Rights management services integration with mobile device management
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04K-001/00
G06F-021/60
G06F-021/10
출원번호
US-0895739
(2013-05-16)
등록번호
US-9058495
(2015-06-16)
발명자
/ 주소
Brannon, Jonathan Blake
Sorensen, Christian Blake
출원인 / 주소
AirWatch LLC
대리인 / 주소
Thomas | Horstemeyer, LLP
인용정보
피인용 횟수 :
12인용 특허 :
89
초록▼
Rights management services (RMS) integration with mobile device management (MDM) may be provided. A functionality associated with a document may be restricted according to a document management policy. After the document has been transmitted to a receiving device, a request to un-restrict the at lea
Rights management services (RMS) integration with mobile device management (MDM) may be provided. A functionality associated with a document may be restricted according to a document management policy. After the document has been transmitted to a receiving device, a request to un-restrict the at least one functionality associated with the document may be received. If it is determined that the receiving device complies with the document management policy, the functionality associated with the document may be un-restricted.
대표청구항▼
1. A method comprising: restricting at least one functionality associated with a document according to a compliance policy, the document being associated with a sender device;transmitting the document to at least one recipient device;receiving, in a rights management server associated with the sende
1. A method comprising: restricting at least one functionality associated with a document according to a compliance policy, the document being associated with a sender device;transmitting the document to at least one recipient device;receiving, in a rights management server associated with the sender device, a request to un-restrict the at least one functionality associated with the document, the request being associated with an application associated with viewing of the document on the at least one recipient device;receiving, in the rights management server, an indication from a compliance server associated with the at least one recipient device, wherein the rights management server is associated with the sender device and the compliance server is associated with the at least one recipient device, the indication being associated with whether the at least one recipient device complies with the compliance policy;determining, in the rights management server, whether the at least one recipient device complies with the compliance policy based at least in part upon the indication received from the compliance server;transmitting, from the rights management server to the compliance server, an authorization to un-restrict the at least one functionality associated with the document; andin response to determining that the at least one recipient device complies with the compliance policy, initiating un-restricting the at least one functionality associated with the document by the application associated with viewing of the document by the at least one recipient device. 2. The method of claim 1, wherein the document comprises at least one of the following: an e-mail message, a text message, a word processing document, a spreadsheet, a presentation, an instant message, a binary file, an audio file, a video file, a voicemail, and a contact information document. 3. The method of claim 1, wherein the compliance policy is associated with a first organization. 4. The method of claim 3, wherein the sender device of the document is associated with the first organization. 5. The method of claim 4, wherein the at least one recipient device is associated with a second organization. 6. The method of claim 1, wherein the at least one functionality comprises at least one of the following: opening the document, forwarding the document, modifying the document, saving the document, deleting the document, opening the document, and sharing the document. 7. The method of claim 1, wherein restricting the at least one functionality comprises encrypting the document. 8. The method of claim 1, wherein restricting the at least one functionality comprises requiring at least one compliance policy be in effect before the at least one functionality is un-restricted. 9. The method of claim 8, wherein the at least one compliance policy comprises at least one of the following: a device restriction, a device requirement, a user restriction, a time restriction, and a location restriction. 10. The method of claim 1, further comprising: logging the request to un-restrict the at least one functionality associated with the document. 11. A system comprising: a memory storage; anda processor coupled to the memory storage, wherein the processor is configured to: receive a document comprising at least one restricted functionality,identify a requirement for un-restricting the at least one restricted functionality by receiving a compliance policy from a compliance server, wherein the system is associated with a first user and the compliance server is associated with a second user,satisfy the requirement for un-restricting the at least one restricted functionality by facilitating a communication between a second compliance server associated with the first user to the compliance server associated with the second user, andperform the un-restricted at least one functionality. 12. The system of claim 11, wherein the second user comprises a sender of the document. 13. The system of claim 11, wherein being operative to satisfy the requirement for un-restricting the at least one restricted functionality comprises the processor being further operative to instruct the second compliance server to provide at least one compliance policy associated with the system to the compliance server associated with the second user. 14. A non-transitory computer-readable medium which stores a set of instructions that when executed performs a method executed by the set of instructions comprising: receiving an encrypted document from a sender;identifying a first compliance server associated with the sender;facilitating an exchange of a plurality of data between the first compliance server and a second compliance server associated with a recipient of the encrypted document, the exchanged plurality of data comprises at least one device compliance rule;determining whether the first compliance server is satisfied with the exchanged plurality of data; andin response to determining that the first compliance server is satisfied with the exchanged plurality of data: receiving a decryption key associated with the document,decrypting the document, anddisplaying the document;in response to determining that the first compliance server is not satisfied with the exchanged plurality of data: modifying a configuration setting associated with the at least one device compliance rule, andfacilitating a second exchange of a second plurality of data between the first compliance server and the second compliance server. 15. The non-transitory computer-readable medium of claim 14, further comprising: determining whether the first compliance server is satisfied with the second exchanged plurality of data; andin response to determining that the first compliance server is not satisfied with the exchanged plurality of data, deleting the document.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (89)
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
Bhaskaran,Harikrishnan, Communication system and method for compressing information sent by a communication device to a target portable communication device.
Johnson, David Nephi; Nielson, Dustin Lance; Griffis, Jr., Jerry E.; Beus, David Kent; Jensen, Nathan Blaine; Street, William; Sherman, Paul Erik; Cook, Michael William; Carter, Stephen R, Credential mapping.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Maurya, Sanjiv; Tse, Benson Wei-Ming; VanZile, Frank; Bonham, Larry Dean; Peterson, Phil; Friend, John, Method and system for distributing and updating software in wireless devices.
Bruton, III, David Aro; Overby, Jr., Linwood H.; Rodriguez, Adolfo Francisco, Methods, systems and computer program products for selectively allowing users of a multi-user system access to network resources.
Laird,David; Jones,Martin Kelly, Notification systems and methods enabling user entry of notification trigger information based upon monitored mobile vehicle location.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Protection of data accessible by a mobile device.
Mann, Dwayne R.; Heard, Robert W.; Burchett, Christopher D.; Gordon, Ian R., Server, computer memory, and method to support security policy maintenance and distribution.
Wolovitz, Lionel; Collins, Tim, Service management system and associated methodology of providing service related message prioritization in a mobile client.
Ng, Mason; Mendez, Daniel J.; Quinlan, Sean Michael, System and method for automatically forwarding email and email events via a computer network to a server computer.
Heard, Robert W.; Mann, Dwayne R.; Burchett, Christopher D.; Gordon, Ian R., System and method for distribution of security policies for mobile devices.
Riggins Mark D. ; Bailes R. Stanley ; Bui Hong O. ; Cowan David I. ; Mendez Daniel I. ; Ng Mason ; Quinlan Sean Michael ; Wagle Prasad ; Ying Christine C. ; Zuleeg Christopher R. ; Aptekar-Strober Jo, System and method for globally accessing computer services.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R., System and method for globally and securely accessing unified information in a computer network.
Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for securely synchronizing multiple copies of a workspace element in a network.
Ng Mason ; Quinlan Sean Michael ; Ruan Tom ; Mendez Daniel J. ; Zhu Jing ; Cheng ; Jr. Martin ; Williams Matt ; Riggins Mark D., System and method for updating a remote database in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for using a global translator to synchronize workspace elements across a network.
Piccionelli, Greg A.; Rittmaster, Ted R., System and process for limiting distribution of information on a communication network based on geographic location.
Maher,David P.; Rudd,James M.; Swenson,Eric J.; Landsman,Richard A., Systems and methods for managing and protecting electronic content and applications.
Kim, Jin Pil; Thomas, C. Gomer, Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same.
Ghetti, Adam; Green, Ken; Silva, Kenneth; Rollins, Michael; Tinkler, Nathaniel; Eckman, Jeremy; Speers, Ryan, Systems and methods for encryption and provision of information security using platform services.
Ghetti, Adam; Howard, Jeffrey; Jordan, James; Smith, Nicholas; Eckman, Jeremy; Speers, Ryan; Bhatti, Sohaib, Systems and methods for encryption and provision of information security using platform services.
Ghetti, Adam; Howard, Jeffrey; Jordan, James; Smith, Nicholas; Eckman, Jeremy; Speers, Ryan; Bhatti, Sohaib, Systems and methods for encryption and provision of information security using platform services.
Ghetti, Adam; Jordan, James; Silva, Kenneth; Eckman, Jeremy; McColl, Robert; Speers, Ryan, Systems and methods for encryption and provision of information security using platform services.
Ghetti, Adam; Jordan, James; Silva, Kenneth; Eckman, Jeremy; McColl, Robert; Speers, Ryan, Systems and methods for encryption and provision of information security using platform services.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.