Enterprise-specific functionality watermarking and management
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/00
G06F-021/16
H04L-029/06
G06F-021/62
출원번호
US-0181993
(2014-02-17)
등록번호
US-9202025
(2015-12-01)
발명자
/ 주소
Marshall, John
출원인 / 주소
AirWatch LLC
대리인 / 주소
Thomas | Horstemeyer, LLP
인용정보
피인용 횟수 :
0인용 특허 :
121
초록▼
A method, system and non-transitory computer-readable medium product are provided for enterprise-specific functionality watermarking and management. In the context of a method, a method is provided that includes identifying a request to perform at least one function of a user device associated with
A method, system and non-transitory computer-readable medium product are provided for enterprise-specific functionality watermarking and management. In the context of a method, a method is provided that includes identifying a request to perform at least one function of a user device associated with an enterprise and identifying at least one watermark template associated with an enterprise. The method further includes applying the at least one watermark template associated with the enterprise to at least one function of the user device associated with the enterprise and authorizing the request to perform the at least one function of the user device associated with the enterprise.
대표청구항▼
1. A non-transitory computer-readable medium embodying a program executable in a client device, comprising code that: identifies a request to perform an enterprise function of the client device, the enterprise function being associated with a compliance rule;communicates the request to a compliance
1. A non-transitory computer-readable medium embodying a program executable in a client device, comprising code that: identifies a request to perform an enterprise function of the client device, the enterprise function being associated with a compliance rule;communicates the request to a compliance server over a network to identify at least one watermark template from a plurality of available watermark templates based at least in part on the enterprise function of the client device requested to be performed, the at least one watermark template identified by querying a data store accessible by the compliance server;applies the at least one watermark template to the enterprise function of the client device such that a performance of the enterprise function complies with the compliance rule by: causing descriptive data to be added to the at least one watermark template, the descriptive data being descriptive of the enterprise function of the client device requested to be performed;overlaying the at least one watermark template onto a resource generated by the enterprise function of the client device; andstoring the resource in accordance with a storage structure convention defined by configuration data of the watermark template; andreceives an authorization from the compliance server that causes the client device to perform the enterprise function identified in the request, the authorization being determined using at least a property set forth in the at least one watermark template that indicates whether the client device complies with the compliance rule. 2. The non-transitory computer-readable medium of claim 1, wherein the code that applies the at least one watermark template to the enterprise function of the client device further comprises code that applies the at least one watermark template to a resource that is created, modified, stored, or transmitted by the enterprise function of the client device. 3. The non-transitory computer-readable medium of claim 1, wherein the enterprise function of the client device further comprises a function of the client device that configures the client device for an enterprise use, accesses enterprise data, or executes an enterprise application. 4. The non-transitory computer-readable medium of claim 1, wherein the code that applies the at least one watermark template to the enterprise function of the client device further comprises code that: overlays the at least one watermark template onto a graphical interface associated with the enterprise function of the client device; oradds the at least one watermark template to the graphical interface associated with the enterprise function of the client device in at least one position within the graphical interface. 5. The non-transitory computer-readable medium of claim 1, wherein the code that applies the at least one watermark template to the enterprise function of the client device further comprises code that: adds the at least one watermark template to the resource generated by the enterprise function of the client device in a position within the resource. 6. The non-transitory computer-readable medium of claim 5, wherein the position within the resource is selected from a group consisting of: a header of the resource, a body of the resource, a footer of the resource, a structural metadata element of the resource, a descriptive metadata element of the resource, and a wrapper encapsulating the resource. 7. The non-transitory computer-readable medium of claim 1, wherein the property set forth in the at least one watermark template that indicates whether the client device complies with the compliance rule further comprises a particular property associated with the enterprise function, the client device, a user of the client device, an enterprise, a source identifier, a timestamp, or a location. 8. A system, comprising: a user device comprising a local data store; andprogram code executed in the user device that causes the user device to at least: identify a request to perform an enterprise function of the user device, the enterprise function being associated with a compliance rule;communicates the request to a remote server over a network to identify at least one watermark template from a plurality of available watermark templates based at least in part on the enterprise function of the user device requested to be performed, the at least one watermark template identified by querying a data store accessible by the remote server;apply the at least one watermark template to the enterprise function of the user device such that a performance of the enterprise function complies with the compliance rule by: causing descriptive data to be added to the at least one particular watermark template, the descriptive data being descriptive of the enterprise function of the user device requested to be performed;overlaying the at least one watermark template onto a resource generated by the enterprise function of the client device; andstoring the resource in accordance with a storage structure convention defined by configuration data of the watermark template; andlocally authorize the user device to perform the enterprise function identified in the request using at least a property of the user device set forth in the watermark template, the property indicating whether the user device complies with the compliance rule. 9. The system of claim 8, wherein the program code that causes the user device to apply the at least one watermark template to the enterprise function of the user device further comprises program code that causes the user device to apply the at least one watermark template to the resource that is created, modified, stored, or transmitted by the enterprise function of the user device. 10. The system of claim 8, wherein the enterprise function of the user device further comprises a function of the user device that configures the user device for an enterprise use, accesses enterprise data, or executes an enterprise application. 11. The system of claim 8, wherein the program code that causes the user device to apply the at least one watermark template to the enterprise function of the user device further comprises program code that causes the user device to at least: overlay the at least one watermark template onto a graphical interface associated with the enterprise function of the user device; oradd the at least one watermark template to the graphical interface associated with the enterprise function of the user device in at least one position within the graphical interface. 12. The system of claim 8, wherein the program code that causes the user device to apply the at least one watermark template to the enterprise function of the user device further comprises program code that causes the user device to at least: add the at least one watermark template to the resource generated by the enterprise function of the user device in a position within the resource. 13. The system of claim 12, wherein the position within the resource is selected from a group consisting of: a header of the resource, a body of the resource, a footer of the resource, a structural metadata element of the resource, a descriptive metadata element of the resource, and a wrapper encapsulating the resource. 14. The system of claim 8, wherein the property set forth in the at least one watermark template that indicates whether the user device complies with the compliance rule further comprises a particular property associated with the enterprise function, the user device, a user of the user device, an enterprise, a source identifier, a timestamp, or a location. 15. A method, comprising: identifying, by a client device, a request to perform an enterprise function of the client device, the enterprise function being associated with a compliance rule, wherein the client device comprises processing circuitry;querying, by the client device, a local data store to identify at least one watermark template from a plurality of available watermark templates based at least in part on the enterprise function of the client device requested to be performed;applying, by the client device, the at least one watermark template to the enterprise function of the client device such that a performance of the enterprise function complies with the compliance rule by: causing descriptive data to be added to the at least one watermark template, the descriptive data being descriptive of the enterprise function of the client device requested to be performed; andoverlaying the at least one watermark template onto a resource generated by the enterprise function of the client device; andstoring the resource in accordance with a storage structure convention defined by configuration data of the watermark template; andauthorizing, by the client device, the performance of the enterprise function identified in the request using at least a property of the client device set forth in the watermark template, the property indicating whether the client device complies with the compliance rule. 16. The method of claim 15, wherein applying, by the client device, the at least one watermark template to the enterprise function of the client device further comprises applying, by the client device, the at least one watermark template to the resource that is created, modified, stored, or transmitted by the enterprise function of the client device. 17. The method of claim 15, wherein the enterprise function of the client device further comprises a function of the client device that configures the client device for an enterprise use, accesses enterprise data, or executes an enterprise application. 18. The method of claim 15, wherein applying, by the client device, the at least one watermark template to the enterprise function of the client device further comprises: overlaying, by the client device, the at least one watermark template onto a graphical interface associated with the enterprise function of the client device; oradding, by the client device, the at least one watermark template to the graphical interface associated with the enterprise function of the client device in at least one position within the graphical interface. 19. The method of claim 15, wherein applying, by the client device, the at least one watermark template to the enterprise function of the client device further comprises: adding, by the client device, the at least one watermark template to the resource generated by the enterprise function of the client device in a position within the resource. 20. The method of claim 15, wherein the property set forth in the at least one watermark template that indicates whether the client device complies with the compliance rule further comprises a particular property associated with the enterprise function, the client device, a user of the client device, an enterprise, a source identifier, a timestamp, or a location.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (121)
Wood, David L.; Norton, Derk, Access management system and method employing secure credentials.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
Bhaskaran,Harikrishnan, Communication system and method for compressing information sent by a communication device to a target portable communication device.
Johnson, David Nephi; Nielson, Dustin Lance; Griffis, Jr., Jerry E.; Beus, David Kent; Jensen, Nathan Blaine; Street, William; Sherman, Paul Erik; Cook, Michael William; Carter, Stephen R, Credential mapping.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
Shai Mohaban ; Itzhak Parnafes ; Yoram Ramberg IL; Yoram Snir IL; John Strassner, Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Maurya, Sanjiv; Tse, Benson Wei-Ming; VanZile, Frank; Bonham, Larry Dean; Peterson, Phil; Friend, John, Method and system for distributing and updating software in wireless devices.
Fields, Duane Kimbell; Gregg, Thomas Preston; Hassinger, Sebastian Daniel; Hurley, II, William Walter; Kolb, Mark Andrew; Vu, Stacy Braden, Method and system for distributing image-based content on the internet.
Bruton, III, David Aro; Overby, Jr., Linwood H.; Rodriguez, Adolfo Francisco, Methods, systems and computer program products for selectively allowing users of a multi-user system access to network resources.
Farris Robert D. ; Flaherty Stephen J. ; Goodman William D., Mobile data/message/electronic mail download system utilizing network-centric protocol such as Java.
Marolia,Sunil; Chia,Teck; Dinh,John D. V.; Soberano,Vincent P.; Hamasaki, Jr.,Glenn; Gustafson,James P.; Pakarinen,Toni; Jacobi,Sidney A., Mobile services network for update of firmware/software in mobile handsets.
Wittstein Alan D. (Westport CT) Ciocca Giacomo A. (Thomaston CT), Mobile telephone device for storing a plurality of changable charge rates and time limit data.
Laird,David; Jones,Martin Kelly, Notification systems and methods enabling user entry of notification trigger information based upon monitored mobile vehicle location.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Protection of data accessible by a mobile device.
Phillips John C. ; Hayes ; Jr. John J., Recyclable cellular telephone and method and apparatus for supporting the use of a recyclable cellular telephone within.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
Mann, Dwayne R.; Heard, Robert W.; Burchett, Christopher D.; Gordon, Ian R., Server, computer memory, and method to support security policy maintenance and distribution.
Wolovitz, Lionel; Collins, Tim, Service management system and associated methodology of providing service related message prioritization in a mobile client.
Ng, Mason; Mendez, Daniel J.; Quinlan, Sean Michael, System and method for automatically forwarding email and email events via a computer network to a server computer.
Heard, Robert W.; Mann, Dwayne R.; Burchett, Christopher D.; Gordon, Ian R., System and method for distribution of security policies for mobile devices.
Riggins Mark D. ; Bailes R. Stanley ; Bui Hong O. ; Cowan David I. ; Mendez Daniel I. ; Ng Mason ; Quinlan Sean Michael ; Wagle Prasad ; Ying Christine C. ; Zuleeg Christopher R. ; Aptekar-Strober Jo, System and method for globally accessing computer services.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R., System and method for globally and securely accessing unified information in a computer network.
Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for securely synchronizing multiple copies of a workspace element in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for synchronizing electronic mail between a client site and a central site.
Ng Mason ; Quinlan Sean Michael ; Ruan Tom ; Mendez Daniel J. ; Zhu Jing ; Cheng ; Jr. Martin ; Williams Matt ; Riggins Mark D., System and method for updating a remote database in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for using a global translator to synchronize workspace elements across a network.
Piccionelli, Greg A.; Rittmaster, Ted R., System and process for limiting distribution of information on a communication network based on geographic location.
Clark Ted H. ; Malisewski Steven C. ; Cooper Patrick R. ; Crosswy William Caldwell ; Crochet Larry J., System for automatic synchronization of common file between portable computer and host computer via communication channe.
Nagamatsu Jun (Kawasaki JPX) Terashima Masaki (Yokohama JPX) Yamada Jun (Yokohama JPX), System for preventing unauthorized use of a micro cellular system operating in coexistence with a cellular system.
Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
Kim, Jin Pil; Thomas, C. Gomer, Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.