Movatterモバイル変換


[0]ホーム

URL:


US20140297840A1 - Providing mobile device management functionalities - Google Patents

Providing mobile device management functionalities
Download PDF

Info

Publication number
US20140297840A1
US20140297840A1US14/032,820US201314032820AUS2014297840A1US 20140297840 A1US20140297840 A1US 20140297840A1US 201314032820 AUS201314032820 AUS 201314032820AUS 2014297840 A1US2014297840 A1US 2014297840A1
Authority
US
United States
Prior art keywords
computing device
state information
mobile computing
data
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/032,820
Inventor
Waheed Qureshi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Citrix Systems Inc
Original Assignee
Citrix Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/025,898external-prioritypatent/US9985850B2/en
Application filed by Citrix Systems IncfiledCriticalCitrix Systems Inc
Priority to US14/032,820priorityCriticalpatent/US20140297840A1/en
Assigned to CITRIX SYSTEMS, INC.reassignmentCITRIX SYSTEMS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: QURESHI, WAHEED
Publication of US20140297840A1publicationCriticalpatent/US20140297840A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Methods, systems, computer-readable media, and apparatuses for providing mobile device management functionalities are presented. In various embodiments, a mobile device management agent may monitor state information associated with a mobile computing device. The monitored state information may be analyzed on the mobile computing device and/or by one or more policy management servers. In some instances, the one or more policy management servers may provide management information to the mobile computing device, and the management information may include one or more commands (which may, e.g., cause the mobile computing device to enforce one or more policies) and/or one or more policy updates. Subsequently, one or more policies may be enforced on the mobile computing device based on the monitored state information and/or based on the management information.

Description

Claims (24)

1. A method, comprising:
monitoring, by a mobile device management agent on a mobile computing device, state information associated with the mobile computing device; and
controlling a secure document container on the mobile computing device based on the monitored state information,
wherein monitoring the state information includes providing at least some of the monitored state information to one or more policy management servers,
wherein controlling the secure document container includes:
receiving management information from the one or more policy management servers; and
executing at least one command included in the received management information,
wherein the at least one command included in the received management information is generated, for execution on the mobile computing device, by the one or more policy management servers based on one or more policies and the at least some of the monitored state information provided to the one or more policy management servers by the mobile device management agent on the mobile computing device, and
wherein controlling the secure document container includes selectively wiping data from the secure document container based on the at least one command included in the received management information.
9. A mobile computing device, comprising:
at least one processor; and
memory storing computer-readable instructions that, when executed by the at least one processor, cause the mobile computing device to:
monitor, via a mobile device management agent on the mobile computing device, state information associated with the mobile computing device; and
control a secure document container on the mobile computing device based on the monitored state information,
wherein monitoring the state information includes providing at least some of the monitored state information to one or more policy management servers,
wherein controlling the secure document container includes:
receiving management information from the one or more policy management servers; and
executing at least one command included in the received management information,
wherein the at least one command included in the received management information is generated, for execution on the mobile computing device, by the one or more policy management servers based on one or more policies and the at least some of the monitored state information provided to the one or more policy management servers by the mobile device management agent on the mobile computing device, and
wherein controlling the secure document container includes selectively wiping data from the secure document container based on the at least one command included in the received management information.
17. One or more non-transitory computer-readable media having instructions stored thereon that, when executed, cause a mobile computing device to:
monitor, via a mobile device management agent on the mobile computing device, state information associated with the mobile computing device; and
control a secure document container on the mobile computing device based on the monitored state information,
wherein monitoring the state information includes providing at least some of the monitored state information to one or more policy management servers,
wherein controlling the secure document container includes:
receiving management information from the one or more policy management servers; and
executing at least one command included in the received management information,
wherein the at least one command included in the received management information is generated, for execution on the mobile computing device, by the one or more policy management servers based on one or more policies and the at least some of the monitored state information provided to the one or more policy management servers by the mobile device management agent on the mobile computing device, and
wherein controlling the secure document container includes selectively wiping data from the secure document container based on the at least one command included in the received management information.
US14/032,8202013-03-292013-09-20Providing mobile device management functionalitiesAbandonedUS20140297840A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US14/032,820US20140297840A1 (en)2013-03-292013-09-20Providing mobile device management functionalities

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US201361806577P2013-03-292013-03-29
US201361863629P2013-08-082013-08-08
US14/025,898US9985850B2 (en)2013-03-292013-09-13Providing mobile device management functionalities
US14/032,820US20140297840A1 (en)2013-03-292013-09-20Providing mobile device management functionalities

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US14/025,898ContinuationUS9985850B2 (en)2013-03-292013-09-13Providing mobile device management functionalities

Publications (1)

Publication NumberPublication Date
US20140297840A1true US20140297840A1 (en)2014-10-02

Family

ID=51621960

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US14/032,885ActiveUS8910264B2 (en)2013-03-292013-09-20Providing mobile device management functionalities
US14/032,820AbandonedUS20140297840A1 (en)2013-03-292013-09-20Providing mobile device management functionalities

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US14/032,885ActiveUS8910264B2 (en)2013-03-292013-09-20Providing mobile device management functionalities

Country Status (1)

CountryLink
US (2)US8910264B2 (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2016118542A1 (en)*2015-01-212016-07-28Microsoft Technology Licensing, LlcMultiple phase unenrollment for devices under management
WO2017011427A1 (en)*2015-07-152017-01-19Citrix Systems, Inc.Improving performance of a wrapped application
US9692788B2 (en)*2014-05-292017-06-27Blackberry LimitedMethod and system for domain creation and bootstrapping
US10009344B2 (en)*2016-06-292018-06-26Duo Security, Inc.Systems and methods for endpoint management classification
US10198560B2 (en)*2015-03-132019-02-05Citrix Systems, Inc.Enforcing licensing policies using an application wrapper
US10348756B2 (en)2011-09-022019-07-09Duo Security, Inc.System and method for assessing vulnerability of a mobile device
US10412113B2 (en)2017-12-082019-09-10Duo Security, Inc.Systems and methods for intelligently configuring computer security
WO2019213531A1 (en)*2018-05-042019-11-07Citrix Systems, Inc.Systems and methods for an embedded browser
US10542030B2 (en)2015-06-012020-01-21Duo Security, Inc.Method for enforcing endpoint health standards
US10706421B2 (en)2010-03-032020-07-07Duo Security, Inc.System and method of notifying mobile devices to complete transactions after additional agent verification
US11019056B2 (en)2018-01-312021-05-25Sophos LimitedManaging claiming of unrecognized devices for admission to an enterprise network
CN113343210A (en)*2015-01-262021-09-03移动熨斗公司Identity agent providing access control and single sign-on
US11134056B2 (en)2018-01-312021-09-28Sophos LimitedPortal for managing admission of unrecognized devices to an enterprise network
US11172361B2 (en)2010-03-032021-11-09Cisco Technology, Inc.System and method of notifying mobile devices to complete transactions
US11252198B2 (en)*2012-12-282022-02-15Intel CorporationPolicy-based secure containers for multiple enterprise applications
US11310275B2 (en)*2018-01-312022-04-19Sophos LimitedManaging admission of unrecognized devices onto an enterprise network
US11658962B2 (en)2018-12-072023-05-23Cisco Technology, Inc.Systems and methods of push-based verification of a transaction

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9355228B2 (en)2012-07-132016-05-31Angel Secure Networks, Inc.System and method for policy driven protection of remote computing environments
US10129242B2 (en)2013-09-162018-11-13Airwatch LlcMulti-persona devices and management
US9213830B2 (en)2013-12-122015-12-15Microsoft Technology Licensing, LlcManaging applications in non-cooperative environments
US9661024B2 (en)2013-12-122017-05-23Microsoft Technology Licensing, LlcConfiguring applications and policies in non-cooperative environments
US10334425B2 (en)*2014-04-112019-06-25Forcefield Online, Inc.Apparatus and method for controlling operation of a device
US9674853B2 (en)*2014-05-162017-06-06Qualcomm IncorporatedTechniques for managing wireless network connections for traffic aggregation
CA2952108A1 (en)*2014-06-132015-12-17Uber Technologies, Inc.Enforcing policies based on information received from external systems
US10649756B2 (en)*2014-11-262020-05-12Ebay Inc.Centralized client application management
US10803175B2 (en)2015-03-062020-10-13Microsoft Technology Licensing, LlcDevice attestation through security hardened management agent
US9509709B2 (en)*2015-03-192016-11-29International Business Machines CorporationMechanism to augment IPS/SIEM evidence information with process history snapshot and application window capture history
KR20170028672A (en)*2015-09-042017-03-14에스프린팅솔루션 주식회사Method for managing registry of image forming apparatus registered to cloud printing system, and cloud printing system for performing the same
US10419214B2 (en)*2015-12-282019-09-17Dell Products L.P.Mobile device management delegate for managing isolated devices
US10528734B2 (en)2016-03-252020-01-07The Mitre CorporationSystem and method for vetting mobile phone software applications
US20170329966A1 (en)*2016-05-132017-11-16Qualcomm IncorporatedElectronic device based security management
US10721624B2 (en)*2017-02-172020-07-21Global Tel*Link CorporationSecurity system for inmate wireless devices
US12095725B2 (en)*2017-03-222024-09-17Amazon Technologies, Inc.Device credentials management
US10218697B2 (en)*2017-06-092019-02-26Lookout, Inc.Use of device risk evaluation to manage access to services
CN111093183B (en)*2019-11-132022-02-11华为技术有限公司 A mobile device management method and device
US11611882B2 (en)*2020-06-032023-03-21Salesforce.Com, Inc.Automatically integrating security policy in mobile applications at build-time
US11880451B2 (en)*2021-01-292024-01-23Blackberry LimitedSecured code package for browser plugin
US12182297B2 (en)*2021-09-242024-12-31Google LlcData protection for computing device
US20240403405A1 (en)*2023-05-292024-12-05Security Savvy Ltd.Automatic authentication for user-dependent functionality

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20110314534A1 (en)*2010-04-142011-12-22Lee JamesSecured Execution Environments and Methods
US8200626B1 (en)*2009-09-182012-06-12Sprint Communications Company L.P.Mobile device file management
US20130167247A1 (en)*2007-01-192013-06-27Research In Motion LimitedSelectively wiping a remote device
US20140130174A1 (en)*2012-11-082014-05-08International Business Machines CorporationApplication and Data Removal System

Family Cites Families (268)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JPH08263438A (en)1994-11-231996-10-11Xerox CorpDistribution and use control system of digital work and access control method to digital work
US5805803A (en)1997-05-131998-09-08Digital Equipment CorporationSecure web tunnel
US6249866B1 (en)1997-09-162001-06-19Microsoft CorporationEncrypting file system and method
US6151606A (en)1998-01-162000-11-21Visto CorporationSystem and method for using a workspace data manager to access, manipulate and synchronize network data
US6154172A (en)1998-03-312000-11-28Piccionelli; Gregory A.System and process for limiting distribution of information on a communication network based on geographic location
US6158010A (en)1998-10-282000-12-05Crosslogix, Inc.System and method for maintaining security in a distributed computer network
US6609198B1 (en)1999-08-052003-08-19Sun Microsystems, Inc.Log-on service providing credential level change without loss of session continuity
US6356933B2 (en)1999-09-072002-03-12Citrix Systems, Inc.Methods and apparatus for efficiently transmitting interactive application data between a client and a server using markup language
GB2354350B (en)1999-09-172004-03-24Mitel CorpPolicy representations and mechanisms for the control of software
JP4348818B2 (en)2000-03-102009-10-21ソニー株式会社 Data distribution system and method, and data recording medium
US6859879B2 (en)2000-05-262005-02-22International Business Machine CorporationMethod and system for secure pervasive access
GB2366691B (en)2000-08-312002-11-06F Secure OyjWireless device management
US7689510B2 (en)2000-09-072010-03-30Sonic SolutionsMethods and system for use in network management of content
US6883098B1 (en)2000-09-202005-04-19International Business Machines CorporationMethod and computer system for controlling access by applications to this and other computer systems
US20020112047A1 (en)2000-12-052002-08-15Rakesh KushwahaSystem and method for wireless data terminal management using general packet radio service network
US20080214300A1 (en)2000-12-072008-09-04IgtMethods for electronic data security and program authentication
US7904468B2 (en)2008-02-272011-03-08Research In Motion LimitedMethod and software for facilitating interaction with a personal information manager application at a wireless communication device
US7640320B2 (en)2001-01-182009-12-29Yahoo! Inc.Method and system for managing digital content, including streaming media
US6732278B2 (en)2001-02-122004-05-04Baird, Iii Leemon C.Apparatus and method for authenticating access to a network resource
US7437429B2 (en)2001-02-132008-10-14Microsoft CorporationSystem and method for providing transparent access to distributed authoring and versioning files including encrypted files
CA2439373A1 (en)2001-03-142002-09-19Nokia CorporationRealization of presence management
US7302571B2 (en)2001-04-122007-11-27The Regents Of The University Of MichiganMethod and system to maintain portable computer data secure and authentication token for use therein
JP3861625B2 (en)2001-06-132006-12-20ソニー株式会社 Data transfer system, data transfer device, recording device, and data transfer method
US6621766B2 (en)2001-08-012003-09-16Fossil, Inc.Flexible timepiece in multiple environments
DE60223264T2 (en)2001-08-292008-08-14Research In Motion Ltd., Waterloo SYSTEM AND METHOD FOR ADDRESSING A MOBILE DEVICE IN AN IP-BASED WIRELESS NETWORK
US8560709B1 (en)2004-02-252013-10-15F5 Networks, Inc.System and method for dynamic policy based access over a virtual private network
US7631084B2 (en)2001-11-022009-12-08Juniper Networks, Inc.Method and system for providing secure access to private networks with client redirection
US7159120B2 (en)2001-11-192007-01-02Good Technology, Inc.Method and system for protecting data within portable electronic devices
US7950066B1 (en)2001-12-212011-05-24Guardian Data Storage, LlcMethod and system for restricting use of a clipboard application
WO2003060671A2 (en)2002-01-042003-07-24Lab 7 Networks, Inc.Communication security system
JP2003202929A (en)2002-01-082003-07-18Ntt Docomo Inc Delivery method and delivery system
US7873985B2 (en)2002-01-082011-01-18Verizon Services Corp.IP based security applications using location, port and/or device identifier information
AU2003238908A1 (en)2002-06-062003-12-22Green Border TechnologiesMethod and system for implementing a secure application execution environment using derived user accounts for internet content
JP4612416B2 (en)2002-08-092011-01-12ヴィスト・コーポレーション System and method for preventing access to data on compromised remote devices
US7665125B2 (en)2002-09-232010-02-16Heard Robert WSystem and method for distribution of security policies for mobile devices
US7665118B2 (en)2002-09-232010-02-16Credant Technologies, Inc.Server, computer memory, and method to support security policy maintenance and distribution
US7254831B2 (en)2002-12-042007-08-07Microsoft CorporationSharing a sign-in among software applications having secured features
US8332464B2 (en)2002-12-132012-12-11Anxebusiness Corp.System and method for remote network access
US9237514B2 (en)2003-02-282016-01-12Apple Inc.System and method for filtering access points presented to a user and locking onto an access point
US7526800B2 (en)2003-02-282009-04-28Novell, Inc.Administration of protection of data accessible by a mobile device
US7917468B2 (en)2005-08-012011-03-29Seven Networks, Inc.Linking of personal information management data
US9197668B2 (en)2003-02-282015-11-24Novell, Inc.Access control to files based on source information
US8020192B2 (en)2003-02-282011-09-13Michael WrightAdministration of protection of data accessible by a mobile device
AU2003229299A1 (en)2003-05-142005-01-21Threatguard, Inc.System and method for application-level virtual private network
US7492472B2 (en)2003-10-302009-02-17Xerox CorporationMultimedia communications/collaboration hub
US7415498B2 (en)2003-12-102008-08-19International Business Machines CorporationTime limited collaborative community role delegation policy
US20050172241A1 (en)2004-01-082005-08-04International Business Machines CorporationSystem and method for improved direct system clipboard
US7269605B1 (en)2004-02-132007-09-11Avidian TechnologiesPersonal information manager data synchronization and augmentation
JP4665406B2 (en)2004-02-232011-04-06日本電気株式会社 Access control management method, access control management system, and terminal device with access control management function
US7599991B2 (en)2004-03-102009-10-06Microsoft CorporationRules interface for implementing message rules on a mobile computing device
US7509672B1 (en)2004-04-012009-03-24Compuware CorporationCross-platform single sign-on data sharing
CN102355466B (en)2004-04-302016-01-20黑莓有限公司The system and method for deal with data transmission
US7487353B2 (en)2004-05-202009-02-03International Business Machines CorporationSystem, method and program for protecting communication
EP1817686A4 (en)2004-09-132007-12-05Research In Motion LtdEnabling category-based filtering
US8839090B2 (en)2004-09-162014-09-16International Business Machines CorporationSystem and method to capture and manage input values for automatic form fill
US8463946B2 (en)2004-09-172013-06-11Caterpillar Inc.Method for automatic radio operational mode selection
DE102004045147A1 (en)2004-09-172006-03-23Fujitsu Ltd., Kawasaki A setting information distribution apparatus, method, program and medium, authentication setting transfer apparatus, method, program and medium, and setting information receiving program
US7984192B2 (en)2004-09-272011-07-19Citrix Systems, Inc.System and method for assigning unique identifiers to each remote display protocol session established via an intermediary device
US7721328B2 (en)2004-10-012010-05-18Salesforce.Com Inc.Application identity design
US7496954B1 (en)2004-11-222009-02-24Sprint Communications Company L.P.Single sign-on system and method
US20060085826A1 (en)2004-10-182006-04-20Funk James MAggregated program guide for download and view video on demand service
US20090228714A1 (en)2004-11-182009-09-10Biogy, Inc.Secure mobile device with online vault
US8478849B2 (en)2004-12-072013-07-02Pure Networks LLC.Network administration tool
US7900201B1 (en)2004-12-212011-03-01Zenprise, Inc.Automated remedying of problems in software application deployments
US20060141985A1 (en)2004-12-232006-06-29Motorola, Inc.Dynamic management for interface access permissions
US7788535B2 (en)2005-01-282010-08-31Nxp B.V.Means and method for debugging
WO2006093917A2 (en)2005-02-282006-09-08Trust DigitalMobile data security system and methods
EP1705598A3 (en)2005-03-202007-03-07ActivIdentity (Australia) Pty Ltd.Method and system for providing user access to a secure application
US7697737B2 (en)2005-03-252010-04-13Northrop Grumman Systems CorporationMethod and system for providing fingerprint enabled wireless add-on for personal identification number (PIN) accessible smartcards
US7571475B2 (en)2005-04-052009-08-04Cisco Technology, Inc.Method and electronic device for triggering zeroization in an electronic device
KR20080017313A (en)2005-05-192008-02-26퓨전원 인코포레이티드 Remote Cordless Phone Auto Destruction
US7970386B2 (en)2005-06-032011-06-28Good Technology, Inc.System and method for monitoring and maintaining a wireless device
FR2886801B1 (en)2005-06-072007-08-03Alcatel Sa NETWORK EQUIPMENT FOR PROVIDING MULTI-MODE MOBILE DATA TERMINALS NECESSARY FOR THE AUTOMATIC SELECTION OF RADIO ACCESS NETWORK INTERFACES DURING SERVICE SESSIONS
US8495244B2 (en)2005-06-292013-07-23Jumpstart Wireless CorporationSystem and method for dynamic automatic communication path selection, distributed device synchronization and task delegation
US7529923B2 (en)2005-06-302009-05-05Intel CorporationOperating system mode transfer
US8682979B2 (en)2005-07-012014-03-25Email2 Scp Solutions Inc.Secure electronic mail system
US20070011749A1 (en)2005-07-112007-01-11Simdesk TechnologiesSecure clipboard function
US9614964B2 (en)2005-08-192017-04-04Nextstep, Inc.Consumer electronic registration, control and support concierge device and method
US20070049297A1 (en)2005-08-292007-03-01Janakiraman GopalanSystem and method for locating mobile devices through a direct-connection protocol
US20070074033A1 (en)2005-09-292007-03-29Research In Motion LimitedAccount management in a system and method for providing code signing services
US8037421B2 (en)2005-10-112011-10-11Research In Motion LimitedSystem and method for organizing application indicators on an electronic device
US20070109983A1 (en)2005-11-112007-05-17Computer Associates Think, Inc.Method and System for Managing Access to a Wireless Network
US8621549B2 (en)2005-12-292013-12-31Nextlabs, Inc.Enforcing control policies in an information management system
EP1967026A2 (en)2005-12-302008-09-10Telecom Italia S.p.A.Method for customizing the operation of a telephonic terminal
WO2007079499A2 (en)2006-01-042007-07-12Nytor, Inc.Trusted host platform
US20070174429A1 (en)2006-01-242007-07-26Citrix Systems, Inc.Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment
WO2007089503A2 (en)*2006-01-262007-08-09Imprivata, Inc.Systems and methods for multi-factor authentication
US7664865B2 (en)2006-02-152010-02-16Microsoft CorporationSecurely hosting a webbrowser control in a managed code environment
US8676973B2 (en)2006-03-072014-03-18Novell Intellectual Property Holdings, Inc.Light-weight multi-user browser
US7725922B2 (en)2006-03-212010-05-25Novell, Inc.System and method for using sandboxes in a managed shell
US20070226225A1 (en)2006-03-222007-09-27Yiu Timothy CMobile collaboration and communication system
WO2007113709A1 (en)2006-03-302007-10-11Koninklijke Philips Electronics N.V.Method and apparatus for assigning an application to a security restriction
US9112897B2 (en)2006-03-302015-08-18Advanced Network Technology Laboratories Pte Ltd.System and method for securing a network session
WO2007117636A2 (en)2006-04-062007-10-18Smobile Systems, Inc.Malware detection system and method for comprssed data on mobile platforms
US8181010B1 (en)2006-04-172012-05-15Oracle America, Inc.Distributed authentication user interface system
US20070261099A1 (en)2006-05-022007-11-08Broussard Scott JConfidential content reporting system and method with electronic mail verification functionality
US8085891B2 (en)2006-05-292011-12-27Research In Motion LimitedSystem and method for management of mobile device communication
US20080027982A1 (en)2006-07-272008-01-31Ebay Inc.Indefinite caching expiration techniques
US8272048B2 (en)2006-08-042012-09-18Apple Inc.Restriction of program process capabilities
US8341747B2 (en)2006-08-082012-12-25International Business Machines CorporationMethod to provide a secure virtual machine launcher
US8234704B2 (en)2006-08-142012-07-31Quantum Security, Inc.Physical access control and security monitoring system utilizing a normalized data format
EP2054830A2 (en)2006-08-172009-05-06Neustar, Inc.System and method for managing domain policy for interconnected communication networks
US8903365B2 (en)2006-08-182014-12-02Ca, Inc.Mobile device management
US8010995B2 (en)2006-09-082011-08-30International Business Machines CorporationMethods, systems, and computer program products for implementing inter-process integrity serialization
US8126128B1 (en)2006-11-012012-02-28At&T Intellectual Property I, LpLife cycle management of user-selected applications on wireless communications devices
US8365258B2 (en)2006-11-162013-01-29Phonefactor, Inc.Multi factor authentication
US20080141335A1 (en)2006-12-082008-06-12Novell, Inc.Provisioning software with policy-appropriate capabilities
US9124650B2 (en)2006-12-132015-09-01Quickplay Media Inc.Digital rights management in a mobile environment
US8869189B2 (en)2006-12-292014-10-21Echostar Technologies L.L.C.Controlling access to content and/or services
US8132233B2 (en)2007-02-052012-03-06Hewlett-Packard Development Company, L.P.Dynamic network access control method and apparatus
US8250045B2 (en)2007-02-072012-08-21International Business Machines CorporationNon-invasive usage tracking, access control, policy enforcement, audit logging, and user action automation on software applications
US8074227B2 (en)2007-02-082011-12-06Microsoft CorporationUtilizing a first managed process to host at least a second managed process
US7761523B2 (en)2007-02-092010-07-20Research In Motion LimitedSchedulable e-mail filters
US8126506B2 (en)2007-02-142012-02-28Nuance Communications, Inc.System and method for securely managing data stored on mobile devices, such as enterprise mobility data
US10019570B2 (en)2007-06-142018-07-10Microsoft Technology Licensing, LlcProtection and communication abstractions for web browsers
US8463253B2 (en)2007-06-212013-06-11Verizon Patent And Licensing Inc.Flexible lifestyle portable communications device
US20090006232A1 (en)2007-06-292009-01-01Gallagher Ken ASecure computer and internet transaction software and hardware and uses thereof
DE602008004958D1 (en)2007-07-272011-03-31Research In Motion Ltd Remote control in a wireless communication system
EP2031916B1 (en)2007-07-272011-12-21Research In Motion LimitedAdministration of policies for wireless devices in a wireless communication system
US8060074B2 (en)2007-07-302011-11-15Mobile Iron, Inc.Virtual instance architecture for mobile device management systems
US20090077638A1 (en)2007-09-172009-03-19Novell, Inc.Setting and synching preferred credentials in a disparate credential store environment
US8001278B2 (en)2007-09-282011-08-16Intel CorporationNetwork packet payload compression
KR100946824B1 (en)2007-10-312010-03-09(주)피엑스디 Digital broadcast widget system and widget output method
ES2662493T3 (en)2007-11-022018-04-06Qualcomm Incorporated Configurable event and resource arbitration management system
US20090228963A1 (en)2007-11-262009-09-10Nortel Networks LimitedContext-based network security
WO2009076447A1 (en)2007-12-102009-06-18Courion CorporatonPolicy enforcement using esso
US8453198B2 (en)2007-12-272013-05-28Hewlett-Packard Development Company, L.P.Policy based, delegated limited network access management
US8538376B2 (en)2007-12-282013-09-17Apple Inc.Event-based modes for electronic devices
US20090199277A1 (en)2008-01-312009-08-06Norman James MCredential arrangement in single-sign-on environment
US20090222880A1 (en)2008-03-032009-09-03Tresys Technology, LlcConfigurable access control security for virtualization
US8607304B2 (en)2008-03-072013-12-10At&T Mobility Ii LlcSystem and method for policy-enabled mobile service gateway
US20130254660A1 (en)2008-03-132013-09-26Robb FujiokaTablet computer
US9747141B2 (en)2008-03-252017-08-29Qualcomm IncorporatedApparatus and methods for widget intercommunication in a wireless communication environment
WO2009145987A2 (en)2008-03-302009-12-03Symplified, Inc.System, method, and apparatus for single sign-on and managing access to resources across a network
US8250207B2 (en)*2009-01-282012-08-21Headwater Partners I, LlcNetwork based ambient services
US8832777B2 (en)2009-03-022014-09-09Headwater Partners I LlcAdapting network policies based on device service processor configuration
US9069599B2 (en)2008-06-192015-06-30Servicemesh, Inc.System and method for a cloud computing abstraction layer with security zone facilities
WO2010011467A1 (en)2008-06-292010-01-28Oceans' Edge, Inc.Mobile telephone firewall and compliance enforcement system and method
GB2462442A (en)2008-08-062010-02-10Zybert Computing LtdA remote server centrally controls access to data stored in a data container in an encrypted form
US8238256B2 (en)2008-09-082012-08-07Nugent Raymond MSystem and method for cloud computing
US8763102B2 (en)2008-09-192014-06-24Hewlett-Packard Development Company, L.P.Single sign on infrastructure
US8528059B1 (en)2008-10-062013-09-03Goldman, Sachs & Co.Apparatuses, methods and systems for a secure resource access and placement platform
US9026918B2 (en)2008-10-162015-05-05Accenture Global Services LimitedEnabling a user device to access enterprise data
US9836702B2 (en)2008-10-162017-12-05International Business Machines CorporationDigital rights management (DRM)-enabled policy management for an identity provider in a federated environment
US20100150341A1 (en)2008-12-172010-06-17David DodgsonStorage security using cryptographic splitting
US20100146523A1 (en)2008-12-052010-06-10Tripod Ventures Inc./ Entreprises Tripod Inc.Browser environment application and local file server application system
US8931033B2 (en)2008-12-122015-01-06Microsoft CorporationIntegrating policies from a plurality of disparate management agents
US8272030B1 (en)2009-01-212012-09-18Sprint Communications Company L.P.Dynamic security management for mobile communications device
US20120005724A1 (en)2009-02-092012-01-05Imera Systems, Inc.Method and system for protecting private enterprise resources in a cloud computing environment
CA2692741C (en)2009-03-312014-04-08Research In Motion LimitedRemote application storage
KR20120013968A (en)2009-04-092012-02-15에이지스 모빌리티, 아이엔씨. Contextual mediation
AU2010244945B2 (en)2009-05-052015-01-22Absolute Software CorporationDiscriminating data protection system
US20100299152A1 (en)2009-05-202010-11-25Mobile Iron, Inc.Selective Management of Mobile Devices in an Enterprise Environment
US8695058B2 (en)2009-05-202014-04-08Mobile Iron, Inc.Selective management of mobile device data in an enterprise environment
US9183534B2 (en)2009-06-122015-11-10Apple Inc.Devices with profile-based operating mode controls
US8254957B2 (en)2009-06-162012-08-28Intel CorporationContext-based limitation of mobile device operation
US8407190B2 (en)2009-06-302013-03-26Commvault Systems, Inc.Performing data storage operations with a cloud environment, including containerized deduplication, data pruning, and data transfer
US9386447B2 (en)2009-07-212016-07-05Scott Ferrill TibbittsMethod and system for controlling a mobile communication device
US8392386B2 (en)2009-08-052013-03-05International Business Machines CorporationTracking file contents
US8145199B2 (en)2009-10-312012-03-27BT Patent LLCControlling mobile device functions
US8499304B2 (en)2009-12-152013-07-30At&T Mobility Ii LlcMultiple mode mobile device
US8533780B2 (en)2009-12-222013-09-10Cisco Technology, Inc.Dynamic content-based routing
US8468455B2 (en)2010-02-242013-06-18Novell, Inc.System and method for providing virtual desktop extensions on a client desktop
US8024469B1 (en)2010-03-052011-09-20Brass Monkey Inc.System and method for connecting network sockets between applications
US9355282B2 (en)2010-03-242016-05-31Red Hat, Inc.Using multiple display servers to protect data
US8433901B2 (en)2010-04-072013-04-30Apple Inc.System and method for wiping encrypted data on a device having file-level content protection
US9584624B2 (en)2010-04-152017-02-28Blackberry LimitedMethod and system for transmitting an application to a device
US8555377B2 (en)2010-04-292013-10-08High Cloud SecuritySecure virtual machine
US8805968B2 (en)2010-05-032014-08-12Panzura, Inc.Accessing cached data from a peer cloud controller in a distributed filesystem
US8935384B2 (en)2010-05-062015-01-13Mcafee Inc.Distributed data revocation using data commands
WO2011143094A2 (en)2010-05-092011-11-17Citrix Systems, Inc.Systems and methods for allocation of classes of service to network connections corresponding to virtual channels
EP2572338A4 (en)2010-05-212016-04-27Hsbc Technology & Services Usa IncAccount opening computer system architecture and process for implementing same
JP2011248683A (en)2010-05-272011-12-08Canon IncCloud computing system, server computer, method for connecting device and program
US10142292B2 (en)2010-06-302018-11-27Pulse Secure LlcDual-mode multi-service VPN network client for mobile device
US8458787B2 (en)2010-06-302013-06-04Juniper Networks, Inc.VPN network client for mobile device having dynamically translated user home page
US8549617B2 (en)*2010-06-302013-10-01Juniper Networks, Inc.Multi-service VPN network client for mobile device having integrated acceleration
US8429674B2 (en)2010-07-202013-04-23Apple Inc.Maintaining data states upon forced exit
WO2012016091A2 (en)2010-07-282012-02-02Nextlabs, Inc.Protecting documents using policies and encryption
US8539245B2 (en)2010-08-062013-09-17Intel CorporationApparatus and method for accessing a secure partition in non-volatile storage by a host system enabled after the system exits a first instance of a secure mode
US8739157B2 (en)2010-08-262014-05-27Adobe Systems IncorporatedSystem and method for managing cloud deployment configuration of an application
US9421460B2 (en)2010-08-312016-08-23Sony Interactive Entertainment Inc.Offline Progress of console game via portable device
US20120066691A1 (en)2010-09-142012-03-15Paul Keith BrantonPrivate application clipboard
US8958780B2 (en)2010-10-072015-02-17Blackberry LimitedProvisioning based on application and device capability
EP2638465A2 (en)2010-11-092013-09-18Openpeak Inc.Communication devices, networks, services and accompanying methods
US20120131116A1 (en)2010-11-152012-05-24Van Quy TuControlling data transfer on mobile devices
US8869307B2 (en)2010-11-192014-10-21Mobile Iron, Inc.Mobile posture-based policy, remediation and access control for enterprise resources
US8359016B2 (en)2010-11-192013-01-22Mobile Iron, Inc.Management of mobile applications
AU2011202832B2 (en)2010-12-212013-01-24Lg Electronics Inc.Mobile terminal and method of controlling a mode switching therein
US8856950B2 (en)2010-12-212014-10-07Lg Electronics Inc.Mobile terminal and method of managing information therein including first operating system acting in first mode and second operating system acting in second mode
AU2011202837B2 (en)2010-12-212013-08-22Lg Electronics Inc.Mobile terminal and method of controlling a mode switching therein
AU2011202840B2 (en)2010-12-212014-04-17Lg Electronics Inc.Mobile terminal and method of controlling a mode switching therein
US9178981B2 (en)2010-12-222015-11-03Lg Electronics Inc.Mobile terminal and method of sharing information therein
EP2469404B1 (en)2010-12-222018-04-18Lg Electronics Inc.Mobile terminal and method of displaying information in accordance with a plurality of modes of use
JP5017462B2 (en)2010-12-272012-09-05株式会社東芝 Information processing apparatus and removable media management method
US8898487B2 (en)2010-12-272014-11-25Microsoft CorporationPower management via coordination and selective operation of timer-related tasks
US20120179909A1 (en)2011-01-062012-07-12Pitney Bowes Inc.Systems and methods for providing individual electronic document secure storage, retrieval and use
US9172766B2 (en)2011-01-102015-10-27Fiberlink Communications CorporationSystem and method for extending cloud services into the customer premise
US8898793B2 (en)2011-01-142014-11-25Nokia CorporationMethod and apparatus for adjusting context-based factors for selecting a security policy
US20120198570A1 (en)2011-02-012012-08-02Bank Of America CorporationGeo-Enabled Access Control
US8806569B2 (en)2011-02-072014-08-12Tufin Software Technologies Ltd.Method and system for analyzing security ruleset by generating a logically equivalent security rule-set
US10003672B2 (en)2011-02-092018-06-19Cisco Technology, Inc.Apparatus, systems and methods for deployment of interactive desktop applications on distributed infrastructures
KR20120096983A (en)2011-02-242012-09-03삼성전자주식회사Malware detection method and mobile terminal therefor
WO2012118610A1 (en)2011-02-282012-09-07Siemens Enterprise Communications Gmbh & Co. KgApparatus and mechanism for dynamic assignment of survivability services to mobile devices
US8548443B2 (en)2011-03-162013-10-01Dell Products L.P.System and method for selectively restricting portable information handling system features
US9119017B2 (en)*2011-03-182015-08-25Zscaler, Inc.Cloud based mobile device security and policy enforcement
US8769305B2 (en)2011-03-212014-07-01Moncana CorporationSecure execution of unsecured apps on a device
US20120254768A1 (en)2011-03-312012-10-04Google Inc.Customizing mobile applications
WO2012138804A2 (en)2011-04-042012-10-11Nextlabs, Inc.Protecting information using policies and encryption
US9817677B2 (en)2011-04-222017-11-14Microsoft Technologies Licensing, LLCRule based data driven validation
US10187494B2 (en)2011-04-262019-01-22Acumera, Inc.Gateway device application development system
US9072972B2 (en)2011-04-282015-07-07Numecent Holdings LtdApplication distribution network
US8738772B2 (en)2011-05-022014-05-27Mitel Networks CorporationRegulating use of a mobile computing device for a user at a selected location
US8683556B2 (en)2011-05-042014-03-25Apple Inc.Electronic devices having adaptive security profiles and methods for selecting the same
US9037723B2 (en)2011-05-312015-05-19Red Hat, Inc.Triggering workload movement based on policy stack having multiple selectable inputs
US8578443B2 (en)2011-06-012013-11-05Mobileasap, Inc.Real-time mobile application management
AU2012261972A1 (en)*2011-06-012014-01-09Security First Corp.Systems and methods for secure distributed storage
US20120324568A1 (en)2011-06-142012-12-20Lookout, Inc., A California CorporationMobile web protection
US20120331527A1 (en)2011-06-222012-12-27TerraWi, Inc.Multi-layer, geolocation-based network resource access and permissions
US8843998B2 (en)2011-06-272014-09-23Cliqr Technologies, Inc.Apparatus, systems and methods for secure and selective access to services in hybrid public-private infrastructures
KR101801577B1 (en)2011-06-282017-11-27엘지전자 주식회사Mobile terminal and Method for controlling display thereof
KR101819506B1 (en)2011-06-282018-01-17엘지전자 주식회사Mobile terminal and Method for controlling display thereof
WO2013006844A1 (en)2011-07-072013-01-10Cisco Technology, Inc.System and method for providing a message and an event based video services control plane
US8756665B2 (en)*2011-07-082014-06-17International Business Machines CorporationAuthenticating a rich client from within an existing browser session
US20130024928A1 (en)2011-07-222013-01-24Robert James BurkeSecure network communications for meters
US9171139B2 (en)2011-08-052015-10-27Vmware, Inc.Lock screens to access work environments on a personal mobile device
US9065826B2 (en)2011-08-082015-06-23Microsoft Technology Licensing, LlcIdentifying application reputation based on resource accesses
US8738868B2 (en)2011-08-232014-05-27Vmware, Inc.Cooperative memory resource management for virtualized computing devices
KR20130023656A (en)2011-08-292013-03-08주식회사 팬택Portable multifunction device and method for controlling permission of application
US8898459B2 (en)2011-08-312014-11-25At&T Intellectual Property I, L.P.Policy configuration for mobile device applications
US20130059284A1 (en)2011-09-072013-03-07Teegee, LlcInteractive electronic toy and learning device system
US10063430B2 (en)2011-09-092018-08-28Cloudon Ltd.Systems and methods for workspace interaction with cloud-based applications
US10165007B2 (en)2011-09-152018-12-25Microsoft Technology Licensing, LlcSecuring data usage in computing devices
US8806639B2 (en)2011-09-302014-08-12Avaya Inc.Contextual virtual machines for application quarantine and assessment method and system
US8695060B2 (en)2011-10-102014-04-08Openpeak Inc.System and method for creating secure applications
US8402011B1 (en)2011-10-102013-03-19Google Inc.System and method for managing user web browsing information
US8239918B1 (en)2011-10-112012-08-07Google Inc.Application marketplace administrative controls
US9043480B2 (en)2011-10-112015-05-26Citrix Systems, Inc.Policy-based application management
US20140032733A1 (en)2011-10-112014-01-30Citrix Systems, Inc.Policy-Based Application Management
US9137262B2 (en)2011-10-112015-09-15Citrix Systems, Inc.Providing secure mobile device access to enterprise resources using application tunnels
US20140040979A1 (en)2011-10-112014-02-06Citrix Systems, Inc.Policy-Based Application Management
US8789179B2 (en)2011-10-282014-07-22Novell, Inc.Cloud protection techniques
US10291658B2 (en)2011-11-092019-05-14Microsoft Technology Licensing, LlcTechniques to apply and share remote policies on mobile devices
US8688768B2 (en)2011-11-182014-04-01Ca, Inc.System and method for hand-offs in cloud environments
US8893261B2 (en)2011-11-222014-11-18Vmware, Inc.Method and system for VPN isolation using network namespaces
US9143943B2 (en)2011-11-292015-09-22Dell Products L.P.Mode sensitive networking
US8667579B2 (en)*2011-11-292014-03-04Genband Us LlcMethods, systems, and computer readable media for bridging user authentication, authorization, and access between web-based and telecom domains
US9100854B2 (en)2011-12-062015-08-04T-Mobile Usa, Inc.Quality of service application controller and user equipment application profiler
US20130171967A1 (en)2012-01-042013-07-04Ayman S. AshourProviding Secure Execution of Mobile Device Workflows
US8863298B2 (en)2012-01-062014-10-14Mobile Iron, Inc.Secure virtual file management system
US9037897B2 (en)2012-02-172015-05-19International Business Machines CorporationElastic cloud-driven task execution
US9529993B2 (en)2012-03-022016-12-27International Business Machines CorporationPolicy-driven approach to managing privileged/shared identity in an enterprise
US9027076B2 (en)2012-03-232015-05-05Lockheed Martin CorporationMethod and apparatus for context aware mobile security
US20130254262A1 (en)2012-03-262013-09-26Quickmobile Inc.System and method for a user to dynamically update a mobile application from a generic or first application within a class of applications to create a specific or second application with said class of applications
US9319286B2 (en)2012-03-302016-04-19Cognizant Business Services LimitedApparatus and methods for managing applications in multi-cloud environments
US20130263208A1 (en)2012-04-022013-10-03Narsimha Reddy ChallaManaging virtual machines in a cloud computing system
US9626526B2 (en)2012-04-302017-04-18Ca, Inc.Trusted public infrastructure grid cloud
US20130297604A1 (en)2012-05-012013-11-07Research In Motion LimitedElectronic device and method for classification of communication data objects
US8990948B2 (en)2012-05-012015-03-24Taasera, Inc.Systems and methods for orchestrating runtime operational integrity
US9405723B2 (en)2012-05-022016-08-02Kony, Inc.Mobile application management systems and methods thereof
US8990901B2 (en)2012-05-052015-03-24Citrix Systems, Inc.Systems and methods for network filtering in VPN
US9215553B2 (en)2012-05-112015-12-15Rowles Holdings, LlcAutomatic determination of and reaction to mobile user routine behavior based on geographical and repetitive pattern analysis
US20130311597A1 (en)2012-05-162013-11-21Apple Inc.Locally backed cloud-based storage
US9300570B2 (en)2012-05-222016-03-29Harris CorporationMulti-tunnel virtual private network
KR101874081B1 (en)2012-06-072018-07-03에스케이테크엑스 주식회사Cloud Service Supporting Method And System based on a Enhanced Security
US9792585B2 (en)2012-06-212017-10-17Google Inc.Mobile application management
US9240977B2 (en)2012-07-112016-01-19Netiq CorporationTechniques for protecting mobile applications
US9053304B2 (en)2012-07-132015-06-09Securekey Technologies Inc.Methods and systems for using derived credentials to authenticate a device across multiple platforms
US20140108558A1 (en)2012-10-122014-04-17Citrix Systems, Inc.Application Management Framework for Secure Data Sharing in an Orchestration Framework for Connected Devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20130167247A1 (en)*2007-01-192013-06-27Research In Motion LimitedSelectively wiping a remote device
US8200626B1 (en)*2009-09-182012-06-12Sprint Communications Company L.P.Mobile device file management
US20110314534A1 (en)*2010-04-142011-12-22Lee JamesSecured Execution Environments and Methods
US20140130174A1 (en)*2012-11-082014-05-08International Business Machines CorporationApplication and Data Removal System

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Wright et al. "Your Firm's Mobile Devices: How Secure Are They?". Journal of Corporate Accounting & Finance. July 1, 2011. Wiley Periodicals. pgs. 13-21.*

Cited By (33)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11172361B2 (en)2010-03-032021-11-09Cisco Technology, Inc.System and method of notifying mobile devices to complete transactions
US10706421B2 (en)2010-03-032020-07-07Duo Security, Inc.System and method of notifying mobile devices to complete transactions after additional agent verification
US11341475B2 (en)2010-03-032022-05-24Cisco Technology, IncSystem and method of notifying mobile devices to complete transactions after additional agent verification
US11832099B2 (en)2010-03-032023-11-28Cisco Technology, Inc.System and method of notifying mobile devices to complete transactions
US10348756B2 (en)2011-09-022019-07-09Duo Security, Inc.System and method for assessing vulnerability of a mobile device
US12184704B2 (en)2012-12-282024-12-31Intel CorporationPolicy-based secure containers for multiple enterprise applications
US11856032B2 (en)2012-12-282023-12-26Intel CorporationPolicy-based secure containers for multiple enterprise applications
US11252198B2 (en)*2012-12-282022-02-15Intel CorporationPolicy-based secure containers for multiple enterprise applications
US9692788B2 (en)*2014-05-292017-06-27Blackberry LimitedMethod and system for domain creation and bootstrapping
CN107209882A (en)*2015-01-212017-09-26微软技术许可有限责任公司For the multistage un-register for the equipment being under management
US9727378B2 (en)2015-01-212017-08-08Microsoft Technology Licensing, LlcPersistent unenrollment for devices under management
WO2016118542A1 (en)*2015-01-212016-07-28Microsoft Technology Licensing, LlcMultiple phase unenrollment for devices under management
CN113343210A (en)*2015-01-262021-09-03移动熨斗公司Identity agent providing access control and single sign-on
US10198560B2 (en)*2015-03-132019-02-05Citrix Systems, Inc.Enforcing licensing policies using an application wrapper
US10542030B2 (en)2015-06-012020-01-21Duo Security, Inc.Method for enforcing endpoint health standards
US10073758B2 (en)2015-07-152018-09-11Citrix Systems, Inc.Performance of a wrapped application
WO2017011427A1 (en)*2015-07-152017-01-19Citrix Systems, Inc.Improving performance of a wrapped application
US11019057B2 (en)2016-06-292021-05-25Duo Security, Inc.Systems and methods for endpoint management
US11831642B2 (en)2016-06-292023-11-28Cisco Technology, Inc.Systems and methods for endpoint management
US12432205B2 (en)2016-06-292025-09-30Cisco Technology, Inc.Systems and methods for endpoint management
US10009344B2 (en)*2016-06-292018-06-26Duo Security, Inc.Systems and methods for endpoint management classification
US20180270235A1 (en)*2016-06-292018-09-20Duo Security, Inc.Systems and methods for endpoint management classification
US10594692B2 (en)*2016-06-292020-03-17Duo Security, Inc.Systems and methods for endpoint management classification
US10412113B2 (en)2017-12-082019-09-10Duo Security, Inc.Systems and methods for intelligently configuring computer security
US11310275B2 (en)*2018-01-312022-04-19Sophos LimitedManaging admission of unrecognized devices onto an enterprise network
US11019056B2 (en)2018-01-312021-05-25Sophos LimitedManaging claiming of unrecognized devices for admission to an enterprise network
US12218977B2 (en)2018-01-312025-02-04Sophos LimitedManaging admission of unrecognized devices onto an enterprise network
US11134056B2 (en)2018-01-312021-09-28Sophos LimitedPortal for managing admission of unrecognized devices to an enterprise network
WO2019213531A1 (en)*2018-05-042019-11-07Citrix Systems, Inc.Systems and methods for an embedded browser
AU2019262182B2 (en)*2018-05-042022-02-24Citrix Systems, Inc.Systems and methods for an embedded browser
CN112292669A (en)*2018-05-042021-01-29思杰系统有限公司System and method for embedded browser
US11159552B2 (en)2018-05-042021-10-26Citrix Systems, Inc.Systems and methods for an embedded browser
US11658962B2 (en)2018-12-072023-05-23Cisco Technology, Inc.Systems and methods of push-based verification of a transaction

Also Published As

Publication numberPublication date
US20140298403A1 (en)2014-10-02
US8910264B2 (en)2014-12-09

Similar Documents

PublicationPublication DateTitle
US10965734B2 (en)Data management for an application with multiple operation modes
US8849979B1 (en)Providing mobile device management functionalities
US8910264B2 (en)Providing mobile device management functionalities
US9985850B2 (en)Providing mobile device management functionalities
US10097584B2 (en)Providing a managed browser
US8813179B1 (en)Providing mobile device management functionalities

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:CITRIX SYSTEMS, INC., FLORIDA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:QURESHI, WAHEED;REEL/FRAME:031451/0106

Effective date:20130913

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp