Embodiments of the disclosure are related to enforcing a policy on a computing device, or a companion device, based upon its proximity to another computing device, or an anchor device. In one example, the anchor device and companion device can report their location with respect to one another to a p
Embodiments of the disclosure are related to enforcing a policy on a computing device, or a companion device, based upon its proximity to another computing device, or an anchor device. In one example, the anchor device and companion device can report their location with respect to one another to a policy server. The policy server can determine whether the anchor device and proximity device are in proximity to one another as well as determine whether a policy should be applied to the companion device based upon whether it is in proximity to the anchor device.
대표청구항▼
1. A non-transitory, computer-readable medium including instructions that, when executed by a processor of an anchor device, cause the processor to perform stages for providing a user with access to an anchor device using a companion device, the stages comprising: receiving a request from the compan
1. A non-transitory, computer-readable medium including instructions that, when executed by a processor of an anchor device, cause the processor to perform stages for providing a user with access to an anchor device using a companion device, the stages comprising: receiving a request from the companion device to an application installed on the anchor device;identifying a policy stored in a data store that associates the anchor device and the companion device, wherein the policy is configured at a user interface generated by a management console;determining, by the application of the anchor device, whether to grant access to the anchor device based at least in part upon the request from the companion device; andin response to a determination that the policy is not violated, issuing a command from the application, the command providing a user of the companion device with access to the anchor device. 2. The non-transitory, computer-readable medium of claim 1, wherein the policy specifies access to a capability with respect to launching a particular application on the anchor device by the companion device. 3. The non-transitory, computer-readable medium of claim 2, wherein the particular application comprises a browser application. 4. The non-transitory, computer-readable medium of claim 1, wherein the request from the companion device comprises a first location indication. 5. The non-transitory, computer-readable medium of claim 4, wherein the determination that the policy is not violated is based on a difference between the first location indication and a location of the anchor device. 6. The non-transitory, computer-readable medium of claim 4, wherein the first location indication comprises at least one of a geographic location and a network location. 7. The non-transitory, computer-readable medium of claim 4, wherein the first location indication is communicated by at least one of a Bluetooth interface, a near-field communication (NFC) interface, and a radio-frequency identification (RFID) interface. 8. The non-transitory, computer-readable medium of claim 1, wherein the policy further specifies access to content stored on the anchor device. 9. A method for providing a user with access to an anchor device using a companion device, comprising: receiving a request from the companion device to an application installed on an anchor device;identifying a policy stored in a data store that associates the anchor device and the companion device, wherein the policy is configured at a user interface generated by a management console;determining, by the application of the anchor device, whether to grant access to the anchor device based at least in part upon the request from the companion device; andin response to a determination that the policy is not violated, issuing a command from the application, the command providing a user of the companion device with access to the anchor device. 10. The method of claim 9, wherein the policy specifies access to a capability with respect to launching a particular application on the anchor device by the companion device. 11. The method of claim 10, wherein the particular application comprises a browser application. 12. The method of claim 9, wherein the request from the companion device comprises a first location indication. 13. The method of claim 12, wherein the determination that the policy is not violated is based on a difference between the first location indication and a location of the anchor device. 14. The method of claim 12, wherein the first location indication comprises at least one a geographic location and a network location. 15. The method of claim 12, wherein the first location indication is communicated by at least one of a Bluetooth interface, a near-field communication (NFC) interface, and a radio-frequency identification (RFID) interface. 16. The method of claim 9, wherein the policy further specifies access to content stored on the anchor device. 17. The method of claim 9, wherein the policy is stored in a policy server that operates as part of a device management system to vary and control the types of authorization required between a plurality of anchor devices and companion devices. 18. An anchor device that allows access to a user based on the user operating a companion device, comprising: a memory store;an application installed on the anchor device;a processor, wherein the processor performs stages including: receiving a request for access to the anchor device from the companion device;identifying a policy stored in a data store that associates the anchor device and the companion device, wherein the policy is configured at a user interface generated by a management console;determining whether to grant access to the anchor device based at least in part upon the request from the companion device; andin response to a determination that the policy is not violated, issuing a command from the application that provides access to the anchor device. 19. The method of claim 18, wherein the command from the application causes the anchor device to launch a particular application on the anchor device.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (101)
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Administration of protection of data accessible by a mobile device.
Sasai, Takashi; Sato, Makoto; Kakuda, Hiroshi; Odagiri, Kazuya; Nishimura, Koji, Communication method, communication system, and communication device for performing communication having altering communication ranges.
Bhaskaran,Harikrishnan, Communication system and method for compressing information sent by a communication device to a target portable communication device.
Lee, Woo Jae; Bertz, Lyle T.; Perez, Cesar; Dreiling, Ryan Patrick; Cole, Jason D., Conserving bandwidth by restricting videos communicated in a wireless telecommunications network.
Johnson, David Nephi; Nielson, Dustin Lance; Griffis, Jr., Jerry E.; Beus, David Kent; Jensen, Nathan Blaine; Street, William; Sherman, Paul Erik; Cook, Michael William; Carter, Stephen R, Credential mapping.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
Maurya, Sanjiv; Tse, Benson Wei-Ming; VanZile, Frank; Bonham, Larry Dean; Peterson, Phil; Friend, John, Method and system for distributing and updating software in wireless devices.
Ellis, Richard Donald; Newcombe, Christopher Richard; Jones, Paul David; Birum, Derrick Jason; Dunkle, Harold Michael; Thompson, Mikel Howard, Method and system for granting access to system and content.
Bruton, III, David Aro; Overby, Jr., Linwood H.; Rodriguez, Adolfo Francisco, Methods, systems and computer program products for selectively allowing users of a multi-user system access to network resources.
Laird,David; Jones,Martin Kelly, Notification systems and methods enabling user entry of notification trigger information based upon monitored mobile vehicle location.
Wright,Michael; Boucher,Peter; Nault,Gabe; Smith,Merrill; Jacobson,Sterling K; Wood,Jonathan; Mims,Robert, Protection of data accessible by a mobile device.
Knibbeler, Charles Leonardus Corenlius Maria; Staring, Antonius Adriaan Maria; Treffers, Menno Anne; Frimout, Emmanuel David Lucas Michael; Bernsen, Johannes Arnoldus Cornelis, Proximity check server.
Mann, Dwayne R.; Heard, Robert W.; Burchett, Christopher D.; Gordon, Ian R., Server, computer memory, and method to support security policy maintenance and distribution.
Wolovitz, Lionel; Collins, Tim, Service management system and associated methodology of providing service related message prioritization in a mobile client.
Ng, Mason; Mendez, Daniel J.; Quinlan, Sean Michael, System and method for automatically forwarding email and email events via a computer network to a server computer.
Heard, Robert W.; Mann, Dwayne R.; Burchett, Christopher D.; Gordon, Ian R., System and method for distribution of security policies for mobile devices.
Riggins Mark D. ; Bailes R. Stanley ; Bui Hong O. ; Cowan David I. ; Mendez Daniel I. ; Ng Mason ; Quinlan Sean Michael ; Wagle Prasad ; Ying Christine C. ; Zuleeg Christopher R. ; Aptekar-Strober Jo, System and method for globally accessing computer services.
Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R., System and method for globally and securely accessing unified information in a computer network.
Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for securely synchronizing multiple copies of a workspace element in a network.
Ng Mason ; Quinlan Sean Michael ; Ruan Tom ; Mendez Daniel J. ; Zhu Jing ; Cheng ; Jr. Martin ; Williams Matt ; Riggins Mark D., System and method for updating a remote database in a network.
Mendez Daniel J. ; Riggins Mark D. ; Wagle Prasad ; Ying Christine C., System and method for using a global translator to synchronize workspace elements across a network.
Piccionelli, Greg A.; Rittmaster, Ted R., System and process for limiting distribution of information on a communication network based on geographic location.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.