Enterprise-specific functionality watermarking and management
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-029/06
G06F-021/62
G06F-021/16
출원번호
US-0945601
(2015-11-19)
등록번호
US-9699193
(2017-07-04)
발명자
/ 주소
Marshall, John
출원인 / 주소
AirWatch, LLC
대리인 / 주소
Thomas | Horstemeyer, LLP
인용정보
피인용 횟수 :
0인용 특허 :
120
초록▼
Embodiments for enterprise-specific functionality watermarking and management are provided. A request, originated in response to an attempt to perform an enterprise function on a client device, can be received by at least one computing device over a network, where the enterprise function is associat
Embodiments for enterprise-specific functionality watermarking and management are provided. A request, originated in response to an attempt to perform an enterprise function on a client device, can be received by at least one computing device over a network, where the enterprise function is associated with a remotely-stored compliance rule. At least one watermark template can be identified from a plurality of available watermark templates based at least in part on the enterprise function, and a communication can be generated that, when received by the client device, authorizes the client device to: perform the enterprise function where at least one resource is generated or modified, and apply the at least one watermark template to the at least one resource such that performing the enterprise function complies with the compliance rule.
대표청구항▼
1. A non-transitory computer-readable medium embodying program code executable in the at least one computing device that, when executed by the at least one computing device, causes the at least one computing device to: receive a request from a client device originated in response to an attempt to pe
1. A non-transitory computer-readable medium embodying program code executable in the at least one computing device that, when executed by the at least one computing device, causes the at least one computing device to: receive a request from a client device originated in response to an attempt to perform an enterprise function on the client device, the request being received from the client device over a network, the enterprise function being associated with a compliance rule stored remotely from the client device;identify at least one watermark template from a plurality of available watermark templates based at least in part on the enterprise function; andgenerate a communication that, when received by the client device, causes the client device to: configure the client device such that, when the enterprise function is performed, the at least one watermark template is added to the at least one resource generated or modified as a result of the enterprise function being performed;in response to the enterprise function being performed, identify that a wrapper is acting as a security layer encapsulating the at least one resource, the wrapper protecting the at least one resource from certain actions being taken on the at least one resource; andapply the at least one watermark template to the wrapper encapsulating the at least one resource such that performing the enterprise function complies with the compliance rule. 2. The non-transitory computer-readable medium of claim 1, wherein the at least one computing device comprises at least one of: a resource server, a watermark template server, or a compliance server. 3. The non-transitory computer-readable medium of claim 1, wherein the enterprise function of the client device further comprises a function of the client device that configures the client device for an enterprise use, accesses enterprise data, or executes an enterprise application. 4. The non-transitory computer-readable medium of claim 1, wherein applying the at least one watermark template to the at least one resource such that the performance of the enterprise function complies with the compliance rule further comprises adding descriptive data to the at least one watermark template applied to the wrapper encapsulating the at least one resource, the descriptive data being descriptive of the enterprise function of the client device requested to be performed. 5. The non-transitory computer-readable medium of claim 1, further comprising program code that, when executed by the at least one computing device, causes the at least one computing device to apply the at least one watermark template to the at least one resource such that the performance of the enterprise function complies with the compliance rule by: graphically overlaying the at least one watermark template onto the at least one resource generated or modified by the enterprise function of the client device; oradding the at least one watermark template to the at least one resource associated with the enterprise function of the client device in a predefined position within the at least one resource. 6. The non-transitory computer-readable medium of claim 5, wherein the predefined position within the at least one resource is at least one of: a header of the at least one resource, a body of the at least one resource, a footer of the at least one resource, a structural metadata element of the at least one resource, and a descriptive metadata element of the at least one resource. 7. The non-transitory computer-readable medium of claim 1, further comprising program code that, when executed by the at least one computing device, causes the at least one computing device to communicate the at least one resource to a resource server over the network in response to the at least one resource being generated or modified by the enterprise function. 8. A system, comprising: at least one computing device in data communication with a client device over a network; andprogram instructions executable in the at least one device that, when executed by the at least one computing device, cause the at least one computing device to: receive a request from the client device originated in response to an attempt to perform an enterprise function on the client device, the request being received from the client device over the network, the enterprise function being associated with a compliance rule stored remotely from the client device;identify at least one watermark template from a plurality of available watermark templates based at least in part on the enterprise function; andgenerate a communication that, when received by the client device, causes the client device to: configure the client device such that, when the enterprise function is performed, the at least one watermark template is added to the at least one resource generated or modified as a result of the enterprise function being performed;in response to the enterprise function being performed, identify that a wrapper is acting as a security layer encapsulating the at least one resource, the wrapper protecting the at least one resource from certain actions being taken on the at least one resource; andapply the at least one watermark template to the wrapper encapsulating the at least one resource such that performing the enterprise function complies with the compliance rule. 9. The system of claim 8, wherein the at least one computing device comprises at least one of: a resource server, a watermark template server, and a compliance server. 10. The system of claim 8, wherein the enterprise function of the client device further comprises a function of the client device that configures the client device for an enterprise use, accesses enterprise data, or executes an enterprise application. 11. The system of claim 8, further comprising program instructions that, when executed by the at least one computing device, cause the at least one computing device to apply the at least one watermark template to the at least one resource such that the performance of the enterprise function complies with the compliance rule by adding descriptive data to the at least one watermark template applied to the at least one resource, the descriptive data being descriptive of the enterprise function of the client device requested to be performed. 12. The system of claim 8, further comprising program instructions that, when executed by the at least one computing device, cause the at least one computing device to apply the at least one watermark template to the at least one resource such that the performance of the enterprise function complies with the compliance rule by: graphically overlaying the at least one watermark template onto the at least one resource generated or modified by the enterprise function of the client device; oradding the at least one watermark template to the at least one resource associated with the enterprise function of the client device in a predefined position within the at least one resource. 13. The system of claim 12, wherein the predefined position within the at least one resource is at least one of: a header of the at least one resource, a body of the at least one resource, a footer of the at least one resource, a structural metadata element of the at least one resource, and a descriptive metadata element of the at least one resource. 14. The system of claim 12, further comprising program instructions that, when executed by the at least one computing device, cause the at least one computing device to communicate the at least one resource to a resource server over the network in response to the at least one resource being generated or modified by the enterprise function. 15. A computer-implemented method, comprising: receiving, by at least one computing device comprising at least one hardware processor, a request from a client device originated in response to an attempt to perform an enterprise function on the client device, the request being received from the client device over a network, the enterprise function being associated with a compliance rule stored remotely from the client device;identifying, by the at least one computing device, at least one watermark template from a plurality of available watermark templates based at least in part on the enterprise function; andgenerating, by the at least one computing device, a communication that, when received by the client device, authorizes the client device to: configure the client device such that, when the enterprise function is performed, the at least one watermark template is added to the at least one resource generated or modified as a result of the enterprise function being performed;in response to the enterprise function being performed, identify that a wrapper is acting as a security layer encapsulating the at least one resource, the wrapper protecting the at least one resource from certain actions being taken on the at least one resource; andapply the at least one watermark template to the wrapper encapsulating the at least one resource such that performing the enterprise function complies with the compliance rule. 16. The computer-implemented method of claim 15, wherein the at least one computing device comprises at least one of: a resource server, a watermark template server, and a compliance server. 17. The computer-implemented method of claim 15, wherein the enterprise function of the client device further comprises a function of the client device that configures the client device for an enterprise use, accesses enterprise data, or executes an enterprise application. 18. The computer-implemented method of claim 15, further comprising applying, by the at least one computing device, the at least one watermark template to the at least one resource such that the performance of the enterprise function complies with the compliance rule by adding descriptive data to the at least one watermark template applied to the at least one resource, the descriptive data being descriptive of the enterprise function of the client device requested to be performed. 19. The computer-implemented method of claim 15, further comprising applying, by the at least one computing device, the at least one watermark template to the at least one resource such that the performance of the enterprise function complies with the compliance rule further comprises: graphically overlaying the at least one watermark template onto the at least one resource generated or modified by the enterprise function of the client device; oradding the at least one watermark template to the at least one resource associated with the enterprise function of the client device in a predefined position within the at least one resource. 20. The computer-implemented method of claim 15, further comprising communicating, by the at least one computing device, the at least one resource to a resource server over the network in response to the at least one resource being generated or modified by the enterprise function.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (120)
Wood, David L.; Norton, Derk, Access management system and method employing secure credentials.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
Bhaskaran,Harikrishnan, Communication system and method for compressing information sent by a communication device to a target portable communication device.
Johnson, David Nephi; Nielson, Dustin Lance; Griffis, Jr., Jerry E.; Beus, David Kent; Jensen, Nathan Blaine; Street, William; Sherman, Paul Erik; Cook, Michael William; Carter, Stephen R, Credential mapping.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Maurya, Sanjiv; Tse, Benson Wei-Ming; VanZile, Frank; Bonham, Larry Dean; Peterson, Phil; Friend, John, Method and system for distributing and updating software in wireless devices.
Fields, Duane Kimbell; Gregg, Thomas Preston; Hassinger, Sebastian Daniel; Hurley, II, William Walter; Kolb, Mark Andrew; Vu, Stacy Braden, Method and system for distributing image-based content on the internet.
Bruton, III, David Aro; Overby, Jr., Linwood H.; Rodriguez, Adolfo Francisco, Methods, systems and computer program products for selectively allowing users of a multi-user system access to network resources.
Farris Robert D. ; Flaherty Stephen J. ; Goodman William D., Mobile data/message/electronic mail download system utilizing network-centric protocol such as Java.
Marolia,Sunil; Chia,Teck; Dinh,John D. V.; Soberano,Vincent P.; Hamasaki, Jr.,Glenn; Gustafson,James P.; Pakarinen,Toni; Jacobi,Sidney A., Mobile services network for update of firmware/software in mobile handsets.
Wittstein Alan D. (Westport CT) Ciocca Giacomo A. (Thomaston CT), Mobile telephone device for storing a plurality of changable charge rates and time limit data.
Laird,David; Jones,Martin Kelly, Notification systems and methods enabling user entry of notification trigger information based upon monitored mobile vehicle location.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Protection of data accessible by a mobile device.
Phillips John C. ; Hayes ; Jr. John J., Recyclable cellular telephone and method and apparatus for supporting the use of a recyclable cellular telephone within.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
Mann, Dwayne R.; Heard, Robert W.; Burchett, Christopher D.; Gordon, Ian R., Server, computer memory, and method to support security policy maintenance and distribution.
Wolovitz, Lionel; Collins, Tim, Service management system and associated methodology of providing service related message prioritization in a mobile client.
Ng, Mason; Mendez, Daniel J.; Quinlan, Sean Michael, System and method for automatically forwarding email and email events via a computer network to a server computer.
Heard, Robert W.; Mann, Dwayne R.; Burchett, Christopher D.; Gordon, Ian R., System and method for distribution of security policies for mobile devices.
Riggins Mark D. ; Bailes R. Stanley ; Bui Hong O. ; Cowan David I. ; Mendez Daniel I. ; Ng Mason ; Quinlan Sean Michael ; Wagle Prasad ; Ying Christine C. ; Zuleeg Christopher R. ; Aptekar-Strober Jo, System and method for globally accessing computer services.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R., System and method for globally and securely accessing unified information in a computer network.
Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for securely synchronizing multiple copies of a workspace element in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for synchronizing electronic mail between a client site and a central site.
Ng Mason ; Quinlan Sean Michael ; Ruan Tom ; Mendez Daniel J. ; Zhu Jing ; Cheng ; Jr. Martin ; Williams Matt ; Riggins Mark D., System and method for updating a remote database in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for using a global translator to synchronize workspace elements across a network.
Piccionelli, Greg A.; Rittmaster, Ted R., System and process for limiting distribution of information on a communication network based on geographic location.
Clark Ted H. ; Malisewski Steven C. ; Cooper Patrick R. ; Crosswy William Caldwell ; Crochet Larry J., System for automatic synchronization of common file between portable computer and host computer via communication channe.
Nagamatsu Jun (Kawasaki JPX) Terashima Masaki (Yokohama JPX) Yamada Jun (Yokohama JPX), System for preventing unauthorized use of a micro cellular system operating in coexistence with a cellular system.
Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
Kim, Jin Pil; Thomas, C. Gomer, Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.