Movatterモバイル変換


[0]ホーム

URL:


USRE49585E1 - Certificate based profile confirmation - Google Patents

Certificate based profile confirmation
Download PDF

Info

Publication number
USRE49585E1
USRE49585E1US17/109,950US202017109950AUSRE49585EUS RE49585 E1USRE49585 E1US RE49585E1US 202017109950 AUS202017109950 AUS 202017109950AUS RE49585 EUSRE49585 EUS RE49585E
Authority
US
United States
Prior art keywords
certificate
resource
access
profile
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US17/109,950
Inventor
Alan Dabbiere
Erich Stuntebeck
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Omnissa LLC
Original Assignee
Airwatch LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Airwatch LLCfiledCriticalAirwatch LLC
Priority to US17/109,950priorityCriticalpatent/USRE49585E1/en
Application grantedgrantedCritical
Publication of USRE49585E1publicationCriticalpatent/USRE49585E1/en
Assigned to UBS AG, STAMFORD BRANCHreassignmentUBS AG, STAMFORD BRANCHSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: OMNISSA, LLC
Assigned to OMNISSA, LLCreassignmentOMNISSA, LLCPATENT ASSIGNMENTAssignors: AIRWATCH LLC
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

Disclosed are various embodiments for controlling access to resources in a network environment. Methods may include installing a profile on the device and installing a certificate included in or otherwise associated with the profile on the device. A request to execute an application, and/or access a resource using a particular application, is received and determination is made as to whether the certificate is installed on the device based on an identification of the certificate by the application. If the certificate is installed on the device, then execution of the application and/or access to the resource is allowed. If the certificate is not installed on the device, then the request for execution and/or access is refused.

Description

This application claims priority as a continuation of is a reissue of U.S. patent application Ser. No. 15/800,224 and is an application for reissue of U.S. Pat. No. 10,560,453, claiming priority to U.S. patent application Ser. No. 13/835,542, filed Mar. 15, 2013, and entitled “CERTIFICATE BASED PROFILE CONFIRMATION,” all of which is are expressly incorporated by reference herein.
BACKGROUND
Controlling access to enterprise resources by network-connected devices is critical to ensure that only authenticated and authorized users and devices gain access to sensitive information or services. To date, this has typically been accomplished by utilizing network firewalls, reverse proxy servers with authentication, and encrypted VPN tunnels. Today, however, enterprise resources are being moved out of enterprise managed data centers and into the “Cloud.”
The inventors have explored various ways of protecting enterprise-managed data centers at a device level. These solutions have addressed challenges related to, for example, the fact that cloud-based data services often do not provide the necessary features to allow enterprises to control access to the service at a device level, but rather permit access, without restriction as to any device, with proper user level access controls.
Controlling access to and distribution of enterprise resources, such as documents, databases, and executable applications, in a networked environment is critical to ensure that only authorized users and network-connected devices may gain access to sensitive information. Depending on the sensitivity of a given resource, an array of authorization rules may be necessary to ensure that the resource is adequately protected. Some resources may only require ensuring that the proper user is requesting the resource. Other resources may require compliance with more stringent authorization rules, such as determining whether an appropriate transport protocol is used (i.e., http and/or https) by the requesting device, determining whether access to the resource is permitted for a specified duration or at a given time, determining whether the resource is accessed from a secured device, etc.
However, in many such systems, it is necessary for the managing system to have significant control over the managed device in order to implement the desired protocols. This may present its own challenges in situations where, for example, all device users are not willing to surrender the necessary level of device control, and/or where enterprise managers may desire to allow users of non-managed devices certain limited access to resources on the managed network, such as data, etc. Accordingly, the inventors have proposed the following systems and methods to provide, at least in some aspects, methods of enforcing protocols on devices that are not otherwise under management of a Mobile Device Management (MDM) service.
SUMMARY OF THE INVENTION
The following systems and methods provide solutions for controlling the use and distribution of resources in a networked environment, including limiting application execution and/or distribution of resources to devices that are not fully managed by an MDM service. Among other objects, the present subject matter may provide the ability to uniquely associate a required profile with a certificate, and to check that the certificate is installed on the mobile device to thereby ensure the required profile is also still in place.
In cases where a mobile device is not fully managed by an MDM service, the MDM, or other service, may instead provide the user of the device with a required profile for use with an enterprise application or an application that is configured to access enterprise resources including remotely stored data. The required profile may specify certain mandated settings, or parameters, for the device, and include a certificate that is uniquely associated with the required profile. The term “required” is used herein to signify that the profile is defined by or for the operator of the MDM service and must be installed on a device and validated before the device will be permitted to execute a certain application or access certain enterprise resources and/or access the managed network. When the device requests to execute the associated application or to access certain data or other resources from the managed network, the presence of the required profile on the device may be confirmed, as well as the compliance of the device with one or more setting or parameters specified in the required profile, by confirming that the certificate is installed on the device and/or that the stored certificate is valid.
According to certain embodiments, methods of managing access to resources by a device may include one or more steps of installing a plurality of profiles on the device; installing a plurality of certificates associated with the profiles; receiving a plurality of requests to access a plurality of resources; and/or determining whether the certificates are accessible to the device.
In some embodiments, determining whether the certificates are accessible to the device may include determining whether the certificates are stored and/or installed on the device. In some embodiments, determining whether the certificates are installed on the device may be based on an identification of the certificates by the applications.
In some embodiments, if it is determined that certain of the certificates are accessible to the device, and/or are installed on the device, then resources associated with the certain certificates may be accessed. Whereas, if it is determined that certain certificates are not accessible to the device, and/or are not installed on the device, then the requests to access the resources associated with the certain certificates may be refused.
In some embodiments, a request to access a resource may include one or more of a request to execute an application on the device, a request to access or render data stored on the device, a request to execute an enterprise application residing at least partially on a network, and/or a request to access or render data that is stored at least partially on a network. In embodiments where the request to access the resource includes a request to execute an application, the application may be referred to as the “called application.”
It should be noted that, as used herein, certain portions of a resource may be executed and/or accessed, in a limited manner, in order to perform the certificate validation without fully executing or accessing the resource as requested by the user. For example, in the context of requesting an application to execute, certain portions of the application may execute for the purpose of identifying and/or validating the required profile or corresponding certificate, but the application may not fully “open” for the user until the certificate validation is successfully completed. Likewise, in the context of requesting access to certain local or network data, portions of the requested data, or other associated data, may be accessed for purposes of identifying and/or validating the required profile or corresponding certificate, but the requested data may not be fully “accessed” by the user until the certificate validation is successfully completed.
In some embodiments, the profiles or certificates may be uniquely associated with the called application, the profiles or certificates may be associated with particular data, and/or certain certificates may be uniquely associated with certain profiles.
In some embodiments, various functions of the device may be enabled and/or disabled to bring the device into compliance with one or more settings and/or parameters specified in the required profile. For example, a parameter may specify that the data not be transferred outside of the device. In such a case, a camera, screen capture function, transmission capability, or other function of the device that would facilitate the transfer of data outside of the device, may be disabled via appropriate settings included in the profile.
In some embodiments, a request to access a resource on a remote server may be sent by the application if a required certificate is determined to be installed on the device.
In some embodiments, a failure notification may be sent to a remote server if a required certificate is determined not to be installed on the device.
In some embodiments, the determination as to whether a required certificate is installed on the device may be performed in response to a request to access the resource, prior to receiving the request to access the resource, at scheduled or random times (regardless the request to access the resource), and/or based on detection of a non-complying setting or parameter.
An alert may be sent from the device to a managing server if either the profile or certificate is not present on the device, or if the device is not in compliance with the at least one setting or parameter of the required profile. In response to such an alert, the server may initiate a remedial action, such as, enabling or disabling hardware and/or software functionality, increasing a password complexity, sending a message to an account and/or service administrator, sending a message to a user, locking the device, an enterprise wipe of certain resources, a full or partial wipe of the device, removing profiles, disabling access to enterprise server resources such as email, application data, content servers such as SharePoint, Box, etc., disabling and/or removing applications, etc. In some embodiments, the enabled or disabled functionality may include at least one of a camera, a screen capture, an artificial intelligence and/or assistance program (e.g. Apple Siri, Google Now, and the like), a GPS, Wifi communication, cellular communication, a microphone, speakers, a touchscreen, network support and/or services (e.g. Apple iCloud, Microsoft SkyDrive and the like), etc. In some embodiments, a sever may independently enforce various of the foregoing functions, and/or may “push” necessary enforcement commands, code, and the like, to devices, or other service providers. In some embodiments, the device may include local rules that allow enforcement of the remedial action, such as in the case of functionality built into an OS, e.g. password enforcement, etc., and/or when the device includes certain enterprise applications, such as a Secure Content Locker described further herein.
In some embodiments, the profiles may be, for example, one of a plurality of iOS profiles, a plurality of Android OS profiles, a plurality of Windows Mobile profiles, a plurality of Windows Phone profiles, a plurality of Windows 8 (etc.) profiles, a plurality of Mac OS X (etc.) profiles, a plurality of Symbian OS profiles, or other operating system profiles. In some embodiments, the certificates may be one of a plurality of root certificates and/or a plurality of intermediate certificates, and may be stored, if at all, in a “trust store” or “certificate store” of the device or in some other suitable memory space of the device.
In some embodiments, required certificates may be securely associated with certain devices and stored remotely from the devices. In such embodiments, device profile compliance may be determined, for example, by checking those certificates in addition to, or instead of, checking locally stored certificates.
According to certain further embodiments, a method of managing an application on a device, based on the presence of a plurality of profiles on the device, may include one or more steps of receiving a plurality of requests to execute a plurality of applications on the device; identifying a plurality of certificates associated with the profiles and the applications; and/or determining whether the certificates are installed on the device. In some embodiments, if certain of the certificates are installed on the device, then applications associated with the certain certificates may be executed, whereas if certain certificates are not installed on the device, then requests to execute applications associated with the certain certificates may be refused.
According to certain further embodiments, an apparatus including a computing device, a display and a processor may be configured to perform the various method steps and functions described herein.
According to certain further embodiments, the various method steps and apparatus functions described herein may be embodied on non-transitory electronic storage medium in the form of computer-readable instructions that, when executed by a microprocessor, cause a computer system perform the described functions and steps.
Additional features, advantages, and embodiments may be set forth or apparent from consideration of the following detailed description, drawings, and claims. Moreover, it is to be understood that both the foregoing summary and the following detailed description are provided by way of example only and intended to provide further explanation without limiting the scope of the claimed subject matter.
BRIEF DESCRIPTION OF THE DRAWINGS
Many aspects of the present disclosure can be better understood with reference to the following diagrams. The drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating certain features of the disclosure. Moreover, in the drawings, like reference numerals designate corresponding parts throughout the several views.
FIG.1 is a block diagram of a networked environment according to certain exemplary embodiments of the present invention.
FIG.2 is a flowchart illustrating an exemplary application access control process using profile and certificate confirmation in the networked environment ofFIG.1 according to certain embodiments of the present invention.
FIG.3 is a flowchart illustrating an exemplary data access control process using profile and certificate confirmation executed in the networked environment ofFIG.1 according to certain embodiments of the present invention.
DETAILED DESCRIPTION
It is to be understood that the invention is not limited to the particular methodology, protocols, etc. described herein, as the skilled artisan will recognize that these may vary in different embodiments the invention. It is also to be understood different embodiments the invention. It is also to be understood that the terminology used herein is used for the purpose of describing particular embodiments only, and is not intended to limit the scope of the invention. It also is to be noted that as used herein and in the appended claims, the singular forms “a,” “an,” and “the” include the plural reference unless the context clearly dictates otherwise. Thus, for example, a reference to “a server” is a reference to one or more servers and equivalents thereof known to those skilled in the art.
The embodiments of the invention and the various features and advantageous details thereof are explained more fully with reference to the non-limiting embodiments and examples that are described and/or illustrated in the accompanying drawings and detailed in the following description. Descriptions of well-known components and computing techniques may be omitted so as to not unnecessarily obscure the embodiments of the invention. The examples used herein are intended merely to facilitate an understanding of ways in which the invention may be practiced and to further enable those of skill in the art to practice the embodiments of the invention. Accordingly, the examples and embodiments herein should not be construed as limiting the scope of the invention, which is defined solely by the appended claims and applicable law.
As used herein, a “profile” should be understood as referring to a file that is recognizable by the operating system (OS) of a user device, and that defines one or more settings. As used herein, such settings may also include more general “parameters” that may relate to, for example, the presence or absence of certain applications on a device, a required version of an application, configuration states that may rely on various settings, etc. The specific settings included in a profile may typically be set by a service manager such as an MDM, and may include an embedded certificate that the OS will recognize and install for the device, such as in a “trust store” or “certificate store” or other suitable memory space (any of which may be generically herein as a “trust store” for ease of reference) of the device. Typically, the profile is formatted in a manner such that the particular OS is able to recognize and implement the settings defined therein when installed by a user. For example, a profile may be an XML file that contains settings (which may define or otherwise indicate desired parameters) to deploy to the OS of a client device. The profile may therefore set and/or control a variety of device settings, functions and the like, e.g. passcode policies, email account configurations, calendar, contact accounts, VPN settings, WiFi settings, restrictions on how and what features and components of the device can and cannot be used, etc. If the profile is uninstalled, disabled, becomes corrupted or is otherwise inactive, the OS will typically remove the corresponding certificate from its trust store.
Disclosed are various embodiments for a system and associated devices and methods for controlling access to resources such as computer applications and electronic data. In one embodiment, a client device executes an application on a user device based on a confirmation that a required profile is present on the user device. As described further herein, the profile may typically include parameters that relate to disabling one or more functions of the client device, such that client device's ability to further distribute the data accessed by the application is inhibited. The confirmation may be based on the presence of a unique certificate associated with the required profile, and typically present on the client device. However, it should also be understood that, as “cloud-based” applications continue to develop, aspects of the invention may find applicability in profile and certificate management environments that securely associate particular client devices with profiles and certificates, without necessarily storing the profiles or corresponding certificates locally on the client device itself.
FIG.1 illustrates anetworked environment100 according to various embodiments. Thenetworked environment100 includes anetwork110, aclient device120, and adistribution server150. Thenetwork110 may be or include, for example, any type of wireless network such as a wireless local area network (WLAN), a wireless wide area network (WWAN), or any other type of wireless network now known or later developed. Additionally, thenetwork110 may be or include the Internet, intranets, extranets, microwave networks, satellite communications, cellular systems, PCS, infrared communications, global area networks, or other suitable networks, etc., or any combination of two or more such networks. In one embodiment, thenetwork110 facilitates transmission ofresources165 between one ormore client devices120 and adistribution server150.
Theclient device120 may be a desktop computer, a laptop computer, a personal digital assistant, a cellular telephone, a set-top box, a music player, a web pad, a tablet computer system, a game console, and/or another device with like capability. Theclient device120 may include a wired network connectivity component (not shown inFIG.1), for example, an Ethernet network adapter, a modem, and/or the like. Theclient device120 may further include a wireless network connectivity interface (not shown inFIG.1), for example, a PCI (Peripheral Component Interconnect) card, USB (Universal Serial Bus) interface, PCMCIA (Personal Computer Memory Card International Association) card, SDIO (Secure Digital Input-Output) card, NewCard, Cardbus, a modem, a wireless radio transceiver, and/or the like. Theclient device120 may thus be operable to communicate via wired connection with thedistribution server150 with the aid of the wired network connectivity component. Theclient device120 may be further operable to communicate wirelessly with thedistribution server150 with the aid of the wireless network connectivity component. Additionally, theclient device120 may further comprise a memory for storing data and applications, a processor for executing applications stored in memory, and a local interface such as a bus.
Additionally, theclient device120 may store in a data store122 aprofile123, user credentials132, acertificate135, and other data. In one embodiment,profile123, may indicate one or more required configuration parameters related to capabilities, functions, and/or applications of theclient device120 that must either be present or not present, or enabled or disabled, on theclient device120 in order to open anapplication126 stored on theclient device120 or use thatapplication126 to access certain data stored on theclient device120, and/or to accesscertain resources165 available on thedistribution server150.
For example, the requiredprofile123 may indicate that a camera, screen capture function, or other function (including applications or functions performed by applications) that would facilitate the transfer of data outside of theclient device120 must be not present, or disabled. These parameters may be determined by a service provider that supportsapplication126 and/or that managesdistribution service174. Therefore, parameters included in theprofile123 may be advantageously used to limit the ability of theclient device120 to transfer certain data outside of theclient device120. Additional details regarding the installation and function of theprofile123 are described further below.
The user credentials132 may uniquely identify the user of theclient device120. For example, the user credentials132 may include a username, a password, and/or biometric data related to facial recognition, retina recognition, fingerprint recognition, and the like.
Thecertificate135 may represent either, or both, of an algorithm for generating a unique certificate and/or the generated certificate itself. In some embodiments, thecertificate135 is introduced to theclient device120 via theprofile123. For example, in certain operating systems, the system may recognize that aprofile123 includes a root or intermediate certificate, and automatically store the certificate in a trust store, or certificate store. Thecertificate135 may be unique and associated with theclient device120,application126, and/or theprofile123. For example, thecertificate135 may be based on one or more of a unique hardware identifier such as a GUID (Globally Unique Identifier), UUID (Universally Unique Identifier), UDID (Unique Device Identifier), serial number, IMEI (Internationally Mobile Equipment Identity), Wi-Fi MAC (Media Access Control) address, Bluetooth MAC address, a CPU ID, and/or the like, or any combination of two or more such hardware identifiers. Additionally or alternatively, thecertificate135 may be securely tied to theprofile123 such that, if theprofile123 is disabled on theclient device120, then thecertificate135 is removed or uninstalled from the client device's trust store.
Thecertificate135 may be generated and/or updated by theclient device120, or may be provided by a third party. For example, an application running on theclient device120 can generate acertificate135 in coordination with a third party server, and can thereafter use the certificate for validation on theclient device120.
Theclient device120 may further be configured to execute various applications. For example, theclient device120 may be configured to execute applications such as web browsing applications, email applications, instant messaging applications, and/or other applications capable of receiving and/orrendering resources165 on adisplay136 associated with theclient device120. Any applications capable of receiving and/or rendering resources on adisplay136 is generally referred to herein as a “client side application”126, even though some, or all, of the application program itself may reside on non-transitory storage medium of any device or server networked to theclient device120. According to certain aspects of the invention, aclient side application126 may further include instructions that identify a requiredcertificate135 associated with the requiredprofile123.
For example, a set of instructions may be included in theclient side application126 that are executed when the application is called. This set of instructions may include a certificate identifier(s) associated with one or more required profiles for the application, and code for querying the OS if the identified certificate(s) are installed. The required profile, and more specifically the device parameters that must be implemented to execute the application, may be set by a service provider that provides the application, provides additional code for the application to perform the certificate validation, and/or provides the profile to the user. Thus, the set of instructions included in theclient side application126 may cause the application to communicate with the OS, using the certificate identifier to determine if the required certificate is installed on theclient device120.
FIG.2 is a flowchart illustrating an exemplary application access control process using profile and certificate confirmation in the networked environment ofFIG.1 according to certain embodiments of the present invention. As shown inFIG.2, the method may begin withstep200, in which a profile is installed on a client device such asclient device120 fromFIG.1. The profile may typically be installed, for example, by opening the profile file embedded in or attached to an e-mail, connecting a smartphone or other mobile client device to a PC (e.g., via USB or another suitable connector, or via Bluetooth, WiFi, infrared or other suitable wireless connection) and loading the profile to the mobile client device. It should be understood that the need to “manually” install such profiles onto the client device is driven by the fact that the client device is not managed, or at least not fully managed, by an MDM and therefore the profile and other MDM settings cannot be “pushed” to the client device by the MDM. Exemplary profiles may include, for example, an iOS profile, an Android OS profile, a Windows Mobile profile, a Windows Phone profile, a Windows 8 (etc.) profile, a Mac OS X (etc.) profile, a Symbian OS profile, or similar profiles recognized by other OS's. In some embodiments, the profile may be associated with (and perhaps specially configured for) a certain user and/or client device or a class or users or client devices. As such, thedistribution server150, or other profile provider, can associate a unique profile with a unique device or set of devices, and ensure that the profile is not migrated to any other device(s). By way of example, a profile with more restrictive device configuration requirement may be provided for devices used by users with lower security clearance or lesser administrative privileges, etc. and a profile with less restrictive device configuration requirements may be provided for devices used by users with higher security clearance or greater administrative privileges, etc.
As part of the profile installation, and as shown instep205, the client device may automatically implement one or more parameters included in the profile. As discussed above, such parameters may advantageously include inhibiting certain hardware and/or software functions of the client device such as a camera, a screen capture, an artificial intelligence and/or assistance program (e.g. Apple Siri, Google Now, and the like), a GPS, Wifi communication, cellular communication, a microphone, speakers, a touchscreen, network support and/or services (e.g. Apple iCloud, Microsoft SkyDrive and the like), etc. In certain embodiments consistent with current OS standards, one ore more of the foregoing parameters may be applied globally (i.e. system wide and applying to all applications). However, the invention may also find applicability in systems that allow for discreet application of such parameters, e.g. limiting camera operation or other functions of the client device only when certain applications are executed, or certain data is rendered on the display screen, etc.
In certain embodiments, such parameters may be applied in a hierarchical manner whereby the most restrictive parameters from a plurality of installed profiles are implemented, which ensures that the client device continues to comply with all required parameters. For example, if a first profile is installed that prohibits all screen capture, the later installation of a profile that only limits screen capture while certain applications are running will not override the more restrictive first profile, at least with respect to the global prohibition of screen capture. Therefore, in some embodiments, multiple profiles may be provided to and simultaneously installed on a particular client device, or the client device or user of the client device may be permitted to choose among the different profiles to be installed in different circumstances.
The method may continue withstep210, in which the system identifies any certificate associated with the profile, and stores the certificate. In some embodiments, the certificate is included in the profile and extracted therefrom by the OS. In other embodiments, the certificate may be provided separately from the profile. Typically the storage is implemented in a trust store that resides on the client device to ensure uninterrupted access to the trust store. However, it may also be possible to store the certificate on another networked device or server that is securely associated with the client device for future reference. The certificate may be, for example, a root or intermediate certificate.
The method may continue withstep215, in which an application, or other resource, is called. This may include, for example, a user request to execute an application or access a file, an application calling another application or resource, etc. In certain embodiments, the request may initiate a limited execution or access to the requested resource in order to execute instructions that attempt to identify a required profile or certificate and/or complete a required certificate validation.
The method may continue withstep220, in which the system checks to see if the required certificate is installed on the device. It should be understood that, as used herein, checks to see if the required certificate is “installed” on the device may include one or more of checking to see if the certificate is stored on the device, checking to see if the certificate is stored in a particular location on the device, e.g. in a trust store, and/or checking to see if a certificate stored on the device is valid. This may be done, for example, by the called application including instructions that request the OS to confirm whether a required certificate is “trusted” by the device. In some embodiments, certificates stored remotely, and associated with the device, may be subject to similar checks, and in some instances may be used instep220 instead of checking for certificates stored on the device itself. In such embodiments, the remotely stored certificates may be updated, at various times, to ensure that the device includes the required profile as needed. For example, an application on the client device may send an alert to delete the remote certificate if the profile is removed, a remote server may ping the client device to check profile compliance, and take appropriate remedial action, such as deleting the remote certificate, if non-compliance is determined, etc.
In some embodiments, an identifier, or other sufficient indicia, of the required certificate may be encoded in the called application. In such embodiments, the application may be updated, as needed, to identify the appropriate certificate, e.g. based on profile updates, software version changes, etc. In some embodiments, the called application may be configured to fetch a required certificate, certificate identifier, or the like, from a remote resource or service provider, such asdistribution service174. For example, the called application may include instructions with an address, or other pointer, to a location at which required certificate, certificate identifier, or the like, are stored. A service provider, or other entity, may then update certificates, certificate identifiers, or the like, in a hardcoded location where various devices can fetch the new certificate, even if it changes.
In some embodiments, the called application may be configured to query the OS to determine whether the certificate is valid by presenting the certificate, or other sufficient indicia, to the OS and asking it to return a binary response of whether the certificate is trusted. The OS may, for example, refer to the trust store, or other certificate directory, to determine whether the certificate is present and/or has been signed by a certificate authority. Typically, current OS's are configured such that a particular application does not have direct access to the trust store in order to make such a determination on its own.
In response to the request from the application, the OS may look for the required certificate in the trust store and/or validate the certificate. In some embodiments, if the required certificate is found, the certification is determined to be trusted by the device and the method may proceed withstep230 where the application is allowed to complete the process of opening. In some embodiments, the certificate may be validated by other means as well, such as checking a certificate authority signature, before proceeding withstep230.
However, if the user has disabled or uninstalled the required profile, or the required profile has become corrupted, etc., then the corresponding certificate may have been removed from the trust store by the OS. Therefore, when the OS looks for the required certificate in the trust store, it will not be found, and the application will not be opened, i.e., the application will not execute its routines for opening or will otherwise be shut down. As mentioned above, certificates may also be determined to be invalid, for example, by not including a required signature, etc. In the event that the certificate is not “trusted” by the device, or is otherwise invalid, the method may continue withstep225.
Instep225, a number of options are possible. Generally speaking,step225 may ensure that the request for access is denied, at least temporarily, until the problem with the certificate is resolved. This may involve, for example, theclient device120 suspending communication with thedistribution server150, the client device displaying an alert to the user with, or without, instructions for correcting the problem, the client device sending an alert to the distribution server, the distribution server suspending communication with the client device, the distribution server sending an alert to the client device, with, or without, instructions for correcting the problem, etc.
In some embodiments, theclient device120 and/ordistribution server150 may initiate corrective and/or remedial measures as part ofstep225, such as on theclient device120. For example, the user ofclient device120 may agree to certain restrictions or remedial measures when theprofile123 is installed, that go into effect if a certificate validation check fails. Such measures may include deleting any local resources that were originally accessed using thecertificate135, disablingenterprise resources165 such as certain enterprise applications associated with theprofile123, etc. In certain embodiments,step225 may be used to pursue an alternate access validation in the event that there is a connection between the user device and thedistribution service174 and the profile-based validation fails. For example, thedistribution service174 may initially attempt to validate the access request using the profile validation, which may require little to no user involvement, and, if that is not successful, thedistribution service174 may initiate a user credential/device identifier (or other) access validation.
Instep225 an alert may be sent to the user and/or service manager. The alert may include one or more of an identification of the application that did not open or the resource to which access was denied, the certificate that was not found, the profile parameters for the profile corresponding to the missing certificate, user identification, device identification, or other information.
It should be noted that, although only a singlecertificate validation step220 is depicted in the embodiment ofFIG.2, as sequentially happening in a certain order, the invention is not limited to such sequential operation. For example, the certificate validation can be performed in response to an attempt to open an application, an attempt to access data, at random times, according to a schedule, and/or based on detection of a non-complying parameter. Depending on the service provider's preferences, this may allow the application to execute based on previous certificate validations, e.g. within a predetermined time frame, or may require updated certificate checks, even while the application is running.
FIG.3 is a flowchart illustrating an exemplary data access control process using profile and certificate confirmation executed in the networked environment ofFIG.1 according to certain embodiments of the present invention. The steps shownFIG.3 may be performed after, or independent of, the steps shown inFIG.2. Instep300, a client side application, such asapplication126 shown inFIG.1, requests access to resources which may be stored locally on the device, or remotely on a server, such asdistribution server150 shown inFIG.1. For example, with respect to a request for remotely stored resources, aclient side application126 may be executed to transmit requests to accessresources165 to thedistribution server150 and render a user interface137 on thedisplay136 that provides access to theresources165. In particular, theresources165 may be presented in a user interface137 by decompressing compressed files and presenting the uncompressed files, mounting disk image files and presenting the mounted image files, running executable files and presenting the executed files, by enabling a data search of theresources165 and presenting the featured output in a user interface, by calling on another application on theclient device120 to respond to data links contained within theresources165, and/or by transmitting a part or the whole of theresources165 to another application on theclient device120.
Instep305, a determination is made as to whether the requesting application complies with the necessary criteria to access the requested resource. Step305 may include, for example, checks to ensure that an application has been updated to a current version, that the request includes valid user credentials, that the request is not coming from a blacklisted address, etc. In some embodiments, a certificate check, as described above, may be all that is implemented in order to grant the application general access to a group of local or remote resources. However, the invention may also be applied in environments that require various other access controls in addition to, or as alternatives to, the certificate validation, as discussed further below.
If the requesting application is found not to comply with any of the requirements to access the requested resource, the method may continue withstep310. Instep310, a number of options are possible. Generally speaking,step310 may ensure that the request for access is denied, at least temporarily, until the problem with the requesting application is resolved. In situations where the client device is attempting to access resources on the distribution server, this may involve, for example, the distribution server suspending communication with the client device, the distribution server sending an alert to the client device, with, or without, instructions for correcting the problem, etc.
In some embodiments, theclient device120 and/ordistribution server150 may initiate corrective and/or remedial measures as part ofstep310, such as those described above with respect to step225.
If the requesting application is found to comply with the requirements to access the requested resource, the method may continue withstep315. Instep315, the resources that correspond to the request, and to which access is authorized, are determined. In some embodiments, parts, or all, ofstep315 may optionally be performed prior to step305.
Various ways of identifying resources that are subject to a particular request, and that may be implemented in conjunction with the concepts provided herein. For example, further details regarding methods of determining the accessible resources, in the context of the present invention, are discussed with reference back toFIG.1. As shown inFIG.1, in one embodiment, theresource qualifier172 may be or include metadata that describes and/or regulates the use of therespective resource165. For example, a resource qualifier may include categories/sub-categories to which theresource165 belongs, an indication that theresource165 is considered a favorite, an indication of whether theresource165 is privately owned, publicly owned, and/or enterprise-owned, an indication of whether theresource165 is confidential, an indication of whether theresource165 is password protected, an indication of the historical version of theresource165, a description of theresource165, one or more comments regarding theresource165, an indication of the size and format of theresource165, an indication of the download priority associated with theresource165, an indication of the expiration date associated with theresource165, an indication of the effective date associated with theresource165, an indication of the ownership of theresource165, an indication of the managing party of theresource165, and/or the like, or any combination of resource qualifiers.
Thedistribution server150 may comprise, for example, a server computer or any other system providing distribution capability. For purposes of convenience, thedistribution server150 is referred to herein in the singular. Even though thedistribution server150 is referred to in the singular, it is understood that a plurality ofdistribution servers150 may be employed in the arrangements as descried herein.
Certain applications and/or other functionality may be executed in thedistribution server150 according to certain embodiments. Also, certain data is stored in adata store153 that is accessible to thedistribution server150. The data stored in thedata store153, for example, is associated with the operation of the applications and/or functional entities described herein.
Thedata store153 may includeresource grouping identifiers154,resources165, and/or other data. In one embodiment, theresources165 referenced herein may include any electronic data, such as databases, applications, text files, word processor files, spreadsheet files, presentation files, graphic files, audio files, photographic files, video files, applications and application files, and/or the like. More specifically,resources165 may include: data files, audio files, video files, three-dimensional image files, raster image files, vector image files, page layout files, spreadsheet files, database files, executable files, CAD files, web files, plug-in files, font files, system files, settings files, encoded files, compressed files, disk image files, developer files, backup files, and/or any other files.
Theresource grouping identifiers154 may represent unique identifiers for previously determined resource groupings and are used to determine whichresources165 are served up to the user of theclient device120. For example, a resource grouping may relate to approved profile andcertificates159, organizational groups, organizational roles, geographic locations, and/or any other type of grouping that require access to a type of resource. In some embodiments,distribution rules171 may specify, or be otherwise associated with, required profiles125 orcertificates135 that must be confirmed in order to transfer resources to a requestingclient device120.
Eachresource grouping identifier154 may be associated with a pairing of at least one of a plurality of approved user credentials and device identifiers156 and/or a pairing of at least one of a plurality of approved profiles andcertificates159. Generally speaking, pairings of approved user credentials and device identifiers156 may be used to manage the distribution ofresources165 to managedclient devices120, whereas pairings of approved profiles andcertificates159 can be used to manage distribution ofresources165 tounmanaged client devices120.
The components executed on thedistribution server150, for example, include thedistribution service174 and other applications, services, processes, systems, engines, or functionality not disclosed in detail herein. Thedistribution service174 may be executed to provideresources165 stored in thedata store153 to a requestingclient device120 based on, for example,resource grouping identifiers154 anddistribution rules171, as will be described.Distribution service174 may also generate and distribute requiredprofiles123 includingcertificates135 to client devices. It should be understood that, in some circumstances it may be advantageous to push the distribution rules171 to managed client devices that do not use a profile and certificate validation as described herein. However, if a client device is using a profile and certificate validation, the distribution rules171 may simply be used as a tool to associate approved profiles and certificates with appropriate resources, without pushing the distribution rules171 to the client device(s).
A user operating aclient device120 may wish to accessresources165 stored on thedistribution server150. In one embodiment, the user may interact with an input device to manipulate a user interface137 rendered by theclient side application126, to thereby cause theclient device120 to transmit arequest177 for accessing one ormore resources165 on thedistribution server150. For unmanaged devices, theclient device120 and/or thedistribution server150 may be required to confirm the installation of thecertificate135 on thedevice120 before access will be granted. For example, therequest177 may include confirmation that theclient device120 has avalid certificate135, or it may include such information as may be necessary fordistribution server150 to confirm these facts.
Upon determining that therequest177 from theclient device120 is valid, such as instep305 ofFIG.3, thedistribution server150 may further determine which of theresources165 to provide to theclient device120, as instep315 ofFIG.3. In one embodiment, thedistribution service174 determines whichresources165 to provide based on theresource grouping identifiers154 associated with eachresource165. For instance, in the case of a managedclient device120, thedistribution service174 may first determine whichresource grouping identifiers154 are associated with user credentials132 included in therequest177. In the case of an unmanaged client device, thedistribution service174 may first determine whichresource grouping identifiers154 are associated with the profile/certificate information received from theclient device120.
Next, thedistribution service174 may identify aresource165 to provide to theclient device120 based on the determinedresource grouping identifiers154. In one embodiment, thedistribution service174 identifies one ormore resources165 associated with each one of the determinedresource grouping identifiers154. In another embodiment, thedistribution service174 identifies theresource165 if theresource165 is associated with all of the determinedresource grouping identifiers154. Additionally, in another embodiment, thedistribution service174 identifies theresource165 if it is associated with a threshold number of theresource grouping identifiers154. Thedistribution service174 may then provide the identifiedresources165 to theclient device120 or otherwise allow the client device to accesssuch resources165.
Instep315, information related to the access request may also be logged and stored, for example, by theclient device120 and/ordistribution server150. These records may be used to maintain access for predetermined periods of time and other housekeeping matters, such as refusing further access requests after a certain number of failed attempts.
Instep320, thedistribution service174 facilitates accessing theresources165 for theclient device120. In one embodiment, the requested resource(s) may be provided toclient side application126 based on the request and validation without further input from the user, e.g. thedistribution service174 automatically transmits the identifiedresources165 that theclient device120 is authorized to receive. In other embodiments, thedistribution service174 may provide an operable hyperlink, or the like, to theclient device120, that is tied to a specific client side application. For instance, theclient device120 may receive an indication that theresource165 is available for download and may transmit a request to thedistribution service174 for downloading theapplicable resource165. Upon receiving the request, thedistribution service165 may transmit theresource165 to theclient device120. Aclient side application126 on theclient device120 may periodically determine whether theclient device120 remains compliant to access the receivedresources165, e.g. based on periodic certificate validation, as described above.
Other access facilitating methods may include, for example, granting folder access, application downloads and/or access, etc. For example, thedistribution service174 may provide an appropriate user interface to theclient device120. Thedistribution service174 may determine theresource grouping identifiers154 of theresources165 accessible using theprofile123 from theclient device120. In one embodiment, thedistribution service174 determines theresource grouping identifiers154 based on the required certificate. For instance, eachresource grouping identifier154 may be associated with a profile/certificate. Thedistribution service174 may determine one or moreresource grouping identifiers154 associated with the profile/certificate, as described above.
Aspects of the above described steps may also be performed with respect to accessing resources stored locally on the client device. For example, an application that uses a certificate validation may be allowed to store certain data locally. If a user attempts to reopen the locally stored data, the application may go through certificate validation steps before granting access to the locally stored data. Likewise, thedata store122 may include any of theresource grouping identifiers154, and the like, as used on thedistribution server150, to facilitate identification of accessible resources that may be stored on theclient device120.
Although thedistribution service174,client side application126, and other various systems described herein may be embodied in software or code executed by general purpose hardware as discussed above, as an alternative the same may also be embodied in dedicated hardware or a combination of software/general purpose hardware and dedicated hardware. If embodied in dedicated hardware, each can be implemented as a circuit or state machine that employs any one of or a combination of a number of technologies. These technologies may include, but are not limited to, discrete logic circuits having logic gates for implementing various logic functions upon an application of one or more data signals, application specific integrated circuits having appropriate logic gates, or other components, etc. Such technologies are generally well known by those skilled in the art and, consequently, are not described in detail herein.
The flowcharts ofFIGS.2 and3 may show certain functionality and operations described as performed by thedistribution service174 andclient side application126, respectively. If embodied in software, each box may represent a module, segment, or portion of code that comprises program instructions to implement the specified logical function(s). The program instructions may be embodied in the form of source code that comprises human-readable statements written in a programming language or machine code that comprises numerical instructions recognizable by a suitable execution system such as a processor in a computer system or other system. The machine code may be converted from the source code, etc. If embodied in hardware, each block may represent a circuit or a number of interconnected circuits to implement the specified logical function(s).
Although the flowcharts ofFIGS.2 and3 show a specific order of execution, it is understood that the order of execution may differ from that which is depicted. For example, the order of execution of two or more steps may be scrambled relative to the order shown. Also, two or more blocks shown in succession inFIGS.2 and3 may be executed concurrently or with partial concurrence. Further, in some embodiments, one or more of the steps shown inFIGS.2 and3 may be skipped or omitted. In addition, any number of counters, state variables, warning semaphores, or messages might be added to the logical flow described herein, for purposes of enhanced utility, accounting, performance measurement, or providing troubleshooting aids, etc. It is understood that all such variations are within the scope of the present disclosure.
Any logic or application described herein, including thedistribution service174 and theclient side application126, or other processes and modules running ondistribution server150 orclient device120, that comprises software or code can be embodied in any non-transitory computer-readable medium for use by or in connection with an instruction execution system such as, for example, a processor in a computer system or other system. In this sense, the logic may comprise, for example, statements including instructions and declarations that can be fetched from the computer-readable medium and executed by the instruction execution system. In the context of the present disclosure, a “computer-readable medium” can be any medium that can contain, store, or maintain the logic or application described herein for use by or in connection with the instruction execution system. The computer-readable medium can comprise any one of many physical media such as, for example, magnetic, optical, or semiconductor media. More specific examples of a suitable computer-readable medium would include, but are not limited to, magnetic tapes, magnetic floppy diskettes, magnetic hard drives, memory cards, solid-state drives, USB flash drives, or optical discs. Also, the computer-readable medium may be a random access memory (RAM) including, for example, static random access memory (SRAM) and dynamic random access memory (DRAM), or magnetic random access memory (MRAM). In addition, the computer-readable medium may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or other type of memory device.
It should be emphasized that the above-described embodiments of the present disclosure are merely possible examples of implementations set forth for a clear understanding of the principles of the disclosure. Many variations and modifications may be made to the above-described embodiment(s) without departing substantially from the spirit and principles of the disclosure. All such modifications and variations are intended to be included herein within the scope of this disclosure and protected by the following claims.

Claims (17)

The invention claimed is:
1. A method for managing a device, comprising:
sending, to the device from a remote server, a profile specifying that an application installed on the device is authorized to execute on the device and authorized to access a resource, wherein the profile comprises a certificate that uniquely identifies the profile from another profile;
receiving, at the remote server, a request from the application installed on the device to access the resource, the request including the certificate;
verifying that the certificate is valid;
identifying the resource based on a resource grouping identifier that is associated with a pairing of the profile and the certificate; and
if the certificate is valid, providing the application with access to the resource; and, wherein providing the application with access to the resource further comprises providing the application with access to a plurality of additional resources authorized by the certificate.
2. The method ofclaim 1, further comprising: if the certificate is not valid, determining, in a subsequent verification, that the certificate is no longer valid, and denying access to the resource.
3. The method ofclaim 1, further comprising: if the certificate is not valid, determining, in a subsequent verification, that the certificate is no longer valid, and initiating a remedial measure defined by the profile.
4. The method ofclaim 3, wherein the remedial measure is one of at least:
causing the device to delete any resources originally accessed using the certificate;
disabling an enterprise application;
sending an alert to the device alerting a user of the device that access was denied;
sending an alert to an administrator; and
pursuing an alternate validation method.
5. The method ofclaim 1, wherein the profile is uniquely associated with the application.
6. The method ofclaim 1, wherein providing the application with access to the resource further comprises locating the resource and transmitting the resource to the device.
7. A non-transitory, computer-readable medium comprising instructions that, when executed by a processor of a remote server, performs stages for managing a device, the stages comprising:
sending, to the device from the remote server, a profile specifying that an application installed on the device is authorized to execute on the device and authorized to access a resource, wherein the profile comprises a certificate that uniquely identifies the profile from another profile;
receiving, at the remote server, a request from the application installed on the device to access the resource, the request including the certificate;
verifying that the certificate is valid;
identifying the resource based on a resource grouping identifier that is associated with a pairing of a user credential and a device identifier of the device; and
if the certificate is valid, providing the application with access to the resource; and, wherein providing the application with access to the resource further comprises providing the application with access to a plurality of additional resources authorized by the certificate.
8. The non-transitory, computer-readable medium ofclaim 7, the stages further comprising: if the certificate is not valid, determining, in a subsequent verification, that the certificate is no longer valid, and denying access to the resource.
9. The non-transitory, computer-readable medium ofclaim 7, the stages further comprising: if the certificate is not valid, determining, in a subsequent verification, that the certificate is no longer valid, and initiating a remedial measure defined by the profile.
10. The non-transitory, computer-readable medium ofclaim 9, wherein the remedial measure is one of at least:
causing the device to delete any resources originally accessed using the certificate;
disabling an enterprise application;
sending an alert to the device alerting a user of the device that access was denied;
sending an alert to an administrator; and
pursuing an alternate validation method.
11. The non-transitory, computer-readable medium ofclaim 7, wherein the profile is uniquely associated with the application.
12. The non-transitory, computer-readable medium ofclaim 7, wherein providing the application with access to the resource further comprises locating the resource and transmitting the resource to the device.
13. A server, comprising:
a memory storage storing program code; and
a processor coupled to the memory storage, wherein, upon execution, the program code causes the processor to:
send, to a device from the server, a profile specifying that an application installed on the device is authorized to execute on the device and authorized to access a resource, wherein the profile comprises a certificate that uniquely identifies the profile from another profile;
receive a request, from the application installed on the device, to access the resource, the request including the certificate;
verify that the certificate is valid;
identify the resource based on a resource grouping identifier that is associated with a pairing of the profile and the certificate; and
if the certificate is valid, provide the application with access to the resource; and, wherein providing the application with access to the resource further comprises providing the application with access to a plurality of additional resources authorized by the certificate.
14. The server ofclaim 13, wherein the program code causes the processor to, if the certificate is not valid, determine, in a subsequent verification, that the certificate is no longer valid, and deny access to the resource.
15. The server ofclaim 13, wherein the program code causes the processor to, if the certificate is not valid, determine, in a subsequent verification, that the certificate is no longer valid, and initiate a remedial measure defined by the profile.
16. The server ofclaim 15, wherein the remedial measure is one of at least:
causing the device to delete any resources originally accessed using the certificate;
disabling an enterprise application;
sending an alert to the device alerting a user of the device that access was denied;
sending an alert to an administrator; and
pursuing an alternate validation method.
17. The server ofclaim 13, wherein the profile is uniquely associated with the application.
US17/109,9502013-03-152020-12-02Certificate based profile confirmationActive2033-04-14USRE49585E1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US17/109,950USRE49585E1 (en)2013-03-152020-12-02Certificate based profile confirmation

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US13/835,542US9819682B2 (en)2013-03-152013-03-15Certificate based profile confirmation
US15/800,224US10560453B2 (en)2013-03-152017-11-01Certificate based profile confirmation
US17/109,950USRE49585E1 (en)2013-03-152020-12-02Certificate based profile confirmation

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US15/800,224ReissueUS10560453B2 (en)2013-03-152017-11-01Certificate based profile confirmation

Publications (1)

Publication NumberPublication Date
USRE49585E1true USRE49585E1 (en)2023-07-18

Family

ID=50442701

Family Applications (6)

Application NumberTitlePriority DateFiling Date
US13/835,542Active2033-04-16US9819682B2 (en)2013-03-152013-03-15Certificate based profile confirmation
US15/800,224CeasedUS10560453B2 (en)2013-03-152017-11-01Certificate based profile confirmation
US16/749,937ActiveUS10972467B2 (en)2013-03-152020-01-22Certificate based profile confirmation
US17/109,950Active2033-04-14USRE49585E1 (en)2013-03-152020-12-02Certificate based profile confirmation
US17/206,269Active2034-01-25US11824859B2 (en)2013-03-152021-03-19Certificate based profile confirmation
US18/387,568ActiveUS12250220B2 (en)2013-03-152023-11-07Certificate based profile confirmation

Family Applications Before (3)

Application NumberTitlePriority DateFiling Date
US13/835,542Active2033-04-16US9819682B2 (en)2013-03-152013-03-15Certificate based profile confirmation
US15/800,224CeasedUS10560453B2 (en)2013-03-152017-11-01Certificate based profile confirmation
US16/749,937ActiveUS10972467B2 (en)2013-03-152020-01-22Certificate based profile confirmation

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
US17/206,269Active2034-01-25US11824859B2 (en)2013-03-152021-03-19Certificate based profile confirmation
US18/387,568ActiveUS12250220B2 (en)2013-03-152023-11-07Certificate based profile confirmation

Country Status (4)

CountryLink
US (6)US9819682B2 (en)
EP (1)EP2973157B1 (en)
AU (1)AU2014235181B9 (en)
WO (1)WO2014151256A1 (en)

Families Citing this family (47)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8713173B2 (en)2008-12-192014-04-29Openpeak Inc.System and method for ensuring compliance with organizational policies
US8695060B2 (en)2011-10-102014-04-08Openpeak Inc.System and method for creating secure applications
US9087191B2 (en)2012-08-242015-07-21Vmware, Inc.Method and system for facilitating isolated workspace for applications
US9094413B2 (en)2012-08-272015-07-28Vmware, Inc.Configuration profile validation on iOS Using SSL and redirect
US9077725B2 (en)2012-08-272015-07-07Vmware, Inc.Configuration profile validation on iOS based on root certificate validation
CN105075219A (en)*2013-03-282015-11-18汤姆逊许可公司 Network system including security management server and home network, and method for including devices in network system
US9185099B2 (en)*2013-09-232015-11-10Airwatch LlcSecurely authorizing access to remote resources
DE102013222503A1 (en)*2013-11-062015-05-07Siemens Aktiengesellschaft A client device and method for embossing a client device to at least one server device
DE102014203089A1 (en)*2014-02-202015-08-20Rohde & Schwarz Gmbh & Co. Kg Two-radio radio and method of transmitting information
US9838381B2 (en)*2014-02-262017-12-05Mitsubishi Electric CorporationCertificate management apparatus and certificate management method
US9998914B2 (en)2014-04-162018-06-12Jamf Software, LlcUsing a mobile device to restrict focus and perform operations at another mobile device
US10592223B2 (en)*2014-04-302020-03-17Micro Focus LlcUsing a single deployer agent to deploy a plurality of programs on a server
US9602328B2 (en)*2014-05-142017-03-21Vivek MundhraSystem, method and computer program product for secure peer-to-peer transactions
US9647897B2 (en)2014-08-202017-05-09Jamf Software, LlcDynamic grouping of managed devices
US8938547B1 (en)2014-09-052015-01-20Openpeak Inc.Method and system for data usage accounting in a computing device
US9100390B1 (en)2014-09-052015-08-04Openpeak Inc.Method and system for enrolling and authenticating computing devices for data usage accounting
US9350818B2 (en)2014-09-052016-05-24Openpeak Inc.Method and system for enabling data usage accounting for unreliable transport communication
US9232013B1 (en)2014-09-052016-01-05Openpeak Inc.Method and system for enabling data usage accounting
US20160071040A1 (en)2014-09-052016-03-10Openpeak Inc.Method and system for enabling data usage accounting through a relay
US20160087863A1 (en)*2014-09-192016-03-24Microsoft CorporationInfering Management State via Secondary State
US9098715B1 (en)2014-10-282015-08-04Openpeak Inc.Method and system for exchanging content between applications
US9961074B2 (en)*2015-02-102018-05-01Dell Products, LpSystem and method for providing an authentication certificate for a wireless handheld device a data center environment
US10379829B2 (en)*2015-02-262019-08-13Blackberry LimitedSystem and method for restricting system and application software available for installation on a managed mobile device
US9232078B1 (en)2015-03-162016-01-05Openpeak Inc.Method and system for data usage accounting across multiple communication networks
US10554662B2 (en)*2015-06-302020-02-04Mcafee, LlcSecurity service for an unmanaged device
US10972262B2 (en)2015-12-302021-04-06T-Mobile Usa, Inc.Persona and device based certificate management
US10652023B2 (en)*2015-12-302020-05-12T-Mobile Usa, Inc.Persona and device based certificate management
US10180834B2 (en)*2016-02-292019-01-15Airwatch LlcProvisioning of applications deployed on client devices
US10270603B2 (en)2016-03-172019-04-23Blackberry LimitedProcessing certificate validation warnings
US10225740B2 (en)*2016-05-122019-03-05Zscaler, Inc.Multidimensional risk profiling for network access control of mobile devices through a cloud based security system
US10511607B2 (en)*2016-05-122019-12-17Zscaler, Inc.Multidimensional risk profiling for network access control of mobile devices through a cloud based security system
US11843577B2 (en)*2016-12-132023-12-12Zscaler, Inc.Fingerprinting to identify devices and applications for use in management and policy in the cloud
US11134386B2 (en)*2016-12-132021-09-28Zscaler, Inc.Device identification for management and policy in the cloud
US10834217B2 (en)*2017-08-162020-11-10T-Mobile Usa, Inc.Managing mobile notifications received via a wireless communication network
US11019056B2 (en)2018-01-312021-05-25Sophos LimitedManaging claiming of unrecognized devices for admission to an enterprise network
US11310275B2 (en)2018-01-312022-04-19Sophos LimitedManaging admission of unrecognized devices onto an enterprise network
US11134056B2 (en)2018-01-312021-09-28Sophos LimitedPortal for managing admission of unrecognized devices to an enterprise network
US10797890B2 (en)*2018-02-262020-10-06Blackberry LimitedProviding inter-enterprise data communications between enterprise applications on an electronic device
US11025628B2 (en)2018-04-172021-06-01Cisco Technology, Inc.Secure modification of manufacturer usage description files based on device applications
US10275613B1 (en)*2018-04-202019-04-30Capital One Services, LlcIdentity breach notification and remediation
US20200028879A1 (en)*2018-07-172020-01-23Microsoft Technology Licensing, LlcQueryless device configuration determination-based techniques for mobile device management
US11184223B2 (en)2018-07-312021-11-23Microsoft Technology Licensing, LlcImplementation of compliance settings by a mobile device for compliance with a configuration scenario
US11876798B2 (en)*2019-05-202024-01-16Citrix Systems, Inc.Virtual delivery appliance and system with remote authentication and related methods
US11381403B2 (en)*2019-12-092022-07-05Sap SeIntegrating blockchain with off-chain services
US11770377B1 (en)*2020-06-292023-09-26Cyral Inc.Non-in line data monitoring and security services
WO2023022724A1 (en)*2021-08-202023-02-23Hewlett-Packard Development Company, L.P.Agent-based certificate management
WO2025096896A2 (en)*2023-11-012025-05-08Steven SpunginStaged resource querying

Citations (133)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CA2149337A1 (en)1992-12-021994-06-09Ted H. ClarkHandheld computer with automatic data synchronization with host computer
US5574786A (en)1995-02-061996-11-12International Business Machines CorporationSecuring trusted personal computer system against unauthorized movement
US5987609A (en)1996-10-031999-11-16Kabushiki Kaisha ToshibaSystem for remotely securing/locking a stolen wireless device via an Email message
US6021492A (en)1996-10-092000-02-01Hewlett-Packard CompanySoftware metering management of remote computing devices
US6023708A (en)1997-05-292000-02-08Visto CorporationSystem and method for using a global translator to synchronize workspace elements across a network
US6085192A (en)1997-04-112000-07-04Roampage, Inc.System and method for securely synchronizing multiple copies of a workspace element in a network
GB2346716A (en)1998-11-252000-08-16IbmDistribution of applications to intermittently connected clients
US6131096A (en)1998-10-052000-10-10Visto CorporationSystem and method for updating a remote database in a network
US6131116A (en)1996-12-132000-10-10Visto CorporationSystem and method for globally accessing computer services
US6151606A (en)1998-01-162000-11-21Visto CorporationSystem and method for using a workspace data manager to access, manipulate and synchronize network data
US6233341B1 (en)1998-05-192001-05-15Visto CorporationSystem and method for installing and using a temporary certificate at a remote site
US20020013721A1 (en)2000-05-222002-01-31Alan DabbiereSystem, method and apparatus for integrated supply chain management
WO2002041661A2 (en)2000-11-062002-05-23Qualcomm IncorporatedMethod and apparatus for preventing access to information stored at a node
EP1276035A2 (en)1994-11-232003-01-15ContentGuard Holdings, Inc.System for controlling the distribution and use of digital works using digital tickets
US6560772B1 (en)1999-10-152003-05-06International Business Machines CorporationMethod, system, and program for accessing data in different environments
US20030110084A1 (en)1998-03-042003-06-12Martin Forest EberhardSecure content distribution system
US20030204716A1 (en)2002-04-242003-10-30Rockwood Troy DeanSystem and methods for digital content distribution
WO2003096238A1 (en)2002-05-072003-11-20Sony Ericsson Mobile Communications AbMethod for loading an application in a device, device and smart card therefor
US6708221B1 (en)1996-12-132004-03-16Visto CorporationSystem and method for globally and securely accessing unified information in a computer network
US6714859B2 (en)1993-05-182004-03-30Arrivalstar, Inc.System and method for an advance notification system for monitoring and reporting proximity of a vehicle
US6727856B1 (en)2002-06-062004-04-27Good Technology, Inc.Antenna system for a wireless device
US6726106B1 (en)2002-04-022004-04-27Good Technology, Inc.Power management and device illumination mechanisms for a personal digital assistant
US6741927B2 (en)1993-05-182004-05-25Arrivalstar, Inc.User-definable communications methods and systems
US6741232B1 (en)2002-01-232004-05-25Good Technology, Inc.User interface for a data processing apparatus
US20040123153A1 (en)2002-12-182004-06-24Michael WrightAdministration of protection of data accessible by a mobile device
US6766454B1 (en)1997-04-082004-07-20Visto CorporationSystem and method for using an authentication applet to identify and authenticate a user in a computer network
US6779118B1 (en)1998-05-042004-08-17Auriq Systems, Inc.User specific automatic data redirection system
US20040177249A1 (en)2003-03-062004-09-09International Business Machines Corporation, Armonk, New YorkMethod and apparatus for authorizing execution for applications in a data processing system
US20040181687A1 (en)2003-03-142004-09-16Nachenberg Carey S.Stream scanning through network proxy servers
US20040224703A1 (en)2003-05-092004-11-11Takaki Steven M.Method and system for enhancing venue participation by venue participants
US20050246192A1 (en)2004-03-182005-11-03Francisco JauffredTransportation management system and method for shipment planning optimization
US6965876B2 (en)1995-11-272005-11-15Manhattan Associates, Inc.Methods and devices utilizing a tracking system
US6995749B2 (en)2003-03-282006-02-07Good Technology, Inc.Auto font magnification mechanism
US7032181B1 (en)2002-06-182006-04-18Good Technology, Inc.Optimized user interface for small screen devices
US7039394B2 (en)2003-11-252006-05-02Good Technology, Inc.Communication system and method for compressing information sent by a communication device to a target portable communication device
US20060106836A1 (en)*2002-06-072006-05-18Madoka MasugiData processing system, data processing device, data processing method, and computer program
US7064688B2 (en)2001-07-092006-06-20Good Technology, Inc.System and method for compressing data on a bandwidth-limited network
US7092943B2 (en)2002-03-012006-08-15Enterasys Networks, Inc.Location based data
US20060190984A1 (en)2002-09-232006-08-24Credant Technologies, Inc.Gatekeeper architecture/features to support security policy maintenance and distribution
US20070033397A1 (en)2003-10-202007-02-08Phillips Ii Eugene BSecuring digital content system and method
US7184801B2 (en)2003-05-122007-02-27Good Technology, Inc.Mobile application builder
US7191058B2 (en)1993-05-182007-03-13Melvino Technologies, LimitedNotification systems and methods enabling user entry of notification trigger information based upon monitored mobile vehicle location
US20070106899A1 (en)*2005-08-112007-05-10Hideyuki SuzukiWireless communication system, terminal, method for reporting status of terminal, and program
US7225231B2 (en)2000-09-202007-05-29Visto CorporationSystem and method for transmitting workspace elements across a network
US7228383B2 (en)2001-06-012007-06-05Visto CorporationSystem and method for progressive and hierarchical caching
US20070136492A1 (en)2005-12-082007-06-14Good Technology, Inc.Method and system for compressing/decompressing data for communication with wireless devices
US20070143851A1 (en)*2005-12-212007-06-21FiberlinkMethod and systems for controlling access to computing resources based on known security vulnerabilities
US20070156897A1 (en)2005-12-292007-07-05Blue JungleEnforcing Control Policies in an Information Management System
US7275073B2 (en)2003-05-072007-09-25Good Technology, Inc.System and method for notifying mobile devices based on device type and network capabilities
US7284045B1 (en)2001-06-012007-10-16Visto CorporationMethod and system for determining information to access an electronic mail account
US7287271B1 (en)1997-04-082007-10-23Visto CorporationSystem and method for enabling secure access to services in a computer network
US20070261099A1 (en)2006-05-022007-11-08Broussard Scott JConfidential content reporting system and method with electronic mail verification functionality
US7308703B2 (en)2002-12-182007-12-11Novell, Inc.Protection of data accessible by a mobile device
US20070288637A1 (en)2006-06-072007-12-13Novell, IncDistributed secure content delivery
US7310535B1 (en)2002-03-292007-12-18Good Technology, Inc.Apparatus and method for reducing power consumption in a wireless device
US20080005426A1 (en)*2006-05-312008-01-03Bacastow Steven VApparatus and method for securing portable USB storage devices
US7363349B2 (en)2003-01-312008-04-22Visto CorporationAsynchronous real-time retrieval of data
US7363361B2 (en)2000-08-182008-04-22Akamai Technologies, Inc.Secure content delivery system
US7373517B1 (en)1999-08-192008-05-13Visto CorporationSystem and method for encrypting and decrypting files
US20080134305A1 (en)2005-12-162008-06-05Hinton Heather MMethod and system for extending authentication methods
US20080134347A1 (en)2006-08-092008-06-05Vaultus Mobile Technologies, Inc.System for providing mobile data security
US20080201453A1 (en)2007-02-192008-08-21Ondeego, Inc.Methods and system to create applications and distribute applications to a remote device
US7437752B2 (en)2002-09-232008-10-14Credant Technologies, Inc.Client architecture for portable device with security policies
US7444375B2 (en)2001-06-192008-10-28Visto CorporationInteractive voice and text message system
US7447799B2 (en)2002-04-242008-11-04Good Technology, Inc.System and method for automatically updating a wireless device
US7447506B1 (en)2002-03-292008-11-04Good Technology, Inc.Apparatus and method for reducing network congestion
US7475152B2 (en)2004-09-202009-01-06International Business Machines CorporationApproach to provide self-protection function to web content at client side
US20090036111A1 (en)2007-07-302009-02-05Mobile Iron, Inc.Virtual Instance Architecture for Mobile Device Management Systems
US7496957B2 (en)2002-01-022009-02-24Hewlett-Packard Development Company, L.P.System and method for preventing use of a wireless device
US7539665B2 (en)2001-10-232009-05-26Visto CorporationSystem and method for merging remote and local data in a single user interface
US7565314B2 (en)1999-12-232009-07-21Manhattan Associates, Inc.Bid positioning system
US20090198997A1 (en)2006-11-202009-08-06Tet Hin YeapSystem and method for secure electronic communication services
US7590403B1 (en)2005-06-072009-09-15Good Technology, Inc.Wireless device dormancy override
US7594224B2 (en)2003-10-102009-09-22Bea Systems, Inc.Distributed enterprise security system
US7603703B2 (en)2001-04-122009-10-13International Business Machines CorporationMethod and system for controlled distribution of application code and content data within a computer network
US20090260064A1 (en)2008-04-152009-10-15Problem Resolution Enterprise, LlcMethod and process for registering a device to verify transactions
US7617222B2 (en)2002-06-262009-11-10International Business Machines CorporationTransferring data and storing metadata across a network
US7620392B1 (en)2006-02-272009-11-17Good Technology, Inc.Method and system for distributing and updating software in wireless devices
US7620001B2 (en)2004-10-132009-11-17Good Technology, Inc.Communication system and method with mobile devices
US20090300739A1 (en)2008-05-272009-12-03Microsoft CorporationAuthentication for distributed secure content management system
US20090307362A1 (en)1996-12-132009-12-10Visto CorporationSystem and method for globally and securely accessing unified information in a computer network
US7660902B2 (en)2000-11-202010-02-09Rsa Security, Inc.Dynamic file access control and management
US7665118B2 (en)2002-09-232010-02-16Credant Technologies, Inc.Server, computer memory, and method to support security policy maintenance and distribution
US7665125B2 (en)2002-09-232010-02-16Heard Robert WSystem and method for distribution of security policies for mobile devices
US7685645B2 (en)2003-07-312010-03-23International Business Machines CorporationSecurity containers for document components
US7702322B1 (en)2006-02-272010-04-20Good Technology, LlcMethod and system for distributing and updating software in wireless devices
US7702785B2 (en)2001-01-312010-04-20International Business Machines CorporationMethods, systems and computer program products for selectively allowing users of a multi-user system access to network resources
US20100100641A1 (en)2001-11-152010-04-22Visto CorporationSystem and methods for asynchronous synchronization
US20100120450A1 (en)2008-11-132010-05-13Apple Inc.Location Specific Content
US7735122B1 (en)2003-08-292010-06-08Novell, Inc.Credential mapping
US20100146269A1 (en)2008-11-172010-06-10Pawaa Software Pvt. Ltd.System To Secure Electronic Content, Enforce Usage Policies And Provide Configurable Functionalities
US20100144323A1 (en)2008-09-052010-06-10Visto CorporationSystem, apparatus and associated methodology for enriching contact of a remote client
US7739334B1 (en)2000-03-172010-06-15Visto CorporationSystem and method for automatically forwarding email and email events via a computer network to a server computer
US7788382B1 (en)2002-03-262010-08-31Good Technology, Inc.Server initiated synchronization
US7792297B1 (en)1998-03-312010-09-07Piccionelli Greg ASystem and process for limiting distribution of information on a communication network based on geographic location
US20100254410A1 (en)2001-07-092010-10-07Good Technology, Inc.System and method for compressing data using field-based code word generation
US20100273456A1 (en)2007-11-052010-10-28Visto CorporationService management system & associated methodology of providing service related message prioritization in a mobile client
US7840631B2 (en)2003-05-092010-11-23Good Technology, Inc.Multimedia control with one-click device selection
US20100299152A1 (en)2009-05-202010-11-25Mobile Iron, Inc.Selective Management of Mobile Devices in an Enterprise Environment
US20100299719A1 (en)2009-05-212010-11-25Mobile Iron, Inc.Remote Verification for Configuration Updates
US20100299376A1 (en)2009-05-202010-11-25Mobile Iron, Inc.Selective Management of Mobile Devices in an Enterprise Environment
US20100299362A1 (en)2009-05-242010-11-25Roger Frederick OsmondMethod for controlling access to data containers in a computer system
US20110004941A1 (en)2002-08-092011-01-06Visto CorporationSystem and method for preventing access to data on a compromised remote device
US7890091B2 (en)2003-05-082011-02-15Good Technology, Inc.Collaborative data and intelligent synchronization for mobile devices
US7900048B2 (en)*2002-05-072011-03-01Sony Ericsson Mobile Communications AbMethod for loading an application in a device, device and smart card therefor
US7912896B2 (en)2003-04-172011-03-22Visto CorporationData access, replication or communication system comprising a distributed software application
US7917641B2 (en)2006-03-142011-03-29Tangoe, Inc.Apparatus and method for provisioning wireless data communication devices
US20110082900A1 (en)2008-02-152011-04-07Aashin NagpalSystem and Methods to Store, Retrieve, Manage, Augment and Monitor Applications on Appliances
US20110113062A1 (en)2006-03-312011-05-12Visto CorporationSystem and method for searching disparate datastores via a remote device
US20110145932A1 (en)2009-09-082011-06-16Paul Shelton NergerSystem and Method for Remote Management of Applications Downloaded to a Personal Portable Wireless Appliance
US20110153803A1 (en)*2009-12-182011-06-23Richard KuoSystem and Method for Enforcing Device Service Eligibility
US20110153799A1 (en)2009-12-222011-06-23Seiko Epson CorporationImage Display Apparatus and Control Method
US7970386B2 (en)2005-06-032011-06-28Good Technology, Inc.System and method for monitoring and maintaining a wireless device
US20110167474A1 (en)2008-07-242011-07-07Zscaler, Inc.Systems and methods for mobile application security classification and enforcement
US8001082B1 (en)2004-10-282011-08-16Good Technology, Inc.System and method of data security in synchronizing data with a wireless device
US20110202589A1 (en)2010-02-152011-08-18Openwave Systems Inc.Scripting/proxy systems, methods and circuit arrangements
US8037317B2 (en)*2004-07-142011-10-11Panasonic CorporationMethod for authenticating and executing a program
US20110252240A1 (en)2010-04-072011-10-13Gordie FreedmanMobile Device Management
US8046823B1 (en)2006-10-032011-10-25Stamps.Com Inc.Secure application bridge server
US20110276805A1 (en)2010-04-192011-11-10Aashin NagpalSystem and Method for Third Party Creation of Applications for Mobile Appliances
US20110296186A1 (en)2010-06-012011-12-01Visto CorporationSystem and method for providing secured access to services
US20120005578A1 (en)2010-07-012012-01-05Visto CorporationMethod and device for editing workspace data objects
US8094591B1 (en)2002-03-192012-01-10Good Technology, Inc.Data carrier detector for a packet-switched communication network
US20120102392A1 (en)2010-10-262012-04-26Visto CorporationMethod for displaying a data set
US20120159578A1 (en)*2010-12-202012-06-21Chawla Deepak KMethods and apparatus to control privileges of mobile device applications
US8225381B2 (en)2000-11-302012-07-17Access Co., Ltd.Security technique for controlling access to a network by a wireless device
US20120198547A1 (en)2011-02-012012-08-02Rockwell Automation Technologies, Inc.Enhanced organization and automatic navigation of display screens facilitating automation control
US20130061307A1 (en)2011-09-062013-03-07Letmobile LtdMethod and Apparatus for Accessing Corporate Data from a Mobile Device
US20130152169A1 (en)2011-12-092013-06-13Erich StuntebeckControlling access to resources on a network
US8494485B1 (en)2010-12-222013-07-23Mobile Iron, Inc.Management of certificates for mobile devices
US20140162614A1 (en)*2010-11-192014-06-12Mobile Iron, Inc.Management of mobile applications
US20140282916A1 (en)*2013-03-152014-09-18Aerohive Networks, Inc.Access authorization through certificate validation
US9172699B1 (en)2012-11-302015-10-27Microstrategy IncorporatedAssociating a device with a user account

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP4504047B2 (en)*2003-03-192010-07-14株式会社リコー Digital certificate management system, digital certificate management apparatus, digital certificate management method and program
US8739780B2 (en)*2005-08-152014-06-03Resmed LimitedLow cost CPAP flow generator and humidifier assembly
US8412927B2 (en)*2006-06-072013-04-02Red Hat, Inc.Profile framework for token processing system
US8621204B2 (en)*2009-12-232013-12-31Citrix Systems, Inc.Systems and methods for evaluating and prioritizing responses from multiple OCSP responders
US8627063B2 (en)*2009-12-232014-01-07Citrix Systems, Inc.Systems and methods for flash crowd control and batching OCSP requests via online certificate status protocol
US9559847B2 (en)*2014-07-242017-01-31Airwatch LlcContent access for duration of calendar events

Patent Citations (165)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CA2149337A1 (en)1992-12-021994-06-09Ted H. ClarkHandheld computer with automatic data synchronization with host computer
US7191058B2 (en)1993-05-182007-03-13Melvino Technologies, LimitedNotification systems and methods enabling user entry of notification trigger information based upon monitored mobile vehicle location
US6741927B2 (en)1993-05-182004-05-25Arrivalstar, Inc.User-definable communications methods and systems
US6904359B2 (en)1993-05-182005-06-07Arrivalstar, Inc.Notification systems and methods with user-definable notifications based upon occurance of events
US6714859B2 (en)1993-05-182004-03-30Arrivalstar, Inc.System and method for an advance notification system for monitoring and reporting proximity of a vehicle
EP1276035A2 (en)1994-11-232003-01-15ContentGuard Holdings, Inc.System for controlling the distribution and use of digital works using digital tickets
US5574786A (en)1995-02-061996-11-12International Business Machines CorporationSecuring trusted personal computer system against unauthorized movement
US6965876B2 (en)1995-11-272005-11-15Manhattan Associates, Inc.Methods and devices utilizing a tracking system
US5987609A (en)1996-10-031999-11-16Kabushiki Kaisha ToshibaSystem for remotely securing/locking a stolen wireless device via an Email message
US6021492A (en)1996-10-092000-02-01Hewlett-Packard CompanySoftware metering management of remote computing devices
US20110153779A1 (en)1996-12-132011-06-23Visto CorporationSystem and method for globally and securely accessing unified information in a computer network
US6708221B1 (en)1996-12-132004-03-16Visto CorporationSystem and method for globally and securely accessing unified information in a computer network
US20090307362A1 (en)1996-12-132009-12-10Visto CorporationSystem and method for globally and securely accessing unified information in a computer network
US6131116A (en)1996-12-132000-10-10Visto CorporationSystem and method for globally accessing computer services
US7039679B2 (en)1996-12-132006-05-02Visto CorporationSystem and method for globally and securely accessing unified information in a computer network
US20100005125A1 (en)1996-12-132010-01-07Visto CorporationSystem and method for globally and securely accessing unified information in a computer network
US8117344B2 (en)1996-12-132012-02-14Visto CorporationGlobal server for authenticating access to remote services
US20100005195A1 (en)1996-12-132010-01-07Visto CorporationSystem and method for globally and securely accessing unified information in a computer network
US20100023630A1 (en)1996-12-132010-01-28VISTO CORPORATION d/b/a GOOD TECHNOLOGYSystem and method for globally and securely accessing unified information in a computer network
US7287271B1 (en)1997-04-082007-10-23Visto CorporationSystem and method for enabling secure access to services in a computer network
US6766454B1 (en)1997-04-082004-07-20Visto CorporationSystem and method for using an authentication applet to identify and authenticate a user in a computer network
US6085192A (en)1997-04-112000-07-04Roampage, Inc.System and method for securely synchronizing multiple copies of a workspace element in a network
US6023708A (en)1997-05-292000-02-08Visto CorporationSystem and method for using a global translator to synchronize workspace elements across a network
US6151606A (en)1998-01-162000-11-21Visto CorporationSystem and method for using a workspace data manager to access, manipulate and synchronize network data
US20030110084A1 (en)1998-03-042003-06-12Martin Forest EberhardSecure content distribution system
US7792297B1 (en)1998-03-312010-09-07Piccionelli Greg ASystem and process for limiting distribution of information on a communication network based on geographic location
US6779118B1 (en)1998-05-042004-08-17Auriq Systems, Inc.User specific automatic data redirection system
US6233341B1 (en)1998-05-192001-05-15Visto CorporationSystem and method for installing and using a temporary certificate at a remote site
US6131096A (en)1998-10-052000-10-10Visto CorporationSystem and method for updating a remote database in a network
GB2346716B (en)1998-11-252003-07-09IbmMethod and apparatus for server based handheld application and database managemnt
GB2346716A (en)1998-11-252000-08-16IbmDistribution of applications to intermittently connected clients
US7373517B1 (en)1999-08-192008-05-13Visto CorporationSystem and method for encrypting and decrypting files
US6560772B1 (en)1999-10-152003-05-06International Business Machines CorporationMethod, system, and program for accessing data in different environments
US7565314B2 (en)1999-12-232009-07-21Manhattan Associates, Inc.Bid positioning system
US7739334B1 (en)2000-03-172010-06-15Visto CorporationSystem and method for automatically forwarding email and email events via a computer network to a server computer
US20020013721A1 (en)2000-05-222002-01-31Alan DabbiereSystem, method and apparatus for integrated supply chain management
US7363361B2 (en)2000-08-182008-04-22Akamai Technologies, Inc.Secure content delivery system
US20100005157A1 (en)2000-09-202010-01-07VISTO CORPORATION d/b/a GOOD TECHNOLOGYSystem and method for using a global translator to synchronize workspace elements across a network
US20070174433A1 (en)2000-09-202007-07-26Visto CorporationSystem and method for using a global translator to synchronize workspace elements across a network
US7225231B2 (en)2000-09-202007-05-29Visto CorporationSystem and method for transmitting workspace elements across a network
WO2002041661A2 (en)2000-11-062002-05-23Qualcomm IncorporatedMethod and apparatus for preventing access to information stored at a node
US7660902B2 (en)2000-11-202010-02-09Rsa Security, Inc.Dynamic file access control and management
US8225381B2 (en)2000-11-302012-07-17Access Co., Ltd.Security technique for controlling access to a network by a wireless device
US7702785B2 (en)2001-01-312010-04-20International Business Machines CorporationMethods, systems and computer program products for selectively allowing users of a multi-user system access to network resources
US7650491B2 (en)2001-04-122010-01-19International Business Machines CorporationMethod and system for controlled distribution of application code and content data within a computer network
US7603703B2 (en)2001-04-122009-10-13International Business Machines CorporationMethod and system for controlled distribution of application code and content data within a computer network
US7228383B2 (en)2001-06-012007-06-05Visto CorporationSystem and method for progressive and hierarchical caching
US7284045B1 (en)2001-06-012007-10-16Visto CorporationMethod and system for determining information to access an electronic mail account
US7444375B2 (en)2001-06-192008-10-28Visto CorporationInteractive voice and text message system
US7064688B2 (en)2001-07-092006-06-20Good Technology, Inc.System and method for compressing data on a bandwidth-limited network
US20100254410A1 (en)2001-07-092010-10-07Good Technology, Inc.System and method for compressing data using field-based code word generation
US7539665B2 (en)2001-10-232009-05-26Visto CorporationSystem and method for merging remote and local data in a single user interface
US20090144632A1 (en)2001-10-232009-06-04Visto CorporationSystem and method for merging remote and local data in a single user interface
US20100268844A1 (en)2001-11-152010-10-21Visto CorporationSystem and methods for asynchronous synchronization
US7752166B2 (en)2001-11-152010-07-06Visto CorporationSystem and methods for asynchronous synchronization
US20100100641A1 (en)2001-11-152010-04-22Visto CorporationSystem and methods for asynchronous synchronization
US8069144B2 (en)2001-11-152011-11-29Visto CorporationSystem and methods for asynchronous synchronization
US7496957B2 (en)2002-01-022009-02-24Hewlett-Packard Development Company, L.P.System and method for preventing use of a wireless device
US6741232B1 (en)2002-01-232004-05-25Good Technology, Inc.User interface for a data processing apparatus
US7092943B2 (en)2002-03-012006-08-15Enterasys Networks, Inc.Location based data
US8094591B1 (en)2002-03-192012-01-10Good Technology, Inc.Data carrier detector for a packet-switched communication network
US7788382B1 (en)2002-03-262010-08-31Good Technology, Inc.Server initiated synchronization
US7447506B1 (en)2002-03-292008-11-04Good Technology, Inc.Apparatus and method for reducing network congestion
US7310535B1 (en)2002-03-292007-12-18Good Technology, Inc.Apparatus and method for reducing power consumption in a wireless device
US6726106B1 (en)2002-04-022004-04-27Good Technology, Inc.Power management and device illumination mechanisms for a personal digital assistant
US7447799B2 (en)2002-04-242008-11-04Good Technology, Inc.System and method for automatically updating a wireless device
US20030204716A1 (en)2002-04-242003-10-30Rockwood Troy DeanSystem and methods for digital content distribution
WO2003096238A1 (en)2002-05-072003-11-20Sony Ericsson Mobile Communications AbMethod for loading an application in a device, device and smart card therefor
US7900048B2 (en)*2002-05-072011-03-01Sony Ericsson Mobile Communications AbMethod for loading an application in a device, device and smart card therefor
US6727856B1 (en)2002-06-062004-04-27Good Technology, Inc.Antenna system for a wireless device
US20060106836A1 (en)*2002-06-072006-05-18Madoka MasugiData processing system, data processing device, data processing method, and computer program
US7032181B1 (en)2002-06-182006-04-18Good Technology, Inc.Optimized user interface for small screen devices
US7617222B2 (en)2002-06-262009-11-10International Business Machines CorporationTransferring data and storing metadata across a network
US20110004941A1 (en)2002-08-092011-01-06Visto CorporationSystem and method for preventing access to data on a compromised remote device
US8012219B2 (en)2002-08-092011-09-06Visto CorporationSystem and method for preventing access to data on a compromised remote device
US7665125B2 (en)2002-09-232010-02-16Heard Robert WSystem and method for distribution of security policies for mobile devices
US7665118B2 (en)2002-09-232010-02-16Credant Technologies, Inc.Server, computer memory, and method to support security policy maintenance and distribution
US20060190984A1 (en)2002-09-232006-08-24Credant Technologies, Inc.Gatekeeper architecture/features to support security policy maintenance and distribution
US7437752B2 (en)2002-09-232008-10-14Credant Technologies, Inc.Client architecture for portable device with security policies
US7308703B2 (en)2002-12-182007-12-11Novell, Inc.Protection of data accessible by a mobile device
US20040123153A1 (en)2002-12-182004-06-24Michael WrightAdministration of protection of data accessible by a mobile device
US7353533B2 (en)2002-12-182008-04-01Novell, Inc.Administration of protection of data accessible by a mobile device
US20080133712A1 (en)2003-01-312008-06-05Visto CorporationAsynchronous real-time retrieval of data
US8041776B2 (en)2003-01-312011-10-18Visto CorporationAsynchronous real-time retrieval of data
US7363349B2 (en)2003-01-312008-04-22Visto CorporationAsynchronous real-time retrieval of data
US20110320552A1 (en)2003-01-312011-12-29Visto CorporationAsynchronous real-time retrieval of data
US20040177249A1 (en)2003-03-062004-09-09International Business Machines Corporation, Armonk, New YorkMethod and apparatus for authorizing execution for applications in a data processing system
US20040181687A1 (en)2003-03-142004-09-16Nachenberg Carey S.Stream scanning through network proxy servers
US7203959B2 (en)2003-03-142007-04-10Symantec CorporationStream scanning through network proxy servers
US6995749B2 (en)2003-03-282006-02-07Good Technology, Inc.Auto font magnification mechanism
US7912896B2 (en)2003-04-172011-03-22Visto CorporationData access, replication or communication system comprising a distributed software application
US7275073B2 (en)2003-05-072007-09-25Good Technology, Inc.System and method for notifying mobile devices based on device type and network capabilities
US7890091B2 (en)2003-05-082011-02-15Good Technology, Inc.Collaborative data and intelligent synchronization for mobile devices
US7840631B2 (en)2003-05-092010-11-23Good Technology, Inc.Multimedia control with one-click device selection
US20040224703A1 (en)2003-05-092004-11-11Takaki Steven M.Method and system for enhancing venue participation by venue participants
US7184801B2 (en)2003-05-122007-02-27Good Technology, Inc.Mobile application builder
US7685645B2 (en)2003-07-312010-03-23International Business Machines CorporationSecurity containers for document components
US7735122B1 (en)2003-08-292010-06-08Novell, Inc.Credential mapping
US7594224B2 (en)2003-10-102009-09-22Bea Systems, Inc.Distributed enterprise security system
US7603547B2 (en)2003-10-102009-10-13Bea Systems, Inc.Security control module
US7603548B2 (en)2003-10-102009-10-13Bea Systems, Inc.Security provider development model
US20070033397A1 (en)2003-10-202007-02-08Phillips Ii Eugene BSecuring digital content system and method
US7039394B2 (en)2003-11-252006-05-02Good Technology, Inc.Communication system and method for compressing information sent by a communication device to a target portable communication device
US20050246192A1 (en)2004-03-182005-11-03Francisco JauffredTransportation management system and method for shipment planning optimization
US8037317B2 (en)*2004-07-142011-10-11Panasonic CorporationMethod for authenticating and executing a program
US7475152B2 (en)2004-09-202009-01-06International Business Machines CorporationApproach to provide self-protection function to web content at client side
US7620001B2 (en)2004-10-132009-11-17Good Technology, Inc.Communication system and method with mobile devices
US20110270799A1 (en)2004-10-282011-11-03Good Technology, Inc.System and method of data security in synchronizing data with a wireless device
US8001082B1 (en)2004-10-282011-08-16Good Technology, Inc.System and method of data security in synchronizing data with a wireless device
US20110225252A1 (en)2005-06-032011-09-15Good Technology, Inc.System and method for monitoring and maintaining a wireless device
US7970386B2 (en)2005-06-032011-06-28Good Technology, Inc.System and method for monitoring and maintaining a wireless device
US7590403B1 (en)2005-06-072009-09-15Good Technology, Inc.Wireless device dormancy override
US20070106899A1 (en)*2005-08-112007-05-10Hideyuki SuzukiWireless communication system, terminal, method for reporting status of terminal, and program
US20070136492A1 (en)2005-12-082007-06-14Good Technology, Inc.Method and system for compressing/decompressing data for communication with wireless devices
US20080134305A1 (en)2005-12-162008-06-05Hinton Heather MMethod and system for extending authentication methods
US20070143851A1 (en)*2005-12-212007-06-21FiberlinkMethod and systems for controlling access to computing resources based on known security vulnerabilities
US20070156897A1 (en)2005-12-292007-07-05Blue JungleEnforcing Control Policies in an Information Management System
US7620392B1 (en)2006-02-272009-11-17Good Technology, Inc.Method and system for distributing and updating software in wireless devices
US7702322B1 (en)2006-02-272010-04-20Good Technology, LlcMethod and system for distributing and updating software in wireless devices
US8078157B2 (en)2006-02-272011-12-13Good Technology, Inc.Method and system for distributing and updating software in wireless devices
US7917641B2 (en)2006-03-142011-03-29Tangoe, Inc.Apparatus and method for provisioning wireless data communication devices
US20110113062A1 (en)2006-03-312011-05-12Visto CorporationSystem and method for searching disparate datastores via a remote device
US20070261099A1 (en)2006-05-022007-11-08Broussard Scott JConfidential content reporting system and method with electronic mail verification functionality
US20080005426A1 (en)*2006-05-312008-01-03Bacastow Steven VApparatus and method for securing portable USB storage devices
US20070288637A1 (en)2006-06-072007-12-13Novell, IncDistributed secure content delivery
US20080134347A1 (en)2006-08-092008-06-05Vaultus Mobile Technologies, Inc.System for providing mobile data security
US8046823B1 (en)2006-10-032011-10-25Stamps.Com Inc.Secure application bridge server
US20090198997A1 (en)2006-11-202009-08-06Tet Hin YeapSystem and method for secure electronic communication services
US20080201453A1 (en)2007-02-192008-08-21Ondeego, Inc.Methods and system to create applications and distribute applications to a remote device
US8060074B2 (en)2007-07-302011-11-15Mobile Iron, Inc.Virtual instance architecture for mobile device management systems
US20090036111A1 (en)2007-07-302009-02-05Mobile Iron, Inc.Virtual Instance Architecture for Mobile Device Management Systems
US20120015644A1 (en)2007-07-302012-01-19Mobile Iron, Inc.Virtual Instance Architecture for Mobile Device Management Systems
US8150431B2 (en)2007-11-052012-04-03Visto CorporationService management system and associated methodology of providing service related message prioritization in a mobile client
US20100273456A1 (en)2007-11-052010-10-28Visto CorporationService management system & associated methodology of providing service related message prioritization in a mobile client
US20110082900A1 (en)2008-02-152011-04-07Aashin NagpalSystem and Methods to Store, Retrieve, Manage, Augment and Monitor Applications on Appliances
US20090260064A1 (en)2008-04-152009-10-15Problem Resolution Enterprise, LlcMethod and process for registering a device to verify transactions
US20090300739A1 (en)2008-05-272009-12-03Microsoft CorporationAuthentication for distributed secure content management system
US20110167474A1 (en)2008-07-242011-07-07Zscaler, Inc.Systems and methods for mobile application security classification and enforcement
US20100144323A1 (en)2008-09-052010-06-10Visto CorporationSystem, apparatus and associated methodology for enriching contact of a remote client
US20100120450A1 (en)2008-11-132010-05-13Apple Inc.Location Specific Content
US20100146269A1 (en)2008-11-172010-06-10Pawaa Software Pvt. Ltd.System To Secure Electronic Content, Enforce Usage Policies And Provide Configurable Functionalities
US20100299376A1 (en)2009-05-202010-11-25Mobile Iron, Inc.Selective Management of Mobile Devices in an Enterprise Environment
US20100299152A1 (en)2009-05-202010-11-25Mobile Iron, Inc.Selective Management of Mobile Devices in an Enterprise Environment
US20100299719A1 (en)2009-05-212010-11-25Mobile Iron, Inc.Remote Verification for Configuration Updates
US20100299362A1 (en)2009-05-242010-11-25Roger Frederick OsmondMethod for controlling access to data containers in a computer system
US20110145932A1 (en)2009-09-082011-06-16Paul Shelton NergerSystem and Method for Remote Management of Applications Downloaded to a Personal Portable Wireless Appliance
US20110153803A1 (en)*2009-12-182011-06-23Richard KuoSystem and Method for Enforcing Device Service Eligibility
US20110153799A1 (en)2009-12-222011-06-23Seiko Epson CorporationImage Display Apparatus and Control Method
US20110202589A1 (en)2010-02-152011-08-18Openwave Systems Inc.Scripting/proxy systems, methods and circuit arrangements
US8473743B2 (en)*2010-04-072013-06-25Apple Inc.Mobile device management
US20110252240A1 (en)2010-04-072011-10-13Gordie FreedmanMobile Device Management
US20150237498A1 (en)*2010-04-072015-08-20Apple Inc.Mobile device management
US20110276805A1 (en)2010-04-192011-11-10Aashin NagpalSystem and Method for Third Party Creation of Applications for Mobile Appliances
US20110296186A1 (en)2010-06-012011-12-01Visto CorporationSystem and method for providing secured access to services
US20120005578A1 (en)2010-07-012012-01-05Visto CorporationMethod and device for editing workspace data objects
US20120102392A1 (en)2010-10-262012-04-26Visto CorporationMethod for displaying a data set
US20140162614A1 (en)*2010-11-192014-06-12Mobile Iron, Inc.Management of mobile applications
US20120159578A1 (en)*2010-12-202012-06-21Chawla Deepak KMethods and apparatus to control privileges of mobile device applications
US8650620B2 (en)*2010-12-202014-02-11At&T Intellectual Property I, L.P.Methods and apparatus to control privileges of mobile device applications
US8494485B1 (en)2010-12-222013-07-23Mobile Iron, Inc.Management of certificates for mobile devices
US20120198547A1 (en)2011-02-012012-08-02Rockwell Automation Technologies, Inc.Enhanced organization and automatic navigation of display screens facilitating automation control
US20130061307A1 (en)2011-09-062013-03-07Letmobile LtdMethod and Apparatus for Accessing Corporate Data from a Mobile Device
US20130152169A1 (en)2011-12-092013-06-13Erich StuntebeckControlling access to resources on a network
US9172699B1 (en)2012-11-302015-10-27Microstrategy IncorporatedAssociating a device with a user account
US20140282916A1 (en)*2013-03-152014-09-18Aerohive Networks, Inc.Access authorization through certificate validation

Non-Patent Citations (13)

* Cited by examiner, † Cited by third party
Title
"Asynchrony Software, Inc.," PDA Defense User "Guide", 2002, p. 726.
"Download Over the Air Specification", OMA-TS-DLOTA-V2 0-20060907-C, Open Mobile Alliance Ltd, no Candidate Version 2.0 Sep. 7, 2006, Sep. 7, 2006, pp. 1-88.
Armando, Fox , et al., "Security on the Move: Indirect Authentication Using Kerberos", 1996, p. 726.
Belani, Eshwar , et al., "The Crisis Wide Area Security Architecture", 1998, p. 726.
Benaloh, Josh , et al., "Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records", Nov. 13, 2009, p. 726.
Examination Report dated Mar. 20, 2017 for Patent No. 14716157.4-1853.
International Search Report for PCT/2014/025306 dated Sep. 4, 2014.
Menaria, Pankaj , et al., "Security in Mobile Database Systems", Mar. 17, 2011, pp. 707, 726.
Patent Examination Report dated Jun. 20, 2016 for Application No. 2014235181.
Pfitzman, Andreas , et al., "Mobile User Devices and Security Modules: Design for Trustworthiness", Feb. 5, 1996, p. 726.
Shrunk, John , et al., "Self-Securing Storage: Protecting Data in Compromised Systems", Symposium on Operating Systems Design and Implementation, 2000, p. 726.
Steiner, Jennifr , "Kerberos:An Authentication Service for Open Network Systems", Jan. 12, 1988, p. 726.
US 8,061,944 B2, 11/2011, Quinlan (withdrawn)

Also Published As

Publication numberPublication date
EP2973157A1 (en)2016-01-20
AU2014235181B9 (en)2017-03-30
US11824859B2 (en)2023-11-21
AU2014235181A8 (en)2015-03-19
US20180054442A1 (en)2018-02-22
US20140282869A1 (en)2014-09-18
US10560453B2 (en)2020-02-11
US10972467B2 (en)2021-04-06
US20240297882A1 (en)2024-09-05
AU2014235181A1 (en)2015-02-19
US20200162466A1 (en)2020-05-21
WO2014151256A1 (en)2014-09-25
US20210211429A1 (en)2021-07-08
US12250220B2 (en)2025-03-11
US9819682B2 (en)2017-11-14
EP2973157B1 (en)2019-02-27
AU2014235181B2 (en)2016-11-03

Similar Documents

PublicationPublication DateTitle
US12250220B2 (en)Certificate based profile confirmation
US11283803B2 (en)Incremental compliance remediation
US12300056B2 (en)Facial capture managing access to resources by a device
US11689516B2 (en)Application program as key for authorizing access to resources
US10257194B2 (en)Distribution of variably secure resources in a networked environment
US20250030558A1 (en)Application integrity verification for enterprise resource access

Legal Events

DateCodeTitleDescription
FEPPFee payment procedure

Free format text:ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:4

ASAssignment

Owner name:UBS AG, STAMFORD BRANCH, CONNECTICUT

Free format text:SECURITY INTEREST;ASSIGNOR:OMNISSA, LLC;REEL/FRAME:068118/0004

Effective date:20240701

ASAssignment

Owner name:OMNISSA, LLC, CALIFORNIA

Free format text:PATENT ASSIGNMENT;ASSIGNOR:AIRWATCH LLC;REEL/FRAME:068327/0670

Effective date:20240630


[8]ページ先頭

©2009-2025 Movatter.jp