method and device based on Remote Desktop Protocol
US9652738B2 (en)2011-09-142017-05-16Avaya Inc.System and method for a communication session identifier
US10165007B2 (en)2011-09-152018-12-25Microsoft Technology Licensing, LlcSecuring data usage in computing devices
US8825863B2 (en)2011-09-202014-09-02International Business Machines CorporationVirtual machine placement within a server farm
US8554179B2 (en)2011-09-232013-10-08Blackberry LimitedManaging mobile device applications
US9451451B2 (en)2011-09-302016-09-20Tutela Technologies Ltd.System for regulating wireless device operations in wireless networks
US8806639B2 (en)2011-09-302014-08-12Avaya Inc.Contextual virtual machines for application quarantine and assessment method and system
US9544158B2 (en)2011-10-052017-01-10Microsoft Technology Licensing, LlcWorkspace collaboration via a wall-type computing device
US8682973B2 (en)2011-10-052014-03-25Microsoft CorporationMulti-user and multi-device collaboration
US9131147B2 (en)2011-10-072015-09-08Fuji Xerox Co., Ltd.System and method for detecting and acting on multiple people crowding a small display for information sharing
US8695060B2 (en)*2011-10-102014-04-08Openpeak Inc.System and method for creating secure applications
US8402011B1 (en)2011-10-102013-03-19Google Inc.System and method for managing user web browsing information
US8239918B1 (en)2011-10-112012-08-07Google Inc.Application marketplace administrative controls
US20140032733A1 (en)2011-10-112014-01-30Citrix Systems, Inc.Policy-Based Application Management
US9137262B2 (en)2011-10-112015-09-15Citrix Systems, Inc.Providing secure mobile device access to enterprise resources using application tunnels
US20140040979A1 (en)2011-10-112014-02-06Citrix Systems, Inc.Policy-Based Application Management
US9280377B2 (en)2013-03-292016-03-08Citrix Systems, Inc.Application with multiple operation modes
US9043480B2 (en)2011-10-112015-05-26Citrix Systems, Inc.Policy-based application management
US8971842B2 (en)2011-10-122015-03-03Verizon Patent And Licensing Inc.Enterprise mobile application store
US20130097660A1 (en)2011-10-172013-04-18Mcafee, Inc.System and method for whitelisting applications in a mobile network environment
US20130097296A1 (en)2011-10-182013-04-18Telefonaktiebolaget L M Ericsson (Publ)Secure cloud-based virtual machine migration
KR101834995B1 (en)2011-10-212018-03-07삼성전자주식회사Method and apparatus for sharing contents between devices
US8789179B2 (en)2011-10-282014-07-22Novell, Inc.Cloud protection techniques
US10291658B2 (en)2011-11-092019-05-14Microsoft Technology Licensing, LlcTechniques to apply and share remote policies on mobile devices
US9106650B2 (en)2011-11-092015-08-11Microsoft Technology Licensing, LlcUser-driven access control
US8990558B2 (en)*2011-11-092015-03-24Safer Point LtdSecuring information in a cloud computing system
WO2013070126A1 (en)2011-11-102013-05-16Telefonaktiebolaget L M Ericsson (Publ)Policy controlled preload and consumption of software application
US8688768B2 (en)2011-11-182014-04-01Ca, Inc.System and method for hand-offs in cloud environments
US8893261B2 (en)2011-11-222014-11-18Vmware, Inc.Method and system for VPN isolation using network namespaces
US8667579B2 (en)2011-11-292014-03-04Genband Us LlcMethods, systems, and computer readable media for bridging user authentication, authorization, and access between web-based and telecom domains
US9143943B2 (en)2011-11-292015-09-22Dell Products L.P.Mode sensitive networking
US20130144934A1 (en)2011-12-012013-06-06Microsoft CorporationWeb Content Targeting Based on Client Application Availability
US9100854B2 (en)2011-12-062015-08-04T-Mobile Usa, Inc.Quality of service application controller and user equipment application profiler
US8935375B2 (en)2011-12-122015-01-13Microsoft CorporationIncreasing availability of stateful applications
US20130171967A1 (en)2012-01-042013-07-04Ayman S. AshourProviding Secure Execution of Mobile Device Workflows
US8863298B2 (en)2012-01-062014-10-14Mobile Iron, Inc.Secure virtual file management system
US9507630B2 (en)2012-02-092016-11-29Cisco Technology, Inc.Application context transfer for distributed computing resources
US9037897B2 (en)2012-02-172015-05-19International Business Machines CorporationElastic cloud-driven task execution
US8793344B2 (en)2012-02-172014-07-29Oracle International CorporationSystem and method for generating a response plan for a hypothetical event
US8918881B2 (en)2012-02-242014-12-23Appthority, Inc.Off-device anti-malware protection for mobile devices
US9323563B2 (en)2012-02-282016-04-26Red Hat Israel, Ltd.Determining virtual machine migration in view of a migration rule
US9047107B2 (en)2012-02-292015-06-02Red Hat, Inc.Applying a custom security type label to multi-tenant applications of a node in a platform-as-a-service environment
US9529993B2 (en)2012-03-022016-12-27International Business Machines CorporationPolicy-driven approach to managing privileged/shared identity in an enterprise
EP2661095A4 (en)2012-03-052015-07-22Mtek C & K Co LtdMethod and apparatus for controlling automatic interworking of multiple devices
US20130237152A1 (en)2012-03-092013-09-12Kulveer TaggarMethods and systems for hardware and software related to a near field communications task launcher
US9027076B2 (en)2012-03-232015-05-05Lockheed Martin CorporationMethod and apparatus for context aware mobile security
US20130254262A1 (en)2012-03-262013-09-26Quickmobile Inc.System and method for a user to dynamically update a mobile application from a generic or first application within a class of applications to create a specific or second application with said class of applications
US20130260730A1 (en)2012-03-282013-10-03Enterproid Hk LtdCustom application container for mobile operating systems and/or devices
US9319286B2 (en)2012-03-302016-04-19Cognizant Business Services LimitedApparatus and methods for managing applications in multi-cloud environments
US20130263208A1 (en)2012-04-022013-10-03Narsimha Reddy ChallaManaging virtual machines in a cloud computing system
US20130268676A1 (en)2012-04-062013-10-10Telefonaktiebolaget L M Ericsson (Publ)Application programming interface routing system and method of operating the same
US20130283335A1 (en)2012-04-192013-10-24AppSense, Inc.Systems and methods for applying policy wrappers to computer applications
US9253209B2 (en)2012-04-262016-02-02International Business Machines CorporationPolicy-based dynamic information flow control on mobile devices
US9626526B2 (en)2012-04-302017-04-18Ca, Inc.Trusted public infrastructure grid cloud
US9112918B2 (en)2012-04-302015-08-18Verizon Patent And Licensing Inc.Multi-mode user device and network-based control and monitoring
US20130297604A1 (en)2012-05-012013-11-07Research In Motion LimitedElectronic device and method for classification of communication data objects
US8990948B2 (en)2012-05-012015-03-24Taasera, Inc.Systems and methods for orchestrating runtime operational integrity
US9405723B2 (en)2012-05-022016-08-02Kony, Inc.Mobile application management systems and methods thereof
US8990901B2 (en)2012-05-052015-03-24Citrix Systems, Inc.Systems and methods for network filtering in VPN
US9215553B2 (en)2012-05-112015-12-15Rowles Holdings, LlcAutomatic determination of and reaction to mobile user routine behavior based on geographical and repetitive pattern analysis
US20130311597A1 (en)2012-05-162013-11-21Apple Inc.Locally backed cloud-based storage
US8849904B2 (en)2012-05-172014-09-30Cloudflare, Inc.Incorporating web applications into web pages at the network level
US9300570B2 (en)2012-05-222016-03-29Harris CorporationMulti-tunnel virtual private network
KR101874081B1 (en)2012-06-072018-07-03에스케이테크엑스 주식회사Cloud Service Supporting Method And System based on a Enhanced Security
US20130347130A1 (en)2012-06-082013-12-26BlueboxMethods and apparatus for dynamically providing modified versions of electronic device applications
US20140007215A1 (en)2012-06-152014-01-02Lockheed Martin CorporationMobile applications platform
US9792585B2 (en)2012-06-212017-10-17Google Inc.Mobile application management
US9240977B2 (en)2012-07-112016-01-19Netiq CorporationTechniques for protecting mobile applications
US9053304B2 (en)2012-07-132015-06-09Securekey Technologies Inc.Methods and systems for using derived credentials to authenticate a device across multiple platforms
US9032506B2 (en)2012-08-092015-05-12Cisco Technology, Inc.Multiple application containerization in a single container
US20140047413A1 (en)2012-08-092014-02-13Modit, Inc.Developing, Modifying, and Using Applications
US9087191B2 (en)2012-08-242015-07-21Vmware, Inc.Method and system for facilitating isolated workspace for applications
US8850434B1 (en)2012-09-142014-09-30Adaptive Computing Enterprises, Inc.System and method of constraining auto live migration of virtual machines using group tags
US9507949B2 (en)2012-09-282016-11-29Intel CorporationDevice and methods for management and access of distributed data sources
US20140108558A1 (en)2012-10-122014-04-17Citrix Systems, Inc.Application Management Framework for Secure Data Sharing in an Orchestration Framework for Connected Devices
US20140109176A1 (en)2012-10-152014-04-17Citrix Systems, Inc.Configuring and providing profiles that manage execution of mobile applications
CN104854561B (en)2012-10-162018-05-11思杰系统有限公司 Application wrapper for application management framework
US9355253B2 (en)2012-10-182016-05-31Broadcom CorporationSet top box architecture with application based security definitions
US8875304B2 (en)2012-11-082014-10-28International Business Machines CorporationApplication and data removal system
US20140149599A1 (en)2012-11-292014-05-29Ricoh Co., Ltd.Unified Application Programming Interface for Communicating with Devices and Their Clouds
US9326145B2 (en)2012-12-162016-04-26Aruba Networks, Inc.System and method for application usage controls through policy enforcement
US9535674B2 (en)2012-12-212017-01-03Bmc Software, Inc.Application wrapping system and method
US8910262B2 (en)2012-12-212014-12-09Cellco PartnershipSupporting multiple messaging services on mobile devices in a single user experience
US9374369B2 (en)2012-12-282016-06-21Lookout, Inc.Multi-factor authentication and comprehensive login system for client-server networks
US9094445B2 (en)2013-03-152015-07-28Centripetal Networks, Inc.Protecting networks from cyber attacks and overloading
US10284627B2 (en)2013-03-292019-05-07Citrix Systems, Inc.Data management for an application with multiple operation modes
US9413736B2 (en)2013-03-292016-08-09Citrix Systems, Inc.Providing an enterprise application store
US9455886B2 (en)2013-03-292016-09-27Citrix Systems, Inc.Providing mobile device management functionalities
US9355223B2 (en)2013-03-292016-05-31Citrix Systems, Inc.Providing a managed browser
TWI499932B (en)2013-07-172015-09-11Ind Tech Res InstMethod for application management, corresponding system, and user device
US9356895B2 (en)2014-05-072016-05-31Mitake Information CorporationMessage transmission system and method for a structure of a plurality of organizations

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090037686A1 (en)*2007-07-302009-02-05Mendonca John JApplication inspection tool for determining a security partition
US20100279652A1 (en)*2009-05-012010-11-04Apple Inc.Remotely Locating and Commanding a Mobile Device
US20120054853A1 (en)*2010-08-242012-03-01International Business Machines CorporationSystems and methods to control device endpoint behavior using personae and policies

Cited By (142)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20120079609A1 (en)*2010-09-242012-03-29Research In Motion LimitedMethod for establishing a plurality of modes of operation on a mobile device
US9531731B2 (en)2010-09-242016-12-27Blackberry LimitedMethod for establishing a plurality of modes of operation on a mobile device
US9147085B2 (en)*2010-09-242015-09-29Blackberry LimitedMethod for establishing a plurality of modes of operation on a mobile device
US9967055B2 (en)2011-08-082018-05-08Blackberry LimitedSystem and method to increase link adaptation performance with multi-level feedback
US8984274B1 (en)2013-01-292015-03-17Microstrategy IncorporatedSecure data updates
US20140215636A1 (en)*2013-01-312014-07-31Optim CorporationPortable terminal, document management method, and portable terminal program
US20190333002A1 (en)*2013-03-132019-10-31Promega CorporationRadio frequency identification system
US11164144B2 (en)*2013-03-132021-11-02Promega CorporationRadio frequency identification system
US12327293B2 (en)2013-03-132025-06-10Promega CorporationRadio frequency identification system
US9563341B2 (en)*2013-03-162017-02-07Jerry Alan CrandallData sharing
US9645720B2 (en)*2013-03-162017-05-09Jerry Alan CrandallData sharing
US20140282103A1 (en)*2013-03-162014-09-18Jerry Alan CrandallData sharing
US20160110073A1 (en)*2013-03-162016-04-21Jerry Alan CrandallData Sharing
US20160110153A1 (en)*2013-03-162016-04-21Jerry Alan CrandallData Sharing
US20160110075A1 (en)*2013-03-162016-04-21Jerry Alan CrandallData Sharing
US20160110074A1 (en)*2013-03-162016-04-21Jerry Alan CrandallData Sharing
US20160110072A1 (en)*2013-03-162016-04-21Jerry Alan CrandallData Sharing
US9189622B2 (en)*2013-04-302015-11-17Vmware, Inc.Static redirection for objective C
US20140325499A1 (en)*2013-04-302014-10-30Vmware, Inc.Static redirection for objective c
US10114979B2 (en)2013-04-302018-10-30Vmware, Inc.Static redirection for objective C
US20140366157A1 (en)*2013-06-072014-12-11Apple Inc.Multiple containers assigned to an application
US10410003B2 (en)*2013-06-072019-09-10Apple Inc.Multiple containers assigned to an application
US10193893B2 (en)*2013-07-112019-01-29Open Text Sa UlcSystem and method for access control using network verification
US11507680B2 (en)*2013-07-112022-11-22Open Text Sa UlcSystem and method for access control using network verification
US9411978B2 (en)*2013-07-112016-08-09Open Text S.A.System and method for access control using network verification
US12182291B2 (en)*2013-07-112024-12-31Open Text Sa UlcSystem and method for access control using network verification
US10771472B2 (en)2013-07-112020-09-08Open Text Sa UlcSystem and method for access control using network verification
US20150020214A1 (en)*2013-07-112015-01-15Open Text S.A.System and method for access control using network verification
US20230079416A1 (en)*2013-07-112023-03-16Open Text Sa UlcSystem and method for access control using network verification
US20180248915A1 (en)*2013-09-202018-08-30Open Text Sa UlcApplication gateway architecture with multi-level security policy and rule promulgations
US11108827B2 (en)*2013-09-202021-08-31Open Text Sa UlcApplication gateway architecture with multi-level security policy and rule promulgations
US10824756B2 (en)2013-09-202020-11-03Open Text Sa UlcHosted application gateway architecture with multi-level security policy and rule promulgations
US11115438B2 (en)2013-09-202021-09-07Open Text Sa UlcSystem and method for geofencing
US11102248B2 (en)2013-09-202021-08-24Open Text Sa UlcSystem and method for remote wipe
US9794255B2 (en)*2013-10-102017-10-17Fujitsu LimitedCommunication terminal and communication processing method
US20150106904A1 (en)*2013-10-102015-04-16Fujitsu LimitedCommunication terminal and communication processing method
US20190163923A1 (en)*2013-10-242019-05-30Internet Infrastructure Services Corp.Methods of dynamically securing electronic devices and other communications through environmental and system measurements leveraging tailored trustworthy spaces and continuous authentication
US9721111B2 (en)*2013-10-242017-08-01Internet Infrastructure Services CorporationMethods of dynamically securing electronic devices and other communications through environmental and system measurements leveraging tailored trustworthy spaces
US20150121506A1 (en)*2013-10-242015-04-30Internet Infrastructure Services CorporationMethods of dynamically securing electronic devices and other communications through environmental and system measurements leveraging tailored trustworthy spaces
US10185835B2 (en)*2013-10-242019-01-22Internet Infrastructure Services Corp.Methods of dynamically securing electronic devices and other communications through environmental and system measurements leveraging tailored trustworthy spaces and continuous authentication
US20150271207A1 (en)*2014-03-192015-09-24Symantec CorporationSystems and methods for providing targeted data loss prevention on unmanaged computing devices
US9246948B2 (en)*2014-03-192016-01-26Symantec CorporationSystems and methods for providing targeted data loss prevention on unmanaged computing devices
US10599860B2 (en)*2014-05-222020-03-24Tata Consultancy Services LimitedAccessing enterprise data
US20150339484A1 (en)*2014-05-222015-11-26Tata Consultancy Services LimitedAccessing Enterprise Data
CN106462692A (en)*2014-06-062017-02-22微软技术许可有限责任公司 Enhanced Selective Wipe for Compromised Devices
US20150358353A1 (en)*2014-06-062015-12-10Microsoft CorporationEnhanced selective wipe for compromised devices
US20160307002A1 (en)*2014-06-102016-10-20Tencent Technology (Shenzhen) Company LimitedMethod and apparatus for displaying information content
US10552644B2 (en)*2014-06-102020-02-04Tencent Technology (Shenzhen) Company LimitedMethod and apparatus for displaying information content
US9817649B2 (en)*2014-06-272017-11-14International Business Machines CorporationInstallation of software applications on mobile devices based on positions thereof
US20150378709A1 (en)*2014-06-272015-12-31International Business Machines CorporationInstallation of Software Applications on Mobile Devices Based on Positions Thereof
WO2016022556A3 (en)*2014-08-052017-05-04Openpeak Inc.Method and system for runtime injection of secure applications
US20160044039A1 (en)*2014-08-072016-02-11Alcatel LucentPrivacy-aware personal data store
US20160087993A1 (en)*2014-09-192016-03-24Microsoft CorporationSelectively Managing Datasets
US12216673B2 (en)2014-09-252025-02-04Oracle International CorporationTechniques for semantic searching
US11334583B2 (en)2014-09-252022-05-17Oracle International CorporationTechniques for semantic searching
US10664488B2 (en)2014-09-252020-05-26Oracle International CorporationSemantic searches in a business intelligence system
US9760359B2 (en)2014-11-182017-09-12International Business Machines CorporationHealthcare as a service—downloadable enterprise application
US9886255B2 (en)2014-11-182018-02-06International Business Machines CorporationHealthcare as a service—downloadable enterprise application
US9436527B2 (en)*2014-12-052016-09-06Sybase, Inc.Memory management of a device accessing applications
US11288384B2 (en)2014-12-312022-03-29Citrix Systems, Inc.Shared secret vault for applications with single sign on
US10699024B2 (en)2014-12-312020-06-30Citrix Systems, Inc.Shared secret vault for applications with single sign on
EP3702946A1 (en)*2014-12-312020-09-02Citrix Systems Inc.Shared secret vault for applications with single sign on
US20160196296A1 (en)*2015-01-022016-07-07KCura CorporationMethods and apparatus for deleting a plurality of documents associated with an electronic document review application
US10798546B1 (en)*2015-06-032020-10-06Airslate, Inc.Method and apparatus for dynamically reconfiguring mobile devices from primary to secondary services based on pushed data
US11910285B2 (en)*2015-06-032024-02-20Airslate, Inc.Method and apparatus for supporting dynamic reconfiguration
US20210037362A1 (en)*2015-06-032021-02-04Airslate, Inc.Method and apparatus for dynamically reconfiguring mobile devices from primary to secondary services based on pushed data
US12342253B2 (en)*2015-06-032025-06-24Airslate, Inc.Method and apparatus for supporting dynamic reconfiguration
US20240205653A1 (en)*2015-06-032024-06-20Airslate, Inc.Method and apparatus for supporting dynamic reconfiguration
US9703572B2 (en)*2015-06-052017-07-11Airwatch LlcManaged application detection logic
US9917841B1 (en)*2015-07-302018-03-13Sprint Communications Company L.P.Branding and improper operation detection on a user equipment
US10430091B2 (en)2015-08-072019-10-01Samsung Electronics Co., Ltd.Electronic device and method for storing security information thereof
US11956701B2 (en)2015-10-242024-04-09Oracle International CorporationContent display and interaction according to estimates of content usefulness
US10516980B2 (en)2015-10-242019-12-24Oracle International CorporationAutomatic redisplay of a user interface including a visualization
US10795775B2 (en)*2015-10-292020-10-06Datto, Inc.Apparatuses, methods, and systems for storage and analysis of SaaS data and non-SaaS data for businesses and other organizations
US11593075B2 (en)2015-11-032023-02-28Open Text Sa UlcStreamlined fast and efficient application building and customization systems and methods
WO2017082808A1 (en)*2015-11-112017-05-18Authentico Technologies AbMethod and system for user authentication
US11277397B2 (en)2015-11-112022-03-15Authentico Technologies AbMethod and system for user authentication
US20170147828A1 (en)*2015-11-242017-05-25Bank Of America CorporationReversible Redaction and Tokenization Computing System
US10140296B2 (en)*2015-11-242018-11-27Bank Of America CorporationReversible redaction and tokenization computing system
US20170147829A1 (en)*2015-11-242017-05-25Bank Of America CorporationReversible Redaction and Tokenization Computing System
US10192068B2 (en)2015-11-242019-01-29Bank Of America CorporationReversible redaction and tokenization computing system
US10515126B2 (en)2015-11-242019-12-24Bank Of America CorporationReversible redaction and tokenization computing system
US9767307B2 (en)*2015-11-242017-09-19Bank Of America CorporationReversible redaction and tokenization computing system
US10909257B1 (en)2015-12-162021-02-02Architecture Technology CorporationMulti-domain application execution management
US10346628B2 (en)*2015-12-162019-07-09Architecture Technology CorporationMulti-domain application execution management
US11514157B2 (en)2016-01-102022-11-29Apple Inc.Multi-user device
US10628580B2 (en)*2016-01-102020-04-21Apple Inc.Containers shared by multiple users of a device
WO2017122854A1 (en)*2016-01-152017-07-20(주) 글루시스Home network system based on container virtualization technology
US10334024B2 (en)*2016-01-202019-06-25Samsung Electronics Co., Ltd.Electronic communication device
US11290425B2 (en)*2016-02-012022-03-29Airwatch LlcConfiguring network security based on device management characteristics
US12126596B2 (en)2016-02-012024-10-22Omnissa, LlcConfiguring network security based on device management characteristics
US20170222977A1 (en)*2016-02-012017-08-03Airwatch LlcConfiguring network security based on device management characteristics
US11388037B2 (en)2016-02-252022-07-12Open Text Sa UlcSystems and methods for providing managed services
US10158610B2 (en)*2016-07-062018-12-18Adp, LlcSecure application communication system
US20180013729A1 (en)*2016-07-062018-01-11Adp, LlcSecure Application Communication System
US20180062944A1 (en)*2016-09-012018-03-01Cisco Technology, Inc.Api rate limiting for cloud native application
US11303536B2 (en)*2017-04-262022-04-12Vmware, Inc.Simplified cloud-based enterprise mobility management provisioning
US20180348979A1 (en)*2017-06-022018-12-06Oracle International CorporationInter-application sharing
US10917587B2 (en)2017-06-022021-02-09Oracle International CorporationImporting and presenting data
US10956237B2 (en)*2017-06-022021-03-23Oracle International CorporationInter-application sharing of business intelligence data
US11614857B2 (en)2017-06-022023-03-28Oracle International CorporationImporting, interpreting, and presenting data
US20190058728A1 (en)*2017-07-312019-02-21Harman International Industries, IncorporatedData protection and security for in-vehicle systems
US11303663B2 (en)*2017-07-312022-04-12Harman International Industries, IncorporatedData protection and security for in-vehicle systems
US12039519B2 (en)2017-10-242024-07-16Stripe, Inc.System and method for indicating entry of personal identification number
US11062299B2 (en)*2017-10-242021-07-13BBPOS LimitedSystem and method for indicating entry of personal identification number
US11663584B2 (en)2017-10-242023-05-30Stripe, Inc.System and method for indicating entry of personal identification number
US10956593B2 (en)*2018-02-152021-03-23International Business Machines CorporationSharing of data among containers running on virtualized operating systems
US11520919B2 (en)2018-02-152022-12-06International Business Machines CorporationSharing of data among containers running on virtualized operating systems
US11704427B2 (en)2018-05-042023-07-18Citrix Systems, Inc.Systems and methods for providing data loss prevention via an embedded browser
US11328077B2 (en)*2018-05-042022-05-10Citrix Systems, Inc.Systems and methods for providing data loss prevention via an embedded browser
CN112313652A (en)*2018-05-042021-02-02思杰系统有限公司 System and method for providing data loss prevention via embedded browser
FR3081065A1 (en)*2018-05-092019-11-15Raphael Louiset SECURE METHOD AND SYSTEM FOR DELAYED DATA SHARING BETWEEN SEVERAL USERS AND SEVERAL USERS.
FR3081067A1 (en)*2018-05-092019-11-15Raphael Louiset SECURE METHOD AND SYSTEM FOR DELAYED DATA SHARING BETWEEN AT LEAST ONE TRANSMITTER USER AND AT LEAST ONE RECIPIENT USER.
FR3081064A1 (en)*2018-05-092019-11-15Raphael Louiset SECURE METHOD AND SYSTEM FOR DELAYED DATA SHARING BETWEEN SEVERAL TRANSMITTER USERS AND ANOTHER USER.
WO2019215497A1 (en)*2018-05-092019-11-14Lapsechain SaSecure method for the delayed sharing of data between a sender user and a plurality of recipient users, with local creation of a container
WO2019215495A1 (en)*2018-05-092019-11-14Lapsechain SaSecure method and system for the delayed sharing of data between at least one sender user and at least one recipient user
US12210596B2 (en)2018-05-092025-01-28Stripe, Inc.Terminal hardware configuration system
WO2019215498A1 (en)*2018-05-092019-11-14Lapsechain SaSecure method and system for the delayed sharing of data between a sender user and a plurality of recipient users, with remote creation of a container
WO2019215493A1 (en)*2018-05-092019-11-14Lapsechain SaSecure method and system for the delayed sharing of data between a plurality of sender users and a recipient user
WO2019215492A1 (en)*2018-05-092019-11-14Lapsechain SaSecure method for the delayed sharing of data between a sender user and a recipient user, with local creation of a container
FR3081061A1 (en)*2018-05-092019-11-15Raphael Louiset SECURE METHOD FOR DELAYED DATA SHARING BETWEEN A TRANSMITTER USER AND SEVERAL USERS, WITH LOCAL CREATION OF A CONTAINER.
WO2019215491A1 (en)*2018-05-092019-11-14Lapsechain SaSecure system and method for the delayed sharing of data between a sender user and a recipient user, with remote creation of a container
WO2019215494A1 (en)*2018-05-092019-11-14Lapsechain SaSecure method and system for the delayed sharing of data between a plurality of sender users and a plurality of recipient users
FR3081062A1 (en)*2018-05-092019-11-15Raphael Louiset SECURE METHOD AND SYSTEM FOR DELAYED DATA SHARING BETWEEN A TRANSMITTER USER AND SEVERAL USERS WITH REMOTE CREATION OF A CONTAINER.
FR3081066A1 (en)*2018-05-092019-11-15Raphael Louiset SECURE SYSTEM AND METHOD FOR DELAYED DATA SHARING BETWEEN A TRANSMITTER USER AND A RECEIVING USER, WITH REMOTE CREATION OF A CONTAINER.
FR3081063A1 (en)*2018-05-092019-11-15Raphael Louiset SECURE METHOD FOR DELAYED DATA SHARING BETWEEN A TRANSMITTER USER AND A RECEIVING USER, WITH LOCAL CREATION OF A CONTAINER.
US11669376B2 (en)2018-09-212023-06-06Citrix Systems, Inc.Systems and methods for intercepting and enhancing SaaS application calls via embedded browser
JP2021501381A (en)*2018-09-212021-01-14サイトリックス システムズ,インコーポレイテッド Systems and methods for intercepting and enhancing SAAS application calls via the embedded browser
CN111226429A (en)*2018-09-212020-06-02思杰系统有限公司 System and method for intercepting and enhancing SAAS application calls via embedded browser
WO2020061288A1 (en)*2018-09-212020-03-26Citrix Systems, Inc.Systems and methods for intercepting and enhancing saas application calls via embedded browser
US10599486B1 (en)2018-09-212020-03-24Citrix Systems, Inc.Systems and methods for intercepting and enhancing SaaS application calls via embedded browser
US11449815B2 (en)2018-11-082022-09-20Airslate, Inc.Automated electronic document workflows
US10491603B1 (en)*2019-03-072019-11-26Lookout, Inc.Software component substitution based on rule compliance for computing device context
US12182789B2 (en)*2019-09-192024-12-31Google LlcApplication and platform for integrating microapps using application programming interfaces (APIs)
US11323445B2 (en)*2019-12-032022-05-03Blackberry LimitedMethods and systems for accessing a network
US11991155B2 (en)2020-02-272024-05-21Virtru CorporationMethods and systems for securing containerized applications
WO2021173716A1 (en)*2020-02-272021-09-02Virtru CorporationMethods and systems for securing containerized applications
CN111711612A (en)*2020-05-252020-09-25数篷科技(深圳)有限公司Communication control method, method and device for processing communication request
US11743039B2 (en)*2021-04-202023-08-29Coinbase Il Rd Ltd.System and method for data encryption using key derivation
US20220337409A1 (en)*2021-04-202022-10-20Coinbase Il Rd Ltd.System and method for data encryption using key derivation
US12229542B2 (en)2021-10-152025-02-18International Business Machines CorporationDynamic virtual network access
CN116016666A (en)*2022-12-212023-04-25中盈优创资讯科技有限公司API release realization method and device

Also Published As

Publication numberPublication date
EP2909786A1 (en)2015-08-26
US9858428B2 (en)2018-01-02
US9602474B2 (en)2017-03-21
WO2014062420A1 (en)2014-04-24
CN104903910A (en)2015-09-09
US20170147825A1 (en)2017-05-25
EP2909786B1 (en)2019-05-01
US20150143120A1 (en)2015-05-21
US20140108794A1 (en)2014-04-17
US20170048204A9 (en)2017-02-16
CN104903910B (en)2018-03-16
US8959579B2 (en)2015-02-17

Similar Documents

PublicationPublication DateTitle
US9858428B2 (en)Controlling mobile device access to secure data
US11991051B2 (en)Providing mobile device management functionalities
US20210218797A1 (en)Data Management for an Application with Multiple Operation Modes
US11627120B2 (en)Dynamic crypto key management for mobility in a cloud environment
US20200293364A1 (en)Management of Unmanaged User Accounts and Tasks in a Multi-Account Mobile Application
CN107566400B (en)Method for determining an operating mode of an application
US8719898B1 (en)Configuring and providing profiles that manage execution of mobile applications
US20220094547A1 (en)Enhanced token transfer
WO2015057825A1 (en)Secure client drive mapping and file storage system for mobile device management type security
WO2015102608A2 (en)Providing mobile device management functionalities

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:CITRIX SYSTEMS INC., FLORIDA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BARTON, GARY;LANG, ZHONGMIN;DESAI, NITIN;AND OTHERS;REEL/FRAME:031320/0387

Effective date:20130927

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp