Abstract:
Disclosed are various embodiments relating to managed clones of applications. In one embodiment, an application is received. If it is determined that the application should be managed, a managed clone of the application is generated. The managed clone of the application is configured for coexistence along with the application upon a client device under management. The managed clone of the application may then be deployed to the client device under management.
Abstract:
Disclosed are various embodiments for facilitating the encryption of files as well as facilitating requiring a user to employ an authenticator device in order to access a file that is encrypted or otherwise secured. The authenticator device can provide an authenticator code in which a security key used to access a secured file can be embedded. An additional layer of encryption can also be applied in the authenticator code.
Abstract:
Disclosed are various approaches for implementing an application authentication wrapper. An authentication request, such as a Kerberos request, is created for authenticating the computing device. The authentication request is encrypted to generate an encrypted authentication request. The encrypted authentication request is then forwarded to a reverse proxy server. An encrypted authentication response is received from the reverse proxy server. The encrypted authentication response, such as a Kerberos response, is then decrypted to generate a corresponding authentication response, which is then forwarded to the computing device that generated the authentication request.
Abstract:
A method is disclosed for providing physical access credentials to a client device. The method may include receiving a request for a physical access credential, where the first request includes at least one user access credential and at least one physical access point identifier. The method may also include determining whether the request should be granted based at least in part on the at least one user access credential. The method may further include, in response to determining that the request should be granted, sending the physical access credential associated with the physical access point.
Abstract:
Aspects of image capture challenge access are described. In one embodiment, an access service of a computing device directs an imaging system to capture an image including facial fiducial features and determine whether the features correspond to an expected set of features. The access service may also issue a request for a response including, for example, a request to tilt or move the computing device, move an individual's face, or contort an individual's facial features. After the request for the response, the access service may capture a response image. The response image may include an adjustment to facial fiducial features. The access service may further determine whether the adjustment to the facial fiducial features corresponds to the request. Depending upon whether the adjustment corresponds to the request, the access service may permit or deny access to features of the computing device.
Abstract:
Authentication via accelerometer may be provided. Upon receiving a request to unlock a device, a user may perform an authentication movement that may be detected by an accelerometer on the device. If the authentication movement is determined to match an approved movement, the device may be unlocked.
Abstract:
Systems and methods are included for detecting driving based on user-specific models for driving detection, and restricting access to an application of the user device while a user is driving. A management agent installed on the user device can collect data from sensors in a user device and provide the data to a management server, which can build a user-specific model for driving detection for that user. The management agent can then use that user-specific model for detecting when the user is driving. When the agent determines that the user is driving, it can enforce a driving policy that limits access to applications and delay or modify notifications generated by applications.
Abstract:
Disclosed are various examples for facilitating network speed testing on behalf of a client device that is in communication with a management service. A network testing profile can be obtained which specifies a network testing schedule for execution of a network test with a network testing endpoint. The client device can generate a test result associated with the network testing schedule based upon an exchange of at least one test packet with the network testing endpoint. In an instance in which it is determined that a network speed between the client device and the network testing endpoint fails to meet a threshold, an amount of network bandwidth usage by the client device can be reduced.
Abstract:
Systems and methods are included for detecting driving based on user-specific models for driving detection, and restricting access to an application of the user device while a user is driving. A management agent installed on the user device can collect data from sensors in a user device and provide the data to a management server, which can build a user-specific model for driving detection for that user. The management agent can then use that user-specific model for detecting when the user is driving. When the agent determines that the user is driving, it can enforce a driving policy that limits access to applications and delay or modify notifications generated by applications.
Abstract:
Systems and methods are included for detecting driving based on user-specific models for driving detection, and restricting access to an application of the user device while a user is driving. A management agent installed on the user device can collect data from sensors in a user device and provide the data to a management server, which can build a user-specific model for driving detection for that user. The management agent can then use that user-specific model for detecting when the user is driving. When the agent determines that the user is driving, it can enforce a driving policy that limits access to applications and delay or modify notifications generated by applications.