Movatterモバイル変換


[0]ホーム

URL:


US20140280955A1 - Controlling Electronically Communicated Resources - Google Patents

Controlling Electronically Communicated Resources
Download PDF

Info

Publication number
US20140280955A1
US20140280955A1US13/828,922US201313828922AUS2014280955A1US 20140280955 A1US20140280955 A1US 20140280955A1US 201313828922 AUS201313828922 AUS 201313828922AUS 2014280955 A1US2014280955 A1US 2014280955A1
Authority
US
United States
Prior art keywords
entities
computing device
entity
communication
management application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/828,922
Inventor
Erich Stuntebeck
John DiRico
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Airwatch LLC
Original Assignee
Sky Socket LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sky Socket LLCfiledCriticalSky Socket LLC
Priority to US13/828,922priorityCriticalpatent/US20140280955A1/en
Assigned to SKY SOCKET LLCreassignmentSKY SOCKET LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: DIRICO, JOHN, STUNTEBECK, ERICH
Assigned to AIRWATCH LLCreassignmentAIRWATCH LLCMERGER (SEE DOCUMENT FOR DETAILS).Assignors: SKY SOCKET, LLC
Publication of US20140280955A1publicationCriticalpatent/US20140280955A1/en
Priority to US15/430,184prioritypatent/US11824644B2/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Methods, systems, and devices provide control over resources electronically communicated among computing devices. In some embodiments, a management application identifies multiple entities for communicating electronic content. The management application determines that at least a subset of the entities required for communicating the electronic content is available for electronic communication. The management application authorizes communication of at least some of the electronic content among the entities in response to determining that the required subset of entities is available for electronic communication.

Description

Claims (20)

Therefore, the following is claimed:
1. A method comprising:
identifying, by a management application executed by a processor, a plurality of entities for communicating electronic content;
determining, by the management application, that at least a required subset of entities of the plurality of entities required for communicating the electronic content is available for electronic communication; and
in response to determining that the required subset of entities is available for electronic communication, authorizing, by the management application, communication of at least some of the electronic content among the plurality of entities.
2. The method ofclaim 1, wherein the required subset of entities comprises a configurable threshold number of entities available for electronic communication.
3. The method ofclaim 1, wherein determining that at least the required subset of entities is available comprises determining, for each required entity of the required subset of entities, that a respective computing device corresponding to the required entity is authorized for electronic communication.
4. The method ofclaim 1, wherein determining that at least the required subset of entities is available comprises determining, for each required entity of the required subset of entities, that a respective computing device corresponding to the required entity is compliant with at least one rule configured for controlling access to the electronic content by computing devices.
5. The method ofclaim 1, wherein determining that at least the required subset of entities is available comprises determining, for each required entity of the required subset of entities, that a respective computing device corresponding to the required entity is positioned in a common geographical location.
6. The method ofclaim 1, wherein determining that at least the required subset of entities is available comprises authenticating each required entity based on respective authentication data provided by a respective client application executed at a respective computing device corresponding to the required entity.
7. The method ofclaim 6, wherein authenticating the required entity based on respective authentication data comprises authenticating the required entity based on at least one of:
respective information corresponding to the required entity and detected by the respective client application; and
at least one respective user input to a respective computing device corresponding to the required entity.
8. The method ofclaim 1, wherein authorizing the communication comprises decrypting the electronic content with an encryption key formed by performing at least one operation on each of a plurality of portions of the encryption key received from the required subset of entities.
9. The method ofclaim 1, wherein authorizing the communication comprises verifying secondary authentication data generated from authentication data provided by the required subset of entities.
10. The method ofclaim 1, wherein the communication of electronic content is performed via an electronic meeting accessed by the plurality of entities.
11. The method ofclaim 1, further comprising restricting the communication of the electronic content based on determining that fewer than all required entities of the required subset of entities are available for electronic communication.
12. The method ofclaim 1, further comprising restricting the communication of the electronic content based on detecting an additional entity that lacks an authorization for electronic communication.
13. A method performed by a management application executed by a processor, the method comprising:
identifying a plurality of entities authorized for electronic communication among one another;
detecting an additional entity that lacks an authorization for electronic communication among the plurality of entities; and
restricting a communication of at least some electronic content among at least some of the plurality of entities based on detecting the additional entity that lacks the authorization.
14. The method ofclaim 13, wherein detecting the additional entity that lacks the authorization comprises determining that an unauthorized computing device corresponding to the additional entity is positioned in a geographical location in which a respective computing device corresponding each entity of the plurality of entities is positioned.
15. The method ofclaim 14, further comprising performing a remedial action specified by at least one rule configured for controlling access to the electronic content in response to determining that the unauthorized computing device is non-compliant with the at least one rule.
16. The method ofclaim 15, wherein the remedial action comprises transmitting to the unauthorized computing device a software update that is configured to bring the unauthorized computing device into compliance with the at least one rule.
17. The method ofclaim 15, wherein the remedial action comprises transmitting a command to a client application executing on the unauthorized computing device directing the client application to erase at least some content from the unauthorized computing device.
18. The method ofclaim 15, wherein the remedial action comprises transmitting a command to a client application executing on the computing device, wherein the command directs the client application to lock the computing device.
19. The method ofclaim 13, further comprising terminating an electronic meeting accessed by the plurality of entities for the electronic communication among the plurality of entities based on detecting the additional entity that lacks the authorization.
20. A system comprising:
at least one processor; and
a computer-readable medium in communication with the at least one processor;
wherein the at least one processor is configured to execute instructions embodied in the computer-readable medium to perform operations comprising:
identifying a plurality of entities required for authorizing at least one communication feature of a plurality of communication features for communicating electronic content,
determining that each required entity of the plurality of required entities is available for electronic communication, and
authorizing performance of the at least one communication feature based on determining that each entity is available for electronic communication, wherein at least one additional communication feature of the plurality of communication features is available in an absence of at least one of the plurality of required entities.
US13/828,9222013-03-142013-03-14Controlling Electronically Communicated ResourcesAbandonedUS20140280955A1 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US13/828,922US20140280955A1 (en)2013-03-142013-03-14Controlling Electronically Communicated Resources
US15/430,184US11824644B2 (en)2013-03-142017-02-10Controlling electronically communicated resources

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US13/828,922US20140280955A1 (en)2013-03-142013-03-14Controlling Electronically Communicated Resources

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US15/430,184ContinuationUS11824644B2 (en)2013-03-142017-02-10Controlling electronically communicated resources

Publications (1)

Publication NumberPublication Date
US20140280955A1true US20140280955A1 (en)2014-09-18

Family

ID=51533704

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US13/828,922AbandonedUS20140280955A1 (en)2013-03-142013-03-14Controlling Electronically Communicated Resources
US15/430,184Active2034-10-24US11824644B2 (en)2013-03-142017-02-10Controlling electronically communicated resources

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US15/430,184Active2034-10-24US11824644B2 (en)2013-03-142017-02-10Controlling electronically communicated resources

Country Status (1)

CountryLink
US (2)US20140280955A1 (en)

Cited By (46)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20130274940A1 (en)*2012-03-052013-10-17Siemens CorporationCloud enabled building automation system
US20140201816A1 (en)*2013-09-232014-07-17Sky Socket, LlcSecurely Authorizing Access to Remote Resources
US20150074813A1 (en)*2013-09-062015-03-12Oracle International CorporationProtection of resources downloaded to portable devices from enterprise systems
US20150120930A1 (en)*2013-10-312015-04-30Aruba Networks.ComProvisioning access point bandwidth based on predetermined events
US9100390B1 (en)2014-09-052015-08-04Openpeak Inc.Method and system for enrolling and authenticating computing devices for data usage accounting
US9106538B1 (en)2014-09-052015-08-11Openpeak Inc.Method and system for enabling data usage accounting through a relay
US9124493B2 (en)2008-12-192015-09-01Openpeak Inc.System and method for ensuring compliance with organizational polices
US9135418B2 (en)2011-10-102015-09-15Openpeak Inc.System and method for creating secure applications
US20150312260A1 (en)*2014-04-252015-10-29Samsung Electronics Co., Ltd.Methods of providing social network service and server performing the same
US9232078B1 (en)2015-03-162016-01-05Openpeak Inc.Method and system for data usage accounting across multiple communication networks
US9232012B1 (en)2014-09-052016-01-05Openpeak Inc.Method and system for data usage accounting in a computing device
US9232013B1 (en)2014-09-052016-01-05Openpeak Inc.Method and system for enabling data usage accounting
US9350818B2 (en)2014-09-052016-05-24Openpeak Inc.Method and system for enabling data usage accounting for unreliable transport communication
US20160239537A1 (en)*2015-02-172016-08-18International Business Machines CorporationElectronic meeting question management
US20160285991A1 (en)*2015-03-262016-09-29International Business Machines CorporationCollaborative based caching
US20170054674A1 (en)*2010-10-082017-02-23Brian Lee MoffatData sharing system method
US20170068793A1 (en)*2015-09-042017-03-09Cisco Technology, Inc.Time and motion data fusion for determining and remedying issues based on physical presence
US9723003B1 (en)*2014-06-062017-08-01Amazon Technologies, Inc.Network beacon based credential store
US20180014295A1 (en)*2016-07-052018-01-11Fujitsu LimitedInformation processing system, server, and terminal device
US20180183810A1 (en)*2015-08-212018-06-28PushPull Technology LimitedData Collaboration
US10063592B1 (en)*2014-06-062018-08-28Amazon Technologies, Inc.Network authentication beacon
US10129299B1 (en)*2014-06-062018-11-13Amazon Technologies, Inc.Network beacon management of security policies
US10298577B1 (en)*2016-03-312019-05-21Amazon Technologies, Inc.Credential vending to processes
US10326671B2 (en)*2016-10-182019-06-18Airwatch LlcFederated mobile device management
US10684736B2 (en)*2007-02-132020-06-16Visual Targeting CorporationMethod for defining a presentation format targetable to a demographic
US10699201B2 (en)*2013-06-042020-06-30Ent. Services Development Corporation LpPresenting relevant content for conversational data gathered from real time communications at a meeting based on contextual data associated with meeting participants
US11038886B1 (en)*2018-02-082021-06-15Wells Fargo Bank, N.A.Compliance management system
US11190512B2 (en)2019-04-172021-11-30Microsoft Technology Licensing, LlcIntegrity attestation of attestation component
US11222137B2 (en)2019-05-032022-01-11Microsoft Technology Licensing, LlcStoring and executing an application in a user's personal storage with user granted permission
US11240316B1 (en)*2017-04-112022-02-01Wells Fargo Bank, N.A.Systems and methods for optimizing information collaboration
US11310008B2 (en)*2017-10-232022-04-19Kyocera CorporationData transmission with multiple numerologies for multiple devices with common geographical location dependent control information
US11381567B2 (en)2019-04-292022-07-05Microsoft Technology Licensing, LlcExecution of an application within a scope of user-granted permission
US11388245B1 (en)2017-04-112022-07-12Wells Fargo Bank, N.A.Systems and methods for content delivery
US11392467B2 (en)2019-04-172022-07-19Microsoft Technology Licensing, LlcFailover between decentralized identity stores
US11411959B2 (en)*2019-05-032022-08-09Microsoft Technology Licensing, LlcExecution of application in a container within a scope of user-granted permission
US11429743B2 (en)2019-04-292022-08-30Microsoft Technology Licensing, LlcLocalization of DID-related claims and data
US11528233B2 (en)*2013-03-152022-12-13Advanced Elemental Technologies, Inc.Systems and methods for establishing a user purpose fulfillment computing platform
US20220405412A1 (en)*2021-06-212022-12-22Microsoft Technology Licensing, LlcConfiguration of default sensitivity labels for network file storage locations
US20230089451A1 (en)*2021-09-222023-03-23Fujifilm Business Innovation Corp.Online conference apparatus and online conference method
US11652823B1 (en)*2022-12-192023-05-16Uab 360 ItSystems and methods for controlling access
US11722491B1 (en)*2020-06-302023-08-08Amazon Technologies, Inc.Cumulative risk-based scoring for quorum authorization
US11822662B2 (en)2013-03-152023-11-21Advanced Elemental Technologies, Inc.Methods and systems for secure and reliable identity-based computing
US11847495B2 (en)2013-03-152023-12-19Advanced Elemental Technologies, Inc.Systems and methods configured to enable an operating system for connected computing that supports user use of suitable to user purpose resources sourced from one or more resource ecospheres
US11886605B2 (en)*2019-09-302024-01-30Red Hat, Inc.Differentiated file permissions for container users
US11914696B1 (en)2020-09-302024-02-27Amazon Technologies, Inc.Quorum-based access control management
US12111902B2 (en)2022-05-202024-10-08Advanced Elemental Technologies, Inc.Systems and methods for a connected computing resource and event/activity identification information infrastructure using near existential or existential biometric identification of humans

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10715343B1 (en)*2017-09-062020-07-14Amazon Technologies, Inc.Device monitoring for conference reservation cancellation

Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030164853A1 (en)*2000-12-292003-09-04Min ZhuDistributed document sharing
US20060067250A1 (en)*2004-09-302006-03-30Boyer David GMethod and apparatus for launching a conference based on presence of invitees
US20070162417A1 (en)*2006-01-102007-07-12Kabushiki Kaisha ToshibaSystem and method for selective access to restricted electronic documents
US20080065727A1 (en)*2006-09-132008-03-13Majors Kenneth DConferencing system with improved access
US20100100972A1 (en)*2008-08-082010-04-22Jacques LemieuxApproaches for a location aware client
US20110135083A1 (en)*2009-12-042011-06-09Charles Steven LingafeltMethods to Improve Fraud Detection on Conference Calling Systems Based on Observation of Participants' Call Time Durations
US20110141276A1 (en)*2009-12-142011-06-16Apple Inc.Proactive Security for Mobile Devices
US20140237041A1 (en)*2013-02-192014-08-21Cisco Technology, Inc.Automatic future meeting scheduler based upon locations of meeting participants

Family Cites Families (390)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4679226A (en)1985-06-171987-07-07Alltel CorporationComputer security guard circuit
WO1992016078A1 (en)1991-03-041992-09-17Megatrend TelecommunicationsMobile telephone, system and method
US5237614A (en)1991-06-071993-08-17Security Dynamics Technologies, Inc.Integrated network security system
US5799068A (en)1992-06-291998-08-25Elonex I.P. Holdings Ltd.Smart phone integration with computer systems
US5740395A (en)1992-10-301998-04-14Intel CorporationMethod and apparatus for cleaning up a solid state memory disk storing floating sector data
US5666530A (en)1992-12-021997-09-09Compaq Computer CorporationSystem for automatic synchronization of common file between portable computer and host computer via communication channel selected from a plurality of usable channels there between
JP2757243B2 (en)1993-03-261998-05-25松下電器産業株式会社 How to prevent unauthorized use in microcellular systems
US6618668B1 (en)2000-04-262003-09-09Arrivalstar, Inc.System and method for obtaining vehicle schedule information in an advance notification system
US6748318B1 (en)1993-05-182004-06-08Arrivalstar, Inc.Advanced notification systems and methods utilizing a computer network
US6278936B1 (en)1993-05-182001-08-21Global Research Systems, Inc.System and method for an advance notification system for monitoring and reporting proximity of a vehicle
JP3124664B2 (en)1993-11-122001-01-15松下電器産業株式会社 Remote file lock system
US5446888A (en)1994-01-141995-08-29Pyne; Charles F.Remote file transfer method and apparatus
US5668876A (en)1994-06-241997-09-16Telefonaktiebolaget Lm EricssonUser authentication method and apparatus
US5864683A (en)1994-10-121999-01-26Secure Computing CorporartionSystem for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US6167253A (en)1995-01-122000-12-26Bell Atlantic Network Services, Inc.Mobile data/message/electronic mail download system utilizing network-centric protocol such as Java
US5574786A (en)1995-02-061996-11-12International Business Machines CorporationSecuring trusted personal computer system against unauthorized movement
JP2661582B2 (en)1995-03-131997-10-08日本電気株式会社 Subsystem for preventing unauthorized use of wireless mobile terminal in wireless mobile terminal system
AU6678096A (en)1995-07-201997-02-18Novell, Inc.Transaction synchronization in a disconnectable computer and network
US7553234B2 (en)1995-11-222009-06-30Walker Digital, LlcMethod and apparatus for outputting a result of a game via a container
US6226622B1 (en)1995-11-272001-05-01Alan James DabbiereMethods and devices utilizing a GPS tracking system
US5815807A (en)1996-01-311998-09-29Motorola, Inc.Disposable wireless communication device adapted to prevent fraud
US5974238A (en)1996-08-071999-10-26Compaq Computer CorporationAutomatic data synchronization between a handheld and a host computer using pseudo cache including tags and logical data elements
JPH10111727A (en)1996-10-031998-04-28Toshiba Corp Information equipment having telephone function and method for realizing security of the information equipment
US6021492A (en)1996-10-092000-02-01Hewlett-Packard CompanySoftware metering management of remote computing devices
US5870459A (en)1996-11-011999-02-09Ericsson Inc.Recyclable cellular telephone and method and apparatus for supporting the use of a recyclable cellular telephone within a cellular telephone network
US5826265A (en)1996-12-061998-10-20International Business Machines CorporationData management system having shared libraries
US7287271B1 (en)1997-04-082007-10-23Visto CorporationSystem and method for enabling secure access to services in a computer network
US20060195595A1 (en)2003-12-192006-08-31Mendez Daniel JSystem and method for globally and securely accessing unified information in a computer network
US6085192A (en)1997-04-112000-07-04Roampage, Inc.System and method for securely synchronizing multiple copies of a workspace element in a network
US6023708A (en)1997-05-292000-02-08Visto CorporationSystem and method for using a global translator to synchronize workspace elements across a network
US6131116A (en)1996-12-132000-10-10Visto CorporationSystem and method for globally accessing computer services
US6708221B1 (en)1996-12-132004-03-16Visto CorporationSystem and method for globally and securely accessing unified information in a computer network
US6766454B1 (en)1997-04-082004-07-20Visto CorporationSystem and method for using an authentication applet to identify and authenticate a user in a computer network
US5961590A (en)1997-04-111999-10-05Roampage, Inc.System and method for synchronizing electronic mail between a client site and a central site
DE19722424C5 (en)1997-05-282006-09-14Telefonaktiebolaget Lm Ericsson (Publ) Method of securing access to a remote system
GB2361558B (en)1997-05-282003-07-23Ericsson Telefon Ab L MA method for securing access to a remote system
US6606662B2 (en)1997-06-112003-08-12Canon Kabushiki KaishaPortable terminal apparatus and communication method thereof
JPH1196099A (en)*1997-09-191999-04-09Hitachi Ltd Service providing system
US5966081A (en)1997-09-241999-10-12Chesnutt; R. VanPaging activated electronic security system
US6052735A (en)1997-10-242000-04-18Microsoft CorporationElectronic mail object synchronization between a desktop computer and mobile device
US6269369B1 (en)1997-11-022001-07-31Amazon.Com Holdings, Inc.Networked personal contact manager
US6636489B1 (en)1997-11-032003-10-21Bell South Wireless Data. L.P.Wireless management system and a method for an automated over-the-air managing process for wireless communication device
US6151606A (en)1998-01-162000-11-21Visto CorporationSystem and method for using a workspace data manager to access, manipulate and synchronize network data
JPH11224288A (en)1998-02-061999-08-17Hitachi Ltd Terms and conditions of sale Digital content sales electronic mall system
US20030110084A1 (en)1998-03-042003-06-12Martin Forest EberhardSecure content distribution system
US7792297B1 (en)1998-03-312010-09-07Piccionelli Greg ASystem and process for limiting distribution of information on a communication network based on geographic location
US6779118B1 (en)1998-05-042004-08-17Auriq Systems, Inc.User specific automatic data redirection system
US6233341B1 (en)1998-05-192001-05-15Visto CorporationSystem and method for installing and using a temporary certificate at a remote site
US6480096B1 (en)1998-07-082002-11-12Motorola, Inc.Method and apparatus for theft deterrence and secure data retrieval in a communication device
US6286098B1 (en)*1998-08-282001-09-04Sap AktiengesellschaftSystem and method for encrypting audit information in network applications
US8332478B2 (en)1998-10-012012-12-11Digimarc CorporationContext sensitive connected content
US6131096A (en)1998-10-052000-10-10Visto CorporationSystem and method for updating a remote database in a network
US7136645B2 (en)1998-10-092006-11-14Netmotion Wireless, Inc.Method and apparatus for providing mobile and other intermittent connectivity in a computing environment
US6463470B1 (en)1998-10-262002-10-08Cisco Technology, Inc.Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows
US6370629B1 (en)1998-10-292002-04-09Datum, Inc.Controlling access to stored information based on geographical location and date and time
US6553375B1 (en)1998-11-252003-04-22International Business Machines CorporationMethod and apparatus for server based handheld application and database management
US6078260A (en)1998-12-212000-06-20Sony CorporationMethod and apparatus for keeping track of children
US7430757B1 (en)1999-01-082008-09-30International Business Machines CorporationOblivious proxying using a secure coprocessor
US6529949B1 (en)2000-02-072003-03-04Interactual Technologies, Inc.System, method and article of manufacture for remote unlocking of local content located on a client device
US6668322B1 (en)1999-08-052003-12-23Sun Microsystems, Inc.Access management system and method employing secure credentials
US7373517B1 (en)1999-08-192008-05-13Visto CorporationSystem and method for encrypting and decrypting files
US6578054B1 (en)1999-10-042003-06-10Microsoft CorporationMethod and system for supporting off-line mode of operation and synchronization using resource state information
US6578069B1 (en)1999-10-042003-06-10Microsoft CorporationMethod, data structure, and computer program product for identifying a network resource
US6694335B1 (en)1999-10-042004-02-17Microsoft CorporationMethod, computer readable medium, and system for monitoring the state of a collection of resources
KR100348249B1 (en)1999-10-082002-08-09엘지전자 주식회사Data architecture of VCT and method for transmit/receiving service information
US6560772B1 (en)1999-10-152003-05-06International Business Machines CorporationMethod, system, and program for accessing data in different environments
US7363361B2 (en)2000-08-182008-04-22Akamai Technologies, Inc.Secure content delivery system
WO2001046833A2 (en)1999-12-232001-06-28Logistics.Com, Inc.Bid positioning system
US7739334B1 (en)2000-03-172010-06-15Visto CorporationSystem and method for automatically forwarding email and email events via a computer network to a server computer
US10552583B2 (en)2000-03-212020-02-04Gregory A. PiccionelliSecure portable computer and security method
US20010047335A1 (en)2000-04-282001-11-29Martin ArndtSecure payment method and apparatus
US7216361B1 (en)2000-05-192007-05-08Aol Llc, A Delaware Limited Liability CompanyAdaptive multi-tier authentication system
WO2001091002A2 (en)2000-05-222001-11-29Manhattan AssociatesSystem, method and apparatus for integrated supply chain management
US10684350B2 (en)2000-06-022020-06-16Tracbeam LlcServices and applications for a communications network
US7991697B2 (en)2002-12-162011-08-02Irdeto Usa, Inc.Method and system to digitally sign and deliver content in a geographically controlled manner via a network
JP2002082917A (en)2000-07-042002-03-22Sony Computer Entertainment IncContents distribution method, contents distribution server, and client terminal in contents distribution infrastructure
US7225231B2 (en)2000-09-202007-05-29Visto CorporationSystem and method for transmitting workspace elements across a network
US20020055967A1 (en)2000-11-082002-05-09Coussement Stefaan Valere AlbertSystem for reporting client status information to communications-center agents
US7660902B2 (en)2000-11-202010-02-09Rsa Security, Inc.Dynamic file access control and management
US7512806B2 (en)2000-11-302009-03-31Palmsource, Inc.Security technique for controlling access to a network by a wireless device
US7428411B2 (en)2000-12-192008-09-23At&T Delaware Intellectual Property, Inc.Location-based security rules
US7702785B2 (en)2001-01-312010-04-20International Business Machines CorporationMethods, systems and computer program products for selectively allowing users of a multi-user system access to network resources
US7017105B2 (en)2001-02-022006-03-21Microsoft CorporationDeleting objects from a store of a device
US7330717B2 (en)*2001-02-232008-02-12Lucent Technologies Inc.Rule-based system and method for managing the provisioning of user applications on limited-resource and/or wireless devices
US6529136B2 (en)2001-02-282003-03-04International Business Machines CorporationGroup notification system and method for implementing and indicating the proximity of individuals or groups to other individuals or groups
US7350229B1 (en)2001-03-072008-03-25Netegrity, Inc.Authentication and authorization mapping for a computer network
US7107339B1 (en)2001-04-072006-09-12Webmethods, Inc.Predictive monitoring and problem identification in an information technology (IT) infrastructure
US7603703B2 (en)2001-04-122009-10-13International Business Machines CorporationMethod and system for controlled distribution of application code and content data within a computer network
US6996841B2 (en)2001-04-192006-02-07Microsoft CorporationNegotiating secure connections through a proxy server
US7284045B1 (en)2001-06-012007-10-16Visto CorporationMethod and system for determining information to access an electronic mail account
US7228383B2 (en)2001-06-012007-06-05Visto CorporationSystem and method for progressive and hierarchical caching
US7444375B2 (en)2001-06-192008-10-28Visto CorporationInteractive voice and text message system
US7562112B2 (en)2001-07-062009-07-14Intel CorporationMethod and apparatus for peer-to-peer services for efficient transfer of information between networks
US7590684B2 (en)*2001-07-062009-09-15Check Point Software Technologies, Inc.System providing methodology for access control with cooperative enforcement
US7064688B2 (en)2001-07-092006-06-20Good Technology, Inc.System and method for compressing data on a bandwidth-limited network
US20030009595A1 (en)2001-07-092003-01-09Roger CollinsSystem and method for compressing data using field-based code word generation
US20030186689A1 (en)2001-08-062003-10-02Samsung Electronics Co., LtdSystem and method for IOTA software download notification for wireless communication devices
US20030065934A1 (en)2001-09-282003-04-03Angelo Michael F.After the fact protection of data in remote personal and wireless devices
US7308710B2 (en)2001-09-282007-12-11Jp Morgan Chase BankSecured FTP architecture
EP2296098B1 (en)2001-10-232019-02-27BlackBerry LimitedSystem and method for merging remote and local data in a single user interface
US7752166B2 (en)2001-11-152010-07-06Visto CorporationSystem and methods for asynchronous synchronization
US8108687B2 (en)2001-12-122012-01-31Valve CorporationMethod and system for granting access to system and content
US7496957B2 (en)2002-01-022009-02-24Hewlett-Packard Development Company, L.P.System and method for preventing use of a wireless device
US6741232B1 (en)2002-01-232004-05-25Good Technology, Inc.User interface for a data processing apparatus
US20030217150A1 (en)2002-03-012003-11-20Roese John J.Location based enhanced routing
US7458098B2 (en)2002-03-082008-11-25Secure Computing CorporationSystems and methods for enhancing electronic communication security
US8094591B1 (en)2002-03-192012-01-10Good Technology, Inc.Data carrier detector for a packet-switched communication network
US7788382B1 (en)2002-03-262010-08-31Good Technology, Inc.Server initiated synchronization
US7447506B1 (en)2002-03-292008-11-04Good Technology, Inc.Apparatus and method for reducing network congestion
US7310535B1 (en)2002-03-292007-12-18Good Technology, Inc.Apparatus and method for reducing power consumption in a wireless device
US6726106B1 (en)2002-04-022004-04-27Good Technology, Inc.Power management and device illumination mechanisms for a personal digital assistant
US20030204716A1 (en)2002-04-242003-10-30Rockwood Troy DeanSystem and methods for digital content distribution
US7447799B2 (en)2002-04-242008-11-04Good Technology, Inc.System and method for automatically updating a wireless device
US6727856B1 (en)2002-06-062004-04-27Good Technology, Inc.Antenna system for a wireless device
JP3707449B2 (en)2002-06-102005-10-19ソニー株式会社 COMMUNICATION METHOD, COMMUNICATION SYSTEM, AND COMMUNICATION DEVICE
US7032181B1 (en)2002-06-182006-04-18Good Technology, Inc.Optimized user interface for small screen devices
CA2391717A1 (en)2002-06-262003-12-26Ibm Canada Limited-Ibm Canada LimiteeTransferring data and storing metadata across a network
US7339484B2 (en)2002-06-272008-03-04Hewlett-Packard Development Company, L.P.Event-driven discovery method and apparatus
US9357013B2 (en)2002-07-262016-05-31International Business Machines CorporationClient-side script to application communication system
TW588243B (en)2002-07-312004-05-21Trek 2000 Int LtdSystem and method for authentication
JP4612416B2 (en)2002-08-092011-01-12ヴィスト・コーポレーション System and method for preventing access to data on compromised remote devices
US20040098715A1 (en)2002-08-302004-05-20Parixit AgheraOver the air mobile device software management
US7665118B2 (en)2002-09-232010-02-16Credant Technologies, Inc.Server, computer memory, and method to support security policy maintenance and distribution
US7665125B2 (en)2002-09-232010-02-16Heard Robert WSystem and method for distribution of security policies for mobile devices
US20060190984A1 (en)2002-09-232006-08-24Credant Technologies, Inc.Gatekeeper architecture/features to support security policy maintenance and distribution
US7437752B2 (en)2002-09-232008-10-14Credant Technologies, Inc.Client architecture for portable device with security policies
US7343488B2 (en)*2002-09-302008-03-11Intel CorporationMethod and apparatus for providing discrete data storage security
EP1408391A1 (en)2002-10-112004-04-14Telefonaktiebolaget LM Ericsson (publ)Method of associating authentication information of a trusted device to an identifier of a non-trusted device
US7827607B2 (en)2002-11-272010-11-02Symantec CorporationEnhanced client compliancy using database of security sensor data
US7308703B2 (en)2002-12-182007-12-11Novell, Inc.Protection of data accessible by a mobile device
US7353533B2 (en)2002-12-182008-04-01Novell, Inc.Administration of protection of data accessible by a mobile device
US7480907B1 (en)2003-01-092009-01-20Hewlett-Packard Development Company, L.P.Mobile services network for update of firmware/software in mobile handsets
ES2409936T3 (en)2003-01-312013-06-28Good Technology Corporation Asynchronous real-time data recovery
GB2398712B (en)2003-01-312006-06-28Hewlett Packard Development CoPrivacy management of personal data
US7251832B2 (en)2003-03-132007-07-31Drm Technologies, LlcSecure streaming container
US7203959B2 (en)2003-03-142007-04-10Symantec CorporationStream scanning through network proxy servers
US6995749B2 (en)2003-03-282006-02-07Good Technology, Inc.Auto font magnification mechanism
ATE441994T1 (en)2003-04-032009-09-15Nokia Corp MANAGING CONTEXTUAL INFORMATION WITH A MOBILE STATION
GB0308991D0 (en)2003-04-172003-05-28Psion Digital LtdA data access replication or communication system comprising a distributed software application
GB2400931B (en)2003-04-252006-09-27Messagelabs LtdA method of, and system for, replacing external links in electronic documents
US7275073B2 (en)2003-05-072007-09-25Good Technology, Inc.System and method for notifying mobile devices based on device type and network capabilities
US7890091B2 (en)2003-05-082011-02-15Good Technology, Inc.Collaborative data and intelligent synchronization for mobile devices
US7840631B2 (en)2003-05-092010-11-23Good Technology, Inc.Multimedia control with one-click device selection
US20040224703A1 (en)2003-05-092004-11-11Takaki Steven M.Method and system for enhancing venue participation by venue participants
US7184801B2 (en)2003-05-122007-02-27Good Technology, Inc.Mobile application builder
US20040243428A1 (en)2003-05-292004-12-02Black Steven C.Automated compliance for human resource management
US7676681B2 (en)2003-06-172010-03-09Veratad Technologies, LlcMethod, system, and apparatus for identification number authentication
US20140143852A1 (en)2008-08-212014-05-22Ntrepid CorporationSecure network privacy system
US6977587B2 (en)2003-07-092005-12-20Hewlett-Packard Development Company, L.P.Location aware device
US7515717B2 (en)2003-07-312009-04-07International Business Machines CorporationSecurity containers for document components
US7735122B1 (en)2003-08-292010-06-08Novell, Inc.Credential mapping
EP1513040B1 (en)2003-09-032006-12-20France TelecomSystem and method for distributing content access data
US20050102536A1 (en)2003-10-102005-05-12Bea Systems, Inc.Dynamically configurable distributed security system
US7421741B2 (en)2003-10-202008-09-02Phillips Ii Eugene BSecuring digital content system and method
US20050097032A1 (en)2003-10-292005-05-05Lucent Technologies Inc.Network support for automatic credit for dropped calls
US7039394B2 (en)2003-11-252006-05-02Good Technology, Inc.Communication system and method for compressing information sent by a communication device to a target portable communication device
US8639819B2 (en)2004-02-052014-01-28Nokia CorporationAd-hoc connection between electronic devices
US7194273B2 (en)2004-02-122007-03-20Lucent Technologies Inc.Location based service restrictions for mobile applications
US8843413B2 (en)2004-02-132014-09-23Microsoft CorporationBinding content to a domain
EP1564944B1 (en)2004-02-132006-12-20Sony Ericsson Mobile Communications ABMethod and device for message delivery
BRPI0508991A (en)2004-03-182007-08-28Manhattan Associates Inc shipping management system and method for shipping planning optimization
RU2344557C2 (en)2004-04-142009-01-20Диджитал Ривер, Инк.Licensing system based on geographical location
US7496847B2 (en)2004-04-292009-02-24International Business Machines CorporationDisplaying a computer resource through a preferred browser
US7454623B2 (en)2004-06-162008-11-18Blame Canada Holdings IncDistributed hierarchical identity management system authentication mechanisms
US7543146B1 (en)2004-06-182009-06-02Blue Coat Systems, Inc.Using digital certificates to request client consent prior to decrypting SSL communications
AU2005273532B2 (en)2004-06-282011-04-07Acano (Uk) LimitedSystem for proximity determination
JP4552540B2 (en)2004-07-092010-09-29ソニー株式会社 Content recording apparatus, content reproducing apparatus, content recording method, content reproducing method, and program
GB0420409D0 (en)2004-09-142004-10-20Waterleaf LtdOnline commercial transaction system and method of operation thereof
US8276209B2 (en)2004-09-172012-09-25Koninklijke Philips Electronics N.V.Proximity check server
US7475152B2 (en)2004-09-202009-01-06International Business Machines CorporationApproach to provide self-protection function to web content at client side
US7620001B2 (en)2004-10-132009-11-17Good Technology, Inc.Communication system and method with mobile devices
US8001082B1 (en)2004-10-282011-08-16Good Technology, Inc.System and method of data security in synchronizing data with a wireless device
GB0427643D0 (en)2004-12-172005-01-19Carnall MuratMethod and apparatus for recording events
US7873959B2 (en)2005-02-012011-01-18Microsoft CorporationPublishing the status of and updating firmware components
US7448023B2 (en)2005-02-252008-11-04Microsoft CorporationMethod and system for verifying rule compliance of an application object
JP2006260201A (en)2005-03-172006-09-28Hitachi Ltd Distributed authentication system and communication control device
US7657746B2 (en)2005-04-222010-02-02Microsoft CorporationSupporting statements for credential based access control
US20060253474A1 (en)2005-05-092006-11-09Hotchkiss Lynette ISystem and method for compliance profile configuration and application
US7970386B2 (en)2005-06-032011-06-28Good Technology, Inc.System and method for monitoring and maintaining a wireless device
US7590403B1 (en)2005-06-072009-09-15Good Technology, Inc.Wireless device dormancy override
US9418040B2 (en)2005-07-072016-08-16Sciencelogic, Inc.Dynamically deployable self configuring distributed network management system
US7991764B2 (en)2005-07-222011-08-02Yogesh Chunilal RathodMethod and system for communication, publishing, searching, sharing and dynamically providing a journal feed
US7697942B2 (en)2005-09-022010-04-13Stevens Gilman RLocation based rules architecture systems and methods
US20070093243A1 (en)2005-10-252007-04-26Vivek KapadekarDevice management system
IL171722A (en)2005-11-012011-12-29Eci Telecom LtdAccess system for the provisioning of different communication services and method for using same
US20070130473A1 (en)2005-12-022007-06-07Mazotas James SSystem and method for access control
US20070136492A1 (en)2005-12-082007-06-14Good Technology, Inc.Method and system for compressing/decompressing data for communication with wireless devices
US7836303B2 (en)2005-12-092010-11-16University Of WashingtonWeb browser operating system
US8321947B2 (en)2005-12-152012-11-27Emc CorporationMethod and system for dynamically generating a watermarked document during a printing or display operation
US8006289B2 (en)2005-12-162011-08-23International Business Machines CorporationMethod and system for extending authentication methods
US20070143851A1 (en)2005-12-212007-06-21FiberlinkMethod and systems for controlling access to computing resources based on known security vulnerabilities
US8150816B2 (en)*2005-12-292012-04-03Nextlabs, Inc.Techniques of optimizing policies in an information management system
US9942271B2 (en)2005-12-292018-04-10Nextlabs, Inc.Information management system with two or more interactive enforcement points
US8621549B2 (en)2005-12-292013-12-31Nextlabs, Inc.Enforcing control policies in an information management system
JP2007213397A (en)*2006-02-102007-08-23Fuji Xerox Co LtdData management program, data management device and switching method of protocol
US7702322B1 (en)2006-02-272010-04-20Good Technology, LlcMethod and system for distributing and updating software in wireless devices
US7620392B1 (en)2006-02-272009-11-17Good Technology, Inc.Method and system for distributing and updating software in wireless devices
US7917641B2 (en)2006-03-142011-03-29Tangoe, Inc.Apparatus and method for provisioning wireless data communication devices
US9489422B2 (en)2006-03-312016-11-08Good Technology CorporationSystem and method for searching disparate datastores via a remote device
US20070261099A1 (en)2006-05-022007-11-08Broussard Scott JConfidential content reporting system and method with electronic mail verification functionality
US7904718B2 (en)2006-05-052011-03-08Proxense, LlcPersonal digital key differentiation for secure transactions
US9002018B2 (en)2006-05-092015-04-07Sync Up Technologies CorporationEncryption key exchange system and method
JP4825050B2 (en)2006-05-122011-11-30ヤフー株式会社 Method and system for obtaining moving means from position information
US8601102B1 (en)2006-05-312013-12-03Juniper Networks, Inc.Dynamic access management for network security
US8989778B2 (en)2006-06-012015-03-24Green Dot CorporationSecure and private location sharing for location-aware mobile communication devices
US8745227B2 (en)2006-06-072014-06-03Apple Inc.Distributed secure content delivery
US7917963B2 (en)2006-08-092011-03-29Antenna Vaultus, Inc.System for providing mobile data security
US8611928B1 (en)2006-08-232013-12-17Aol Inc.Location-based parental controls
US7823186B2 (en)2006-08-242010-10-26Novell, Inc.System and method for applying security policies on multiple assembly caches
US8201216B2 (en)2006-09-112012-06-12Interdigital Technology CorporationTechniques for database structure and management
US20090298514A1 (en)2006-09-142009-12-03Shah UllahReal world behavior measurement using identifiers specific to mobile devices
US8000692B2 (en)2006-09-192011-08-16Microsoft CorporationMobile device manners propagation and compliance
US8046823B1 (en)2006-10-032011-10-25Stamps.Com Inc.Secure application bridge server
US7769394B1 (en)2006-10-062010-08-03Sprint Communications Company L.P.System and method for location-based device control
US8095124B2 (en)*2006-10-202012-01-10Verizon Patent And Licensing Inc.Systems and methods for managing and monitoring mobile data, content, access, and usage
US8538028B2 (en)2006-11-202013-09-17Toposis CorporationSystem and method for secure electronic communication services
US20080134296A1 (en)2006-11-302008-06-05Ofer AmitaiSystem and method of network authorization by scoring
GB2446199A (en)2006-12-012008-08-06David IrvineSecure, decentralised and anonymous peer-to-peer network
US9411976B2 (en)2006-12-012016-08-09Maidsafe FoundationCommunication system and method
US7895296B1 (en)2006-12-292011-02-22Google, Inc.Local storage for web based native applications
US20080160984A1 (en)2006-12-302008-07-03Motorola, Inc.Method and apparatus for altering mobile device behavior based on rfid tag discovery
US20080168030A1 (en)*2007-01-052008-07-10Stonestreet One, Inc.Method and system for identifying and selecting a wireless device or network for connection
US9324074B2 (en)2007-01-172016-04-26Eagency, Inc.Mobile communication device monitoring systems and methods
US8127133B2 (en)2007-01-252012-02-28Microsoft CorporationLabeling of data objects to apply and enforce policies
US9451009B2 (en)2007-02-192016-09-20Appcentral, Inc.Methods and system to create applications and distribute applications to a remote device
US8687536B2 (en)2007-02-232014-04-01Qualcomm IncorporatedMethod and apparatus to create multicast groups based on proximity
US8181206B2 (en)2007-02-282012-05-15Time Warner Cable Inc.Personal content server apparatus and methods
US20080228504A1 (en)2007-03-132008-09-18Nguyen Binh QTechnique to Deflect Incident Ticket Submission in Real-Time
US8472874B2 (en)2007-03-142013-06-25Apple Inc.Method and system for pairing of wireless devices using physical presence
US8225085B2 (en)2007-06-052012-07-17Blue Coat Systems, Inc.System and method for distributed SSL processing between co-operating nodes
US20080318548A1 (en)2007-06-192008-12-25Jose BravoMethod of and system for strong authentication and defense against man-in-the-middle attacks
US8561148B2 (en)*2008-06-262013-10-15Citrix Systems, Inc.Methods and systems for interactive evaluation using dynamically generated, interactive resultant sets of policies
US8060074B2 (en)2007-07-302011-11-15Mobile Iron, Inc.Virtual instance architecture for mobile device management systems
US9225823B2 (en)2007-08-312015-12-29Sony CorporationPortable electronic devices and methods for downloading applications based on presence of the portable electronic device in a defined geographical region
US9417934B2 (en)*2007-08-312016-08-16Core Wireless Licensing S.A.R.L.Information distribution in a dynamic multi-device environment
US8379867B2 (en)2007-09-242013-02-19Mymail Technology, LlcSecure email communication system
US8160247B2 (en)2007-09-272012-04-17Adobe Systems IncorporatedProviding local storage service to applications that run in an application execution environment
US7890743B2 (en)2007-09-282011-02-15Avaya Inc.Method and apparatus for configuring a device based on proximity to another device
US8456293B1 (en)2007-10-222013-06-04Alarm.Com IncorporatedProviding electronic content based on sensor data
EP2218015A4 (en)2007-11-052012-08-08Visto CorpService management system for providing service related message prioritization in a mobile client
JP5172405B2 (en)2007-11-152013-03-27ソニー株式会社 Wireless communication apparatus, wireless communication system, program, and wireless communication method
US8677141B2 (en)2007-11-232014-03-18Microsoft CorporationEnhanced security and performance of web applications
US8051491B1 (en)*2007-12-102011-11-01Amazon Technologies, Inc.Controlling use of computing-related resources by multiple independent parties
US20090186633A1 (en)2008-01-172009-07-23Garmin Ltd.Location-based profile-adjusting system and method for electronic device
US11159909B2 (en)2008-02-052021-10-26Victor Thomas AndersonWireless location establishing device
US8447303B2 (en)2008-02-072013-05-21Research In Motion LimitedMethod and system for automatic seamless mobility
US9185554B2 (en)2008-02-152015-11-10Appcentral, Inc.System and methods to store, retrieve, manage, augment and monitor applications on appliances
US20090222880A1 (en)2008-03-032009-09-03Tresys Technology, LlcConfigurable access control security for virtualization
GB2458568B (en)2008-03-272012-09-19Covertix LtdSystem and method for dynamically enforcing security policies on electronic files
WO2009145987A2 (en)2008-03-302009-12-03Symplified, Inc.System, method, and apparatus for single sign-on and managing access to resources across a network
US20090260064A1 (en)2008-04-152009-10-15Problem Resolution Enterprise, LlcMethod and process for registering a device to verify transactions
US8209744B2 (en)2008-05-162012-06-26Microsoft CorporationMobile device assisted secure computer network communication
US8910255B2 (en)2008-05-272014-12-09Microsoft CorporationAuthentication for distributed secure content management system
US8353044B1 (en)*2008-06-272013-01-08Symantec CorporationMethods and systems for computing device remediation
JP5383335B2 (en)2008-07-032014-01-08キヤノン株式会社 Data transmission apparatus, transmission control method, and program
US8763071B2 (en)2008-07-242014-06-24Zscaler, Inc.Systems and methods for mobile application security classification and enforcement
EP2342652A4 (en)2008-09-052012-05-30Visto CorpSystem, apparatus and associated methodology for enriching contact of a remote client
US8555351B2 (en)2008-09-292013-10-08International Business Machines CorporationTrusted database authentication through an untrusted intermediary
US20100087144A1 (en)2008-10-022010-04-08Roni KorenshteinShort Range Exchange of Information
JP4730421B2 (en)2008-10-102011-07-20ソニー株式会社 Wireless communication method
US8863268B2 (en)2008-10-292014-10-14Dell Products, LpSecurity module and method within an information handling system
BRPI0823115A2 (en)2008-11-042015-06-16Nokia Siemens Networks Oy Service Access Control
US8346234B2 (en)2008-11-082013-01-01Absolute Software CorporationSecure platform management with power savings capacity
US8260320B2 (en)2008-11-132012-09-04Apple Inc.Location specific content
US8909925B2 (en)2008-11-172014-12-09Prakash BaskaranSystem to secure electronic content, enforce usage policies and provide configurable functionalities
US8219536B2 (en)2008-11-252012-07-10At&T Intellectual Property I, L.P.Systems and methods to select media content
US8156435B2 (en)2008-11-252012-04-10At&T Intellectual Property I, L.P.Systems and methods to select media content
US20100138667A1 (en)2008-12-012010-06-03Neil Patrick AdamsAuthentication using stored biometric data
US8972496B2 (en)*2008-12-102015-03-03Amazon Technologies, Inc.Content sharing
US8412957B2 (en)2008-12-162013-04-02SAP France S.A.Encryption and decryption of records in accordance with group access vectors
US8560645B2 (en)2009-01-272013-10-15Watchguard Technologies, Inc.Location-aware configuration
US9557889B2 (en)2009-01-282017-01-31Headwater Partners I LlcService plan design, user interfaces, application programming interfaces, and device management
US8392972B2 (en)2009-02-112013-03-05Sophos PlcProtected access control method for shared computer resources
US20100212016A1 (en)2009-02-182010-08-19Microsoft CorporationContent protection interoperrability
US20100222645A1 (en)2009-02-272010-09-02Verizon Patent And Licensing Inc.Health and wellness monitoring system
US8688078B2 (en)2009-03-052014-04-01Centurylink Intellectual Property LlcSystem and method for mobile service geochronous validation
JPWO2010106772A1 (en)2009-03-172012-09-20日本電気株式会社 Distributed processing system and distributed processing method
US8214645B2 (en)2009-04-082012-07-03Research In Motion LimitedSystems, devices, and methods for securely transmitting a security parameter to a computing device
US8171292B2 (en)2009-04-082012-05-01Research In Motion LimitedSystems, devices, and methods for securely transmitting a security parameter to a computing device
US8332350B2 (en)2009-04-082012-12-11Titus Inc.Method and system for automated security access policy for a document management system
US8380170B2 (en)2009-04-122013-02-19Kristine A. WilsonCellular device identification and location with emergency number selectivity enforcement (CILENSE)
US9197417B2 (en)2009-04-242015-11-24Microsoft Technology Licensing, LlcHosted application sandbox model
US20100299152A1 (en)2009-05-202010-11-25Mobile Iron, Inc.Selective Management of Mobile Devices in an Enterprise Environment
US8695058B2 (en)2009-05-202014-04-08Mobile Iron, Inc.Selective management of mobile device data in an enterprise environment
US8898748B2 (en)2009-05-212014-11-25Mobile Iron, Inc.Remote verification for configuration updates
US20100299362A1 (en)2009-05-242010-11-25Roger Frederick OsmondMethod for controlling access to data containers in a computer system
US20100317371A1 (en)2009-06-122010-12-16Westerinen William JContext-based interaction model for mobile devices
US8032666B2 (en)2009-06-122011-10-04Microsoft CorporationLocation enabled bookmark and profile
US9047458B2 (en)2009-06-192015-06-02Deviceauthority, Inc.Network access protection
US8214862B1 (en)2009-07-132012-07-03Sprint Communications Company L.P.Conserving bandwidth by restricting videos communicated in a wireless telecommunications network
US8706272B2 (en)2009-08-142014-04-22Apple Inc.Adaptive encoding and compression of audio broadcast data
WO2011022053A1 (en)2009-08-182011-02-24Errol David NaimanSystem and methods for device management
US20110055891A1 (en)2009-08-262011-03-03Rice Christopher TDevice security
US8984657B2 (en)2009-09-082015-03-17Appcentral, Inc.System and method for remote management of applications downloaded to a personal portable wireless appliance
US8744490B2 (en)2009-12-032014-06-03Osocad Remote Limited Liability CompanySystem and method for migrating agents between mobile devices
EP2515473B1 (en)2009-12-142019-03-06Sumitomo Electric Industries, Ltd.Content reception apparatus, content playback apparatus, content reception and playback apparatus, content reception method, and program
JP5370131B2 (en)2009-12-222013-12-18セイコーエプソン株式会社 Image display apparatus and control method
CN102111759A (en)2009-12-282011-06-29中国移动通信集团公司Authentication method, system and device
WO2011100767A1 (en)2010-02-152011-08-18Openwave Systems Inc.Scripting/proxy systems, methods and circuit arrangements
US8166106B2 (en)2010-04-152012-04-24Microsoft CorporationTargeting applications based on mobile operator
US9135434B2 (en)2010-04-192015-09-15Appcentral, Inc.System and method for third party creation of applications for mobile appliances
JP5483569B2 (en)2010-04-272014-05-07Kddi株式会社 Terminal control system, terminal control method and program
US8411834B2 (en)2010-04-272013-04-02Cox Communications, Inc.Device-to-device call disposition
EP2980695B1 (en)2010-05-092017-04-12Citrix Systems, Inc.Methods and systems for forcing an application to store data in a secure storage location
US8560151B2 (en)2010-05-112013-10-15Cartasite, Inc.Dynamic monitoring of mobile railway car undercarriage
US9350708B2 (en)2010-06-012016-05-24Good Technology CorporationSystem and method for providing secured access to services
US8447986B2 (en)2010-06-232013-05-21Microsoft CorporationAccessing restricted content based on proximity
US9558476B2 (en)2010-07-012017-01-31Good Technology Holdings LimitedMethod and device for editing workspace data objects
US20120011007A1 (en)2010-07-072012-01-12At&T Intellectual Property I, L.P.Mobile Payment Using DTMF Signaling
KR101763747B1 (en)2010-08-192017-08-01삼성전자 주식회사Method and system for bluetooth communication
KR101814600B1 (en)2010-08-262018-01-30삼성전자주식회사Method and apparatus for connecting communication
US20120094639A1 (en)2010-10-152012-04-19Mark CarlsonHeat maps applying location-based information to transaction processing data
US9576068B2 (en)2010-10-262017-02-21Good Technology Holdings LimitedDisplaying selected portions of data sets on display devices
US9071580B2 (en)2010-11-012015-06-30Blackberry LimitedMethod and system for securing data of a mobile communications device
US20120203620A1 (en)2010-11-082012-08-09Douglas Howard DobynsTechniques For Wireless Communication Of Proximity Based Marketing
US8560648B2 (en)2010-11-102013-10-15Microsoft CorporationLocation control service
EP2453631B1 (en)*2010-11-152016-06-22BlackBerry LimitedData source based application sandboxing
US8504831B2 (en)2010-12-072013-08-06At&T Intellectual Property I, L.P.Systems, methods, and computer program products for user authentication
US20120150577A1 (en)2010-12-142012-06-14Microsoft CorporationMeeting lifecycle management
US9037395B2 (en)2010-12-202015-05-19Tomtom International B.V.Mobile device that operates differently in different regions
EP2666264B1 (en)2011-01-202017-04-19Nec CorporationCommunication system, control device, policy management device, communication method, and program
US8898742B2 (en)*2011-10-112014-11-25Paramount Pictures CorporationSystems and methods for controlling access to content distributed over a network
US8566923B2 (en)2011-02-012013-10-22Rockwell Automation Technologies, Inc.Enhanced organization and automatic navigation of display screens facilitating automation control
US20120246719A1 (en)2011-03-212012-09-27International Business Machines CorporationSystems and methods for automatic detection of non-compliant content in user actions
US8577391B2 (en)2011-03-312013-11-05Verizon Patent And Licensing Inc.Providing a location-based service using real-time radio access network (RAN) modeling
WO2012142088A1 (en)2011-04-122012-10-18Citrix Systems, Inc.Server remotely executing an application using geographic location data of a mobile device
GB2490310A (en)2011-04-182012-10-31Nearfield Comm LtdMethod and system for controlling access to a service.
US8789133B2 (en)2011-04-202014-07-22Cisco Technology, Inc.Location based content filtering and dynamic policy
US20120290544A1 (en)2011-05-092012-11-15International Business Machines CorporationData compliance management
US8958559B2 (en)2011-06-032015-02-17Apple Inc.System and method for secure instant messaging
US9119067B2 (en)2011-06-032015-08-25Apple Inc.Embodiments of a system and method for securely managing multiple user handles across multiple data processing devices
US9078128B2 (en)2011-06-032015-07-07Apple Inc.System and method for secure identity service
US20120331527A1 (en)2011-06-222012-12-27TerraWi, Inc.Multi-layer, geolocation-based network resource access and permissions
US8875222B1 (en)2011-06-302014-10-28Emc CorporationEfficient XACML access control processing
EP2727042B1 (en)2011-07-012016-04-06Fiberlink Communications CorporationRules based actions for mobile device management
US8423511B1 (en)2011-07-072013-04-16Symantec CorporationSystems and methods for securing data on mobile devices
EP2729894B1 (en)2011-07-102021-04-14Blendology LimitedAn electronic data sharing device and method of use
BR112014000608A2 (en)2011-07-102017-02-14Blendology Ltd an electronic data sharing device and mode of use
US20140222504A1 (en)2011-07-102014-08-07Blendology LimitedElectronic data sharing device and method of use
CA2878748A1 (en)2011-07-102013-01-17Blendology LimitedAn electronic data sharing device and method of use
IL214209A0 (en)2011-07-202012-01-31Israel Aerospace Ind LtdSystem and method for location based control of elements of a mobile communication device
US8850536B2 (en)2011-08-052014-09-30Safefaces LLCMethods and systems for identity verification in a social network using ratings
US8699998B2 (en)2011-08-102014-04-15Qualcomm IncorporatedControlling text messages on a mobile device
US8571538B2 (en)2011-08-102013-10-29Qualcomm IncorporatedWeb-based parental controls for wireless devices
US20130045729A1 (en)2011-08-172013-02-21Microsoft CorporationLocation-based promotion of applications
US8898750B2 (en)2011-08-232014-11-25Cisco Technology, Inc.Connecting remote and local networks using an identification device associated with the remote network
US9659165B2 (en)2011-09-062017-05-23Crimson CorporationMethod and apparatus for accessing corporate data from a mobile device
US8756348B2 (en)*2011-09-142014-06-17Barco N.V.Electronic tool and methods for meetings
MY183320A (en)2011-09-192021-02-18E Lock Corp Sdn BhdMethod of controlling access to an internet-based application
US8756651B2 (en)2011-09-272014-06-17Amazon Technologies, Inc.Policy compliance-based secure data access
US9043480B2 (en)*2011-10-112015-05-26Citrix Systems, Inc.Policy-based application management
US9137262B2 (en)*2011-10-112015-09-15Citrix Systems, Inc.Providing secure mobile device access to enterprise resources using application tunnels
US8959572B2 (en)*2011-10-282015-02-17Google Inc.Policy enforcement of client devices
US8689281B2 (en)2011-10-312014-04-01Hewlett-Packard Development Company, L.P.Management of context-aware policies
US8713646B2 (en)2011-12-092014-04-29Erich StuntebeckControlling access to resources on a network
US9171146B2 (en)2011-12-142015-10-27Intel CorporationMethod and system for monitoring calls to an application program interface (API) function
US8622836B2 (en)2011-12-222014-01-07IgtUse of wireless signal strength to determine connection
US9009794B2 (en)2011-12-302015-04-14Rovi Guides, Inc.Systems and methods for temporary assignment and exchange of digital access rights
KR101595431B1 (en)2012-01-162016-02-18엘지전자 주식회사Method and apparatus for providing proximity service in wireless communication system
US20140053250A1 (en)*2012-02-102014-02-20University Of Utah Research FoundationAccess to Web Application via a Mobile Computing Device
US9705813B2 (en)2012-02-142017-07-11Airwatch, LlcControlling distribution of resources on a network
US9680763B2 (en)2012-02-142017-06-13Airwatch, LlcControlling distribution of resources in a network
US20130226696A1 (en)2012-02-242013-08-29Meetme, Inc.Social discovery system using computing device proximity
US8774041B2 (en)2012-03-022014-07-08Qualcomm IncorporatedProximity-based wireless handshaking for connection establishment
US8769003B2 (en)2012-05-092014-07-01Qualcomm Innovation Center, Inc.Method for proximity determination between mobile peers while maintaining privacy
BR102012010913A2 (en)2012-05-092014-05-13Hangar 4 Projetos Ltda METHOD FOR DATA COMMUNICATION BETWEEN DEVICES THROUGH SOUND WAVES
US8577392B1 (en)2012-06-132013-11-05Apple Inc.System and method of determining location of wireless communication devices/persons for controlling/adjusting operation of devices based on the location
US8732792B2 (en)*2012-06-202014-05-20Ricoh Company, Ltd.Approach for managing access to data on client devices
US20140053229A1 (en)*2012-08-152014-02-20Appsense LimitedSystems and Methods for Policy Propagation and Enforcement
US9805173B2 (en)2012-08-242017-10-31Sony CorporationInformation processing device, information storage device, server, information processing system, information processing method and medium for reproduction of encrypted content
US8862155B2 (en)2012-08-302014-10-14Time Warner Cable Enterprises LlcApparatus and methods for enabling location-based services within a premises
KR101974820B1 (en)2012-09-102019-08-23삼성전자주식회사Method for controlling a device and device performing the same
US10042603B2 (en)2012-09-202018-08-07Samsung Electronics Co., Ltd.Context aware service provision method and apparatus of user device
US8770484B2 (en)2012-09-212014-07-08Alcatel LucentData exchange using streamed barcodes
US8990895B2 (en)2012-09-232015-03-24Farhad David NosratiMethod and apparatus for a portable wireless security device
US20140096180A1 (en)2012-09-282014-04-03Ansuya NegiSystem, devices, and methods for proximity-based parental controls
US8933778B2 (en)2012-09-282015-01-13Intel CorporationMobile device and key fob pairing for multi-factor security
US8904186B2 (en)2012-09-282014-12-02Intel CorporationMulti-factor authentication process
US9253811B2 (en)2012-10-192016-02-02Verizon Patent And Licensing Inc.Network-assisted device-to-device communication
US9496971B2 (en)2012-12-102016-11-15Qualcomm IncorporatedTechniques for determining actual and/or near states of proximity between mobile devices
US9451551B2 (en)2012-12-212016-09-20Apple Inc.Controlling a power state of a cellular packet data subsystem in a portable electronic device
US9910499B2 (en)2013-01-112018-03-06Samsung Electronics Co., Ltd.System and method for detecting three dimensional gestures to initiate and complete the transfer of application data between networked devices
US20140213179A1 (en)2013-01-292014-07-31Einar RosenbergSystem and Method for Establishing Communications between Two Devices
US9848276B2 (en)2013-03-112017-12-19Rovi Guides, Inc.Systems and methods for auto-configuring a user equipment device with content consumption material
US9247014B1 (en)2013-03-132016-01-26Intellectual Ventures Fund 79 LlcMethods, devices, and mediums associated with recommending user applications
US9432361B2 (en)2013-03-132016-08-30Lookout, Inc.System and method for changing security behavior of a device based on proximity to another device
US10754966B2 (en)2013-04-132020-08-25Airwatch LlcTime-based functionality restrictions
US9058495B2 (en)2013-05-162015-06-16Airwatch LlcRights management services integration with mobile device management
US10251059B2 (en)2014-01-212019-04-02Everykey Inc.Authentication device and method
US10025612B2 (en)2016-03-182018-07-17Airwatch LlcEnforcing compliance rules against hypervisor and host device using guest management components

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030164853A1 (en)*2000-12-292003-09-04Min ZhuDistributed document sharing
US20060067250A1 (en)*2004-09-302006-03-30Boyer David GMethod and apparatus for launching a conference based on presence of invitees
US20070162417A1 (en)*2006-01-102007-07-12Kabushiki Kaisha ToshibaSystem and method for selective access to restricted electronic documents
US20080065727A1 (en)*2006-09-132008-03-13Majors Kenneth DConferencing system with improved access
US20100100972A1 (en)*2008-08-082010-04-22Jacques LemieuxApproaches for a location aware client
US20110135083A1 (en)*2009-12-042011-06-09Charles Steven LingafeltMethods to Improve Fraud Detection on Conference Calling Systems Based on Observation of Participants' Call Time Durations
US20110141276A1 (en)*2009-12-142011-06-16Apple Inc.Proactive Security for Mobile Devices
US20140237041A1 (en)*2013-02-192014-08-21Cisco Technology, Inc.Automatic future meeting scheduler based upon locations of meeting participants

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"Secret Sharing" by Wikipedia, January 10, 2012.*

Cited By (78)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10684736B2 (en)*2007-02-132020-06-16Visual Targeting CorporationMethod for defining a presentation format targetable to a demographic
US10726126B2 (en)2008-12-192020-07-28Samsung Electronics Co., Ltd.System and method for ensuring compliance with organizational policies
US9124493B2 (en)2008-12-192015-09-01Openpeak Inc.System and method for ensuring compliance with organizational polices
US10187347B2 (en)*2010-10-082019-01-22Brian Lee MoffatData sharing system method
US20170054674A1 (en)*2010-10-082017-02-23Brian Lee MoffatData sharing system method
US10587563B2 (en)*2010-10-082020-03-10Brian Lee MoffatPrivate data sharing system
US9165139B2 (en)2011-10-102015-10-20Openpeak Inc.System and method for creating secure applications
US9135418B2 (en)2011-10-102015-09-15Openpeak Inc.System and method for creating secure applications
US9535411B2 (en)*2012-03-052017-01-03Siemens AktiengesellschaftCloud enabled building automation system
US20130274940A1 (en)*2012-03-052013-10-17Siemens CorporationCloud enabled building automation system
US11847495B2 (en)2013-03-152023-12-19Advanced Elemental Technologies, Inc.Systems and methods configured to enable an operating system for connected computing that supports user use of suitable to user purpose resources sourced from one or more resource ecospheres
US12282557B2 (en)2013-03-152025-04-22Advanced Elemental Technologies, Inc.Methods and systems for secure and reliable identity-based computing
US11822662B2 (en)2013-03-152023-11-21Advanced Elemental Technologies, Inc.Methods and systems for secure and reliable identity-based computing
US11528233B2 (en)*2013-03-152022-12-13Advanced Elemental Technologies, Inc.Systems and methods for establishing a user purpose fulfillment computing platform
US10699201B2 (en)*2013-06-042020-06-30Ent. Services Development Corporation LpPresenting relevant content for conversational data gathered from real time communications at a meeting based on contextual data associated with meeting participants
US9497194B2 (en)*2013-09-062016-11-15Oracle International CorporationProtection of resources downloaded to portable devices from enterprise systems
US20150074813A1 (en)*2013-09-062015-03-12Oracle International CorporationProtection of resources downloaded to portable devices from enterprise systems
US10798076B2 (en)*2013-09-232020-10-06Airwatch, LlcSecurely authorizing access to remote resources
US20190238526A1 (en)*2013-09-232019-08-01Airwatch, LlcSecurely authorizing access to remote resources
US11570160B2 (en)2013-09-232023-01-31Airwatch, LlcSecurely authorizing access to remote resources
US9185099B2 (en)*2013-09-232015-11-10Airwatch LlcSecurely authorizing access to remote resources
US20140201816A1 (en)*2013-09-232014-07-17Sky Socket, LlcSecurely Authorizing Access to Remote Resources
US10257180B2 (en)2013-09-232019-04-09Airwatch LlcSecurely authorizing access to remote resources
US9769141B2 (en)2013-09-232017-09-19Airwatch LlcSecurely authorizing access to remote resources
US20150120930A1 (en)*2013-10-312015-04-30Aruba Networks.ComProvisioning access point bandwidth based on predetermined events
US9591562B2 (en)*2013-10-312017-03-07Aruba Networks, Inc.Provisioning access point bandwidth based on predetermined events
US9781123B2 (en)*2014-04-252017-10-03Samsung Electronics Co., Ltd.Methods of providing social network service and server performing the same
US20150312260A1 (en)*2014-04-252015-10-29Samsung Electronics Co., Ltd.Methods of providing social network service and server performing the same
US10063592B1 (en)*2014-06-062018-08-28Amazon Technologies, Inc.Network authentication beacon
US9723003B1 (en)*2014-06-062017-08-01Amazon Technologies, Inc.Network beacon based credential store
US10129299B1 (en)*2014-06-062018-11-13Amazon Technologies, Inc.Network beacon management of security policies
US10410154B2 (en)2014-09-052019-09-10Vmware, Inc.Method and system for enabling data usage accounting through a relay
US9232013B1 (en)2014-09-052016-01-05Openpeak Inc.Method and system for enabling data usage accounting
US9232012B1 (en)2014-09-052016-01-05Openpeak Inc.Method and system for data usage accounting in a computing device
US9106538B1 (en)2014-09-052015-08-11Openpeak Inc.Method and system for enabling data usage accounting through a relay
US9100390B1 (en)2014-09-052015-08-04Openpeak Inc.Method and system for enrolling and authenticating computing devices for data usage accounting
US10943198B2 (en)2014-09-052021-03-09Vmware, Inc.Method and system for enabling data usage accounting through a relay
US9350818B2 (en)2014-09-052016-05-24Openpeak Inc.Method and system for enabling data usage accounting for unreliable transport communication
US20160239489A1 (en)*2015-02-172016-08-18International Business Machines CorporationElectronic meeting question management
US9753927B2 (en)*2015-02-172017-09-05International Business Machines CorporationElectronic meeting question management
US9720917B2 (en)*2015-02-172017-08-01International Business Machines CorporationElectronic meeting question management
US20160239537A1 (en)*2015-02-172016-08-18International Business Machines CorporationElectronic meeting question management
US10599703B2 (en)*2015-02-172020-03-24International Business Machines CorporationElectronic meeting question management
US9232078B1 (en)2015-03-162016-01-05Openpeak Inc.Method and system for data usage accounting across multiple communication networks
US20160285991A1 (en)*2015-03-262016-09-29International Business Machines CorporationCollaborative based caching
US9967358B2 (en)*2015-03-262018-05-08International Business Machines CorporationCollaborative based caching
US11038687B2 (en)*2015-08-212021-06-15PushPull Technology LimitedData collaboration
US20180183810A1 (en)*2015-08-212018-06-28PushPull Technology LimitedData Collaboration
US10558784B2 (en)*2015-09-042020-02-11Cisco Technology, Inc.Time and motion data fusion for determining and remedying issues based on physical presence
US20170068793A1 (en)*2015-09-042017-03-09Cisco Technology, Inc.Time and motion data fusion for determining and remedying issues based on physical presence
US10298577B1 (en)*2016-03-312019-05-21Amazon Technologies, Inc.Credential vending to processes
US10477558B2 (en)*2016-07-052019-11-12Fujitsu LimitedInformation processing system, server, and terminal device
US20180014295A1 (en)*2016-07-052018-01-11Fujitsu LimitedInformation processing system, server, and terminal device
US11477096B2 (en)2016-10-182022-10-18Airwatch LlcFederated mobile device management
US10326671B2 (en)*2016-10-182019-06-18Airwatch LlcFederated mobile device management
US10587485B2 (en)2016-10-182020-03-10Airwatch LlcFederated mobile device management
US11240316B1 (en)*2017-04-112022-02-01Wells Fargo Bank, N.A.Systems and methods for optimizing information collaboration
US11388245B1 (en)2017-04-112022-07-12Wells Fargo Bank, N.A.Systems and methods for content delivery
US11310008B2 (en)*2017-10-232022-04-19Kyocera CorporationData transmission with multiple numerologies for multiple devices with common geographical location dependent control information
US11038886B1 (en)*2018-02-082021-06-15Wells Fargo Bank, N.A.Compliance management system
US12052251B1 (en)2018-02-082024-07-30Wells Fargo Bank, N.A.Compliance management system
US11392467B2 (en)2019-04-172022-07-19Microsoft Technology Licensing, LlcFailover between decentralized identity stores
US11190512B2 (en)2019-04-172021-11-30Microsoft Technology Licensing, LlcIntegrity attestation of attestation component
US11381567B2 (en)2019-04-292022-07-05Microsoft Technology Licensing, LlcExecution of an application within a scope of user-granted permission
US11429743B2 (en)2019-04-292022-08-30Microsoft Technology Licensing, LlcLocalization of DID-related claims and data
US11411959B2 (en)*2019-05-032022-08-09Microsoft Technology Licensing, LlcExecution of application in a container within a scope of user-granted permission
US11222137B2 (en)2019-05-032022-01-11Microsoft Technology Licensing, LlcStoring and executing an application in a user's personal storage with user granted permission
US11886605B2 (en)*2019-09-302024-01-30Red Hat, Inc.Differentiated file permissions for container users
US11722491B1 (en)*2020-06-302023-08-08Amazon Technologies, Inc.Cumulative risk-based scoring for quorum authorization
US11914696B1 (en)2020-09-302024-02-27Amazon Technologies, Inc.Quorum-based access control management
US11783073B2 (en)*2021-06-212023-10-10Microsoft Technology Licensing, LlcConfiguration of default sensitivity labels for network file storage locations
US20220405412A1 (en)*2021-06-212022-12-22Microsoft Technology Licensing, LlcConfiguration of default sensitivity labels for network file storage locations
US20230089451A1 (en)*2021-09-222023-03-23Fujifilm Business Innovation Corp.Online conference apparatus and online conference method
US12111902B2 (en)2022-05-202024-10-08Advanced Elemental Technologies, Inc.Systems and methods for a connected computing resource and event/activity identification information infrastructure using near existential or existential biometric identification of humans
US12259958B2 (en)2022-05-202025-03-25Advanced Elemental Technologies, Inc.Systems and methods for a connected computing resource and event/activity identification information infrastructure using near existential or existential biometric identification of humans
US11855996B1 (en)2022-12-192023-12-26Uab 360 ItSystems and methods for controlling access
US11855999B1 (en)2022-12-192023-12-26Uab 360 ItSystems and methods for controlling access
US11652823B1 (en)*2022-12-192023-05-16Uab 360 ItSystems and methods for controlling access

Also Published As

Publication numberPublication date
US20170155660A1 (en)2017-06-01
US11824644B2 (en)2023-11-21

Similar Documents

PublicationPublication DateTitle
US11824644B2 (en)Controlling electronically communicated resources
US10116583B2 (en)Controlling resources used by computing devices
US10075849B2 (en)Secure distribution of electronic content
US9401915B2 (en)Secondary device as key for authorizing access to resources
AU2018250465B2 (en)Secondary device as key for authorizing access to resources
US10084789B2 (en)Peer to peer enterprise file sharing
US10257194B2 (en)Distribution of variably secure resources in a networked environment
US9247432B2 (en)Systems and methods for controlling network access
US20130212278A1 (en)Controlling distribution of resources in a network
CN112840339A (en)Progressive access to data and device functionality
US11038687B2 (en)Data collaboration
CN107534664B (en)Multi-factor authorization for IEEE802.1X enabled networks
US9584508B2 (en)Peer to peer enterprise file sharing
US9571288B2 (en)Peer to peer enterprise file sharing
US20210097023A1 (en)Decentralized Data System
WO2023141864A1 (en)Conference data transmission method, apparatus and system, electronic device and readable medium

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:SKY SOCKET LLC, GEORGIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:STUNTEBECK, ERICH;DIRICO, JOHN;REEL/FRAME:030003/0005

Effective date:20130314

ASAssignment

Owner name:AIRWATCH LLC, GEORGIA

Free format text:MERGER;ASSIGNOR:SKY SOCKET, LLC;REEL/FRAME:033369/0291

Effective date:20140623

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp