On-demand activation of a security policy may be provided. Upon receiving a selection of a link, a profile identified by a security policy associated with the link may be activated and the link may be opened according to the security policy. In some embodiments, opening the link according to the sec
On-demand activation of a security policy may be provided. Upon receiving a selection of a link, a profile identified by a security policy associated with the link may be activated and the link may be opened according to the security policy. In some embodiments, opening the link according to the security policy may comprise redirecting the opening of the link from a first application to a second application.
대표청구항▼
1. A method comprising: receiving, using a first application at a mobile computing device, a user selection of a resource locator, wherein the resource locator comprises a reference to a resource;determining, using the mobile computing device, whether the selected resource locator is associated with
1. A method comprising: receiving, using a first application at a mobile computing device, a user selection of a resource locator, wherein the resource locator comprises a reference to a resource;determining, using the mobile computing device, whether the selected resource locator is associated with a security policy; andin response to determining that the resource locator is associated with the security policy: activating, in the mobile computing device, a profile identified by the security policy, wherein the profile allows access to the resource, referred to by the resource locator and selected using the first application, if the mobile computing device is connected to a Virtual Private Network (VPN) connection;launching, at the mobile computing device, the VPN connection; andaccessing the resource referred to by the resource locator using the VPN connection. 2. The method of claim 1, wherein the profile comprises a VPN policy. 3. The method of claim 1, wherein determining whether the resource locator is associated with the security policy comprises determining whether an address for the resource locator is associated with an intranet. 4. The method of claim 1, wherein determining whether the resource locator is associated with the security policy comprises determining whether the resource locator is associated with at least one secure source site. 5. The method of claim 1, further comprising determining that the mobile computing device is not in communication with the VPN before launching the VPN connection. 6. The method of claim 1, wherein accessing the resource comprises using one of a plurality of secure applications, installed on the mobile computing device, to access the resource referred to by the resource locator. 7. The method of claim 6, wherein the security policy identifies the plurality of secure application with which the mobile computing device can access the resource referred to by the resource locator. 8. A non-transitory, computer-readable medium comprising instructions that, when executed by a processor of a mobile computing device, performs a method comprising: receiving, at a first application of a mobile computing device, a user selection of a resource locator, wherein the resource locator comprises a reference to a resource;determining, using the mobile computing device, whether the selected resource locator is associated with a security policy; andin response to determining that the resource locator is associated with the security policy: activating, in the mobile computing device, a profile identified by the security policy, wherein the profile allows access to the resource, referred to by the resource locator and selected using the first application, if the mobile computing device is connected to a Virtual Private Network (VPN) connection;launching, at the mobile computing device, the VPN connection; andaccessing the resource referred to by the resource locator using the VPN connection. 9. The non-transitory, computer-readable medium of claim 8, wherein the profile comprises a VPN policy. 10. The non-transitory, computer-readable medium of claim 8, wherein determining whether the resource locator is associated with the security policy comprises determining whether an address for the resource locator is associated with an intranet. 11. The non-transitory, computer-readable medium of claim 8, wherein determining whether the resource locator is associated with the security policy comprises determining whether the resource locator is associated with at least one secure source site. 12. The non-transitory, computer-readable medium of claim 8, further comprising determining that the mobile computing device is not in communication with the VPN before launching the VPN connection. 13. The non-transitory, computer-readable medium of claim 8, wherein accessing the resource comprises using one of a plurality of secure applications, installed on the mobile computing device, to access the resource referred to by the resource locator. 14. The non-transitory, computer-readable medium of claim 13, wherein the security policy identifies the plurality of secure application with which the mobile computing device can access the resource referred to by the resource locator. 15. A system comprising: a memory storage storing program code; anda processor coupled to the memory storage, wherein, upon execution, the program code causes the processor to perform stages including: rendering a resource locator for display in a user interface of a mobile computing device;receiving a user selection of the resource locator, wherein the resource locator comprises a reference to a resource;determining whether the selected resource locator is associated with a security policy; andin response to determining that the resource locator is associated with the security policy: activating a profile identified by the security policy, wherein the profile allows access to the resource, referred to by the resource locator and selected by a user, if the mobile computing device is connected to a Virtual Private Network (VPN) connection;launching the VPN connection; andaccessing the resource referred to by the resource locator using the VPN connection. 16. The system of claim 15, wherein the profile comprises a VPN policy. 17. The system of claim 15, wherein determining whether the resource locator is associated with the security policy comprises determining whether an address for the resource locator is associated with an intranet. 18. The system of claim 15, wherein determining whether the resource locator is associated with the security policy comprises determining whether the resource locator is associated with at least one secure source site. 19. The system of claim 15, wherein the stages further comprise determining that the mobile computing device is not in communication with the VPN before launching the VPN connection. 20. The system of claim 15, wherein accessing the resource comprises using one of a plurality of secure applications, installed on the mobile computing device, to access the resource referred to by the resource locator.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (120)
Wood, David L.; Norton, Derk, Access management system and method employing secure credentials.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
Bhaskaran,Harikrishnan, Communication system and method for compressing information sent by a communication device to a target portable communication device.
Johnson, David Nephi; Nielson, Dustin Lance; Griffis, Jr., Jerry E.; Beus, David Kent; Jensen, Nathan Blaine; Street, William; Sherman, Paul Erik; Cook, Michael William; Carter, Stephen R, Credential mapping.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
Shai Mohaban ; Itzhak Parnafes ; Yoram Ramberg IL; Yoram Snir IL; John Strassner, Method and apparatus of storing policies for policy-based management of quality of service treatments of network data traffic flows.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Maurya, Sanjiv; Tse, Benson Wei-Ming; VanZile, Frank; Bonham, Larry Dean; Peterson, Phil; Friend, John, Method and system for distributing and updating software in wireless devices.
Bruton, III, David Aro; Overby, Jr., Linwood H.; Rodriguez, Adolfo Francisco, Methods, systems and computer program products for selectively allowing users of a multi-user system access to network resources.
Farris Robert D. ; Flaherty Stephen J. ; Goodman William D., Mobile data/message/electronic mail download system utilizing network-centric protocol such as Java.
Marolia,Sunil; Chia,Teck; Dinh,John D. V.; Soberano,Vincent P.; Hamasaki, Jr.,Glenn; Gustafson,James P.; Pakarinen,Toni; Jacobi,Sidney A., Mobile services network for update of firmware/software in mobile handsets.
Wittstein Alan D. (Westport CT) Ciocca Giacomo A. (Thomaston CT), Mobile telephone device for storing a plurality of changable charge rates and time limit data.
Laird,David; Jones,Martin Kelly, Notification systems and methods enabling user entry of notification trigger information based upon monitored mobile vehicle location.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Protection of data accessible by a mobile device.
Phillips John C. ; Hayes ; Jr. John J., Recyclable cellular telephone and method and apparatus for supporting the use of a recyclable cellular telephone within.
Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
Mann, Dwayne R.; Heard, Robert W.; Burchett, Christopher D.; Gordon, Ian R., Server, computer memory, and method to support security policy maintenance and distribution.
Wolovitz, Lionel; Collins, Tim, Service management system and associated methodology of providing service related message prioritization in a mobile client.
Ng, Mason; Mendez, Daniel J.; Quinlan, Sean Michael, System and method for automatically forwarding email and email events via a computer network to a server computer.
Heard, Robert W.; Mann, Dwayne R.; Burchett, Christopher D.; Gordon, Ian R., System and method for distribution of security policies for mobile devices.
Riggins Mark D. ; Bailes R. Stanley ; Bui Hong O. ; Cowan David I. ; Mendez Daniel I. ; Ng Mason ; Quinlan Sean Michael ; Wagle Prasad ; Ying Christine C. ; Zuleeg Christopher R. ; Aptekar-Strober Jo, System and method for globally accessing computer services.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R., System and method for globally and securely accessing unified information in a computer network.
Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for securely synchronizing multiple copies of a workspace element in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for synchronizing electronic mail between a client site and a central site.
Ng Mason ; Quinlan Sean Michael ; Ruan Tom ; Mendez Daniel J. ; Zhu Jing ; Cheng ; Jr. Martin ; Williams Matt ; Riggins Mark D., System and method for updating a remote database in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for using a global translator to synchronize workspace elements across a network.
Piccionelli, Greg A.; Rittmaster, Ted R., System and process for limiting distribution of information on a communication network based on geographic location.
Nagamatsu Jun (Kawasaki JPX) Terashima Masaki (Yokohama JPX) Yamada Jun (Yokohama JPX), System for preventing unauthorized use of a micro cellular system operating in coexistence with a cellular system.
Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
Kim, Jin Pil; Thomas, C. Gomer, Virtual channel table for a broadcast protocol and method of broadcasting and receiving broadcast signals using the same.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.