A method, system and non-transitory computer-readable medium product are provided for functionality watermarking and management. In the context of a method, a method is provided that includes identifying a request to perform at least one function of a user device and identifying at least one waterma
A method, system and non-transitory computer-readable medium product are provided for functionality watermarking and management. In the context of a method, a method is provided that includes identifying a request to perform at least one function of a user device and identifying at least one watermark template. The method further includes applying the at least one watermark template to at least one function of the user device and authorizing the request to perform the at least one function of the user device.
대표청구항▼
1. A method comprising: identifying, by a computing device, a request to perform a capture function of a user device;determining, based at least in part on at least one compliance rule associated with the capture function of the user device, whether the user device is only authorized to perform the
1. A method comprising: identifying, by a computing device, a request to perform a capture function of a user device;determining, based at least in part on at least one compliance rule associated with the capture function of the user device, whether the user device is only authorized to perform the capture function in an instance in which at least one particular watermark template of a plurality of watermark templates is populated and applied to the capture function of the user device and to at least one resource captured via the capture function of the user device;in an instance in which it is determined that the user device is only authorized to perform the capture function of the user device in an instance in which the at least one particular watermark template of the plurality of watermark templates is populated and applied to the capture function of the user device and to the at least one resource captured via the at least one capture function of the user device: identifying, based at least in part on the at least one compliance rule associated with the capture function of the user device, the at least one particular watermark template from the plurality of watermark templates, the at least one particular watermark template comprising configuration data, the configuration data comprising at least a naming convention;populating, based at least in part on at least one property associated with the capture function of the user device, the at least one particular watermark template by causing descriptive data to be added to the at least one particular watermark template;applying the at least one particular watermark template to the capture function of the user device by causing at least a portion of the at least one particular watermark template to be overlaid onto at least one graphical interface associated with the capture function of the user device; and,applying the at least one particular watermark template to at least one resource captured by the capture function of the user device by at least: causing at least a portion of the particular watermark template to be added to the at least one resource captured by the capture function of the user device, andcausing the at least one resource captured by the capture function of the user device to be configured in accordance with the configuration data by at least causing the at least one resource captured by the capture function of the user device to be named in accordance with the naming convention. 2. The method of claim 1, wherein the capture unction of the user device comprises a function of the user device configured to capture at least one of the following: a photo resource, a video resource, or an audio recording resource. 3. The method of claim 1, wherein populating, based a least in part on at least property associated with the capture function, the at least one particular watermark template by causing descriptive data to be added to the at least one particular watermark template further comprises: populating, based at least in part on at least one property associated with the user device, the at least one particular watermark template by causing descriptive data to be added to the at least one particular watermark template. 4. The method of claim 1, wherein populating, based at least in part on at least property associated with the capture function, the at least one particular watermark template by causing descriptive data to be added to the at least one particular watermark template further comprises: populating, based at least in part on at least one property associated with a user of the user device, the at least one particular watermark template by causing descriptive data to be added to the at least one articular watermark template. 5. The method of claim 1, wherein the configuration data further comprises a storage structure convention, and wherein causing the at least one resource captured by the capture function of the user device to be configured in accordance with the configuration data comprises causing the at least one resource captured by the capture function of the user device to be stored in accordance with the storage structure convention. 6. The method of claim 1, further comprising: causing at least one event log to be created, the at least one event log describing an application of the at least one particular watermark template. 7. The method of claim 6, further comprising: causing the at least one event log to be transmitted to at least one management service communicatively coupled to the user device. 8. The method of claim 1, further comprising: causing the request to perform the capture function of the user device to be authorized in an instance in which the user device complies with the at least one compliance rule associated with the capture function of the user device. 9. The method of claim 8, further comprising: causing at least one event log to be created, the at least one event log describing an authorization of the request to perform the capture function of the user device. 10. The method of claim 9, further comprising: causing the at least one event log to be transmitted to at least one management service communicatively coupled to the user device. 11. The method of claim 1, further comprising: causing the request to perform the capture function of the user device to be denied in an instance in which the user device does not comply with the at least one compliance rule associated with the capture function of the user device. 12. The method of claim 11, further comprising: causing at least one event log to be created, the at least one event log describing a denial of the request to perform the capture function of the user device. 13. The method of claim 12, further comprising: causing the at least one event log to be transmitted to at least one management service communicatively coupled to the user device. 14. An apparatus comprising: at least one processor; and,at least one memory storing program code instructions, the at least one memory and program code instructions being configured to, with the at least one processor, direct the apparatus to at least: identify a request to perform a capture function of a user device;determine, based at least in part on at least one compliance rule associated with the capture function of the user device, whether the user device is only authorized to perform the capture function in an instance in which at least one particular watermark template of a plurality of watermark templates is populated and applies to the capture function of the user device and to at least one resource captured via the capture function of the user device;in an instance in which it is determined that the user device is only authorized to perform the capture function of the user device in an instance in which the at least one particular watermark template of the plurality of watermark templates is populated and applied to the capture function of the user device and to the at least one resource captured via the at least one capture function of the user device: identify, based at least in part on the at least one compliance rule associated with the capture function of the user device, the at least one particular watermark template from the plurality of watermark templates, the at least one particular watermark template comprising configuration data, the configuration data comprising at least a naming convention;populate, based at least in part on at least one property associated with the capture function of the user device, the at least one particular watermark template by causing descriptive data to be added to the at least one particular watermark template;apply the at least one particular watermark template to the capture function of the user device by causing at least a portion of the at least one particular watermark template to be overlaid onto at least one graphical interface associated with the capture function of the user device; and,apply the at least one particular watermark template to at least one resource captured by the capture function of the user device by at least: causing at least a portion of the particular watermark template to be added to the at least one resource captured by the capture function of the user device, andcausing the at least one resource captured by the capture function of the user device to be configured in accordance with the configuration data by at least causing the at least one resource captured by the capture function of the user device to be named in accordance with the naming convention. 15. The apparatus of claim 14, wherein the capture function of the user device comprises a function of the user device configured to capture at least one of the following: a photo resource, a video resource, or an audio recording resource. 16. The apparatus of claim 14, wherein directing the apparatus to at least populate, based at least in part on at least property associated with the capture function, the at least one particular watermark template by causing descriptive data to be added to the at least one particular watermark template further comprises: directing the apparatus to at least populate, based at least in part on at least one property associated with the user device, the at least one particular watermark template by causing descriptive data to be added to the at least one particular watermark template. 17. The apparatus of claim 14, wherein directing the apparatus to at least populate, based at least in part on at least property associated with the capture function, the at least one particular watermark template by causing descriptive data to be added to the at least one particular watermark template further comprises: directing the apparatus to at least populate, based at least in part on at least one property associated with a user of the user device, the at least one particular watermark template by causing descriptive data to be added to the at least one particular watermark template. 18. The apparatus of claim 14, wherein the configuration data further comprises a storage structure convention, and wherein causing the at least one resource captured by the capture function of the user device to be configured in accordance with the configuration data comprises causing the at least one resource captured by the capture function of the user device to be stored in accordance with the storage structure convention. 19. The apparatus of claim 14, wherein the apparatus is further directed to at least: cause at least one event log to be created, the at least one event log describing an application of the at least one particular watermark template. 20. The apparatus of claim 19, wherein the apparatus is further directed to at least: cause the at least one event log to be transmitted to at least one management service communicatively coupled to the user device. 21. The apparatus of claim 14, wherein the apparatus is further directed to at least: cause the request to perform the capture function of the user device to be authorized in an instance in which the user device complies with the at least one compliance rule associated with the capture function of the user device. 22. The apparatus of claim 21, wherein the apparatus is further directed to at least: cause at least one event log to be created, the at least one event log describing an authorization of the request to perform the capture function of the user device. 23. The apparatus of claim 22, wherein the apparatus is further directed to at least: cause the at least one event log to be transmitted to at least one management service communicatively coupled to the user device. 24. The apparatus of claim 14, wherein the apparatus is further directed to at least: cause the request to perform the capture function of the user device to be denied in an instance in which the user device does not comply with the at least one compliance rule associated with the capture function of the user device. 25. The apparatus of claim 24, wherein the apparatus is further directed to at least: cause at least one event log to be created, the at least one event log describing a denial of the request to perform the capture function of the user device. 26. The apparatus of claim 25, wherein the apparatus is further directed to at least: cause the at least one event log to be transmitted to at least one management service communicatively coupled to the user device. 27. A computer program product comprising a non-transitory computer-readable storage medium having program code portions embodied therein, the program code portions being configured to, upon execution, direct an apparatus to at least: identify a request to perform a capture function of a user device;determine, based at least in part on at least one compliance rule associated with the capture function of the user device, whether the user device is only authorized to perform the capture function in an instance in which at least one particular watermark template of a plurality of watermark templates is populated and applied to the capture function of the user device and to at least one resource captured via the capture function of the user device;in an instance in which it is determined that the user device is only authorized to perform the capture function of the user device in an instance in which the at least one particular watermark template of the plurality of watermark templates is populated and applied to the capture function of the user device and to the at least one resource captured via the at least one capture function of the user device: identify, based at least in part on the at least one compliance rule associated with the capture function of the user device, the at least one particular watermark template from the plurality of watermark templates, the at least one particular watermark template comprising configuration data, the configuration data comprising at least a naming convention;populate, based at least one in part on at least one properly associated with the capture function of the user device, the at least one particular watermark template by causing descriptive data to be added to the at least one particular watermark template;apply the at least one particular watermark template to the capture function of the user device by causing at least a portion of the at least one particular watermark template to be overlaid onto at least one graphical interface associated with the capture function of the user device; and,apply the at least one particular watermark template to at least one resource captured by the capture function of the user device by at least: causing at least a portion of the particular watermark template to be added to the at least one resource captured by the capture function of the user device, andcausing the at least one resource captured by the capture function of the user device to be configured in accordance with the configuration data by at least causing the at least one resource captured by the capture function of the user device to be named in accordance with the naming convention. 28. The computer program product of claim 27, wherein the capture function of the user device comprises a function of the user device configured to capture at least one of the following: a photo resource, a video resource, or an audio recording resource. 29. The computer program product of claim 27, wherein directing the apparatus to at least populate, based at least in part on at least property associated with the capture function, the at least one particular watermark template by causing descriptive data to be added to the at least one particular watermark template further comprises: directing the apparatus to at least populate, based at least in part on at least one property associated with the user device, the at least one particular watermark template by causing descriptive data to be added to the at least one particular watermark template. 30. The computer program product of claim 27, wherein directing the apparatus to at least populate, based at least in part on at least property associated with the capture function, the at least one particular watermark template by causing descriptive data to be added to the at least one particular watermark template further comprises: directing the apparatus to at least populate, based at least in part on at least one property associated with a user of the user device, the at least one particular watermark template by causing descriptive data to be added to the at least one particular watermark template. 31. The computer program product of claim 27, wherein the configuration data further comprises a storage structure convention, and wherein causing the at least one resource captured by the capture function of the user device to be configured in accordance with the configuration data comprises causing the at least one resource captured by the capture function of the user device to be stored in accordance with the storage structure convention. 32. The computer program product of claim 27, wherein the apparatus is further directed to at least: cause at least one event log to be created, the at least one even log describing an application of the at least one particular watermark template. 33. The computer program product of claim 32, wherein the apparatus is further directed to at least: cause the at least one event log to be transmitted to at least one management service communicatively coupled to the user device. 34. The computer program product of claim 27, wherein the apparatus is further directed to at least: cause the request to perform the capture function of the user device to be authorized in an instance in which the user device complies with the at least one compliance rule associated with the capture function of the user device. 35. The computer program product of claim 34, wherein the apparatus is further directed to at least: cause at least one event log to be created, the at least one event log describing an authorization of the request to perform the capture function of the user device. 36. The computer program product of claim 35, wherein the apparatus is further directed to at least: cause the at least one event log to be transmitted to at least one management service communicatively coupled to the user device. 37. The computer program product of claim 27, wherein the apparatus is further directed to at least: cause the request to perform the capture function of the user device to be denied in an instance in which the user device does not comply with the at least one compliance rule associated with the capture function of the user device. 38. The computer program product of claim 37, wherein the apparatus is further directed to at least: cause at least one event log to be created, the at least one event log describing a denial of the request to perform the capture function of the user device. 39. The computer program product of claim 38, wherein the apparatus is further directed to at least: cause the at least one event log to be transmitted to at least one management service communicatively coupled to the user device.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (115)
Wood, David L.; Norton, Derk, Access management system and method employing secure credentials.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
Bhaskaran,Harikrishnan, Communication system and method for compressing information sent by a communication device to a target portable communication device.
Johnson, David Nephi; Nielson, Dustin Lance; Griffis, Jr., Jerry E.; Beus, David Kent; Jensen, Nathan Blaine; Street, William; Sherman, Paul Erik; Cook, Michael William; Carter, Stephen R, Credential mapping.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
Shai Mohaban ; Itzhak Parnafes ; Yoram Ramberg IL; Yoram Snir IL; John Strassner, Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Maurya, Sanjiv; Tse, Benson Wei-Ming; VanZile, Frank; Bonham, Larry Dean; Peterson, Phil; Friend, John, Method and system for distributing and updating software in wireless devices.
Bruton, III, David Aro; Overby, Jr., Linwood H.; Rodriguez, Adolfo Francisco, Methods, systems and computer program products for selectively allowing users of a multi-user system access to network resources.
Farris Robert D. ; Flaherty Stephen J. ; Goodman William D., Mobile data/message/electronic mail download system utilizing network-centric protocol such as Java.
Marolia,Sunil; Chia,Teck; Dinh,John D. V.; Soberano,Vincent P.; Hamasaki, Jr.,Glenn; Gustafson,James P.; Pakarinen,Toni; Jacobi,Sidney A., Mobile services network for update of firmware/software in mobile handsets.
Wittstein Alan D. (Westport CT) Ciocca Giacomo A. (Thomaston CT), Mobile telephone device for storing a plurality of changable charge rates and time limit data.
Laird,David; Jones,Martin Kelly, Notification systems and methods enabling user entry of notification trigger information based upon monitored mobile vehicle location.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Protection of data accessible by a mobile device.
Phillips John C. ; Hayes ; Jr. John J., Recyclable cellular telephone and method and apparatus for supporting the use of a recyclable cellular telephone within.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
Mann, Dwayne R.; Heard, Robert W.; Burchett, Christopher D.; Gordon, Ian R., Server, computer memory, and method to support security policy maintenance and distribution.
Wolovitz, Lionel; Collins, Tim, Service management system and associated methodology of providing service related message prioritization in a mobile client.
Ng, Mason; Mendez, Daniel J.; Quinlan, Sean Michael, System and method for automatically forwarding email and email events via a computer network to a server computer.
Heard, Robert W.; Mann, Dwayne R.; Burchett, Christopher D.; Gordon, Ian R., System and method for distribution of security policies for mobile devices.
Riggins Mark D. ; Bailes R. Stanley ; Bui Hong O. ; Cowan David I. ; Mendez Daniel I. ; Ng Mason ; Quinlan Sean Michael ; Wagle Prasad ; Ying Christine C. ; Zuleeg Christopher R. ; Aptekar-Strober Jo, System and method for globally accessing computer services.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R., System and method for globally and securely accessing unified information in a computer network.
Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for securely synchronizing multiple copies of a workspace element in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for synchronizing electronic mail between a client site and a central site.
Ng Mason ; Quinlan Sean Michael ; Ruan Tom ; Mendez Daniel J. ; Zhu Jing ; Cheng ; Jr. Martin ; Williams Matt ; Riggins Mark D., System and method for updating a remote database in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for using a global translator to synchronize workspace elements across a network.
Piccionelli, Greg A.; Rittmaster, Ted R., System and process for limiting distribution of information on a communication network based on geographic location.
Clark Ted H. ; Malisewski Steven C. ; Cooper Patrick R. ; Crosswy William Caldwell ; Crochet Larry J., System for automatic synchronization of common file between portable computer and host computer via communication channe.
Nagamatsu Jun (Kawasaki JPX) Terashima Masaki (Yokohama JPX) Yamada Jun (Yokohama JPX), System for preventing unauthorized use of a micro cellular system operating in coexistence with a cellular system.
Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
Kim, Jin Pil; Thomas, C. Gomer, Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.