Abstract:
Disclosed are various embodiments relating to managed clones of applications. In one embodiment, an application is received. If it is determined that the application should be managed, a managed clone of the application is generated. The managed clone of the application is configured for coexistence along with the application upon a client device under management. The managed clone of the application may then be deployed to the client device under management.
Abstract:
Aspects of image capture challenge access are described. In one embodiment, an access service of a computing device directs an imaging system to capture an image including facial fiducial features and determine whether the features correspond to an expected set of features. The access service may also issue a request for a response including, for example, a request to tilt or move the computing device, move an individual's face, or contort an individual's facial features. After the request for the response, the access service may capture a response image. The response image may include an adjustment to facial fiducial features. The access service may further determine whether the adjustment to the facial fiducial features corresponds to the request. Depending upon whether the adjustment corresponds to the request, the access service may permit or deny access to features of the computing device.
Abstract:
Disclosed are various embodiments rendering advertisements in a client device in exchange for obtaining uninterrupted media content. A transmission of a first stream of media content for rendering via a media device is initiated, wherein the first stream of media content comprises media with at least one advertisement. A client device is registered with a device management service in response to a request received from the client device. A rendering of at least one advertisement on the client device is initiated. The transmission from the first stream of media content is changed to a second stream of media content for rendering via the media device, wherein the second stream of media content does not include any advertisements.
Abstract:
Disclosed are various embodiments for facilitating the encryption of files as well as facilitating requiring a user to employ an authenticator device in order to access a file that is encrypted or otherwise secured. The authenticator device can provide an authenticator code in which a security key used to access a secured file can be embedded. An additional layer of encryption can also be applied in the authenticator code.
Abstract:
Disclosed are various embodiments for securely storing and transmitting medical- or health-related information. According to various embodiments described herein, a computing device may enroll or register a client device or a peripheral device associated with the client device in response to the client device or the peripheral device complying with at least one compliance rule. Health information received from the client device or the peripheral device is accessed in response a request received from a requesting service for the health information, wherein the health information as received is encrypted according to a cryptographic key. A determination is made whether consent to send the health information to the requesting service has been provided by a user of the client device. If consent has been provided, the health information received from the client device or the peripheral device is sent to the requesting service.
Abstract:
Disclosed are various embodiments rendering advertisements in a client device in exchange for obtaining uninterrupted media content. A transmission of a first stream of media content for rendering via a media device is initiated, wherein the first stream of media content comprises media with at least one advertisement. A client device is registered with a device management service in response to a request received from the client device. A rendering of at least one advertisement on the client device is initiated. The transmission from the first stream of media content is changed to a second stream of media content for rendering via the media device, wherein the second stream of media content does not include any advertisements.
Abstract:
Disclosed are various embodiments relating to managed clones of applications. In one embodiment, an application is received. If it is determined that the application should be managed, a managed clone of the application is generated. The managed clone of the application is configured for coexistence along with the application upon a client device under management. The managed clone of the application may then be deployed to the client device under management.
Abstract:
Disclosed are various approaches for implementing an application authentication wrapper. An authentication request, such as a Kerberos request, is created for authenticating the computing device. The authentication request is encrypted to generate an encrypted authentication request. The encrypted authentication request is then forwarded to a reverse proxy server. An encrypted authentication response is received from the reverse proxy server. The encrypted authentication response, such as a Kerberos response, is then decrypted to generate a corresponding authentication response, which is then forwarded to the computing device that generated the authentication request.
Abstract:
Systems and methods are included for detecting driving based on user-specific models for driving detection, and restricting access to an application of the user device while a user is driving. A management agent installed on the user device can collect data from sensors in a user device and provide the data to a management server, which can build a user-specific model for driving detection for that user. The management agent can then use that user-specific model for detecting when the user is driving. When the agent determines that the user is driving, it can enforce a driving policy that limits access to applications and delay or modify notifications generated by applications.
Abstract:
Disclosed are various embodiments relating to managed clones of applications. In one embodiment, an application is received. If it is determined that the application should be managed, a managed clone of the application is generated. The managed clone of the application is configured for coexistence along with the application upon a client device under management. The managed clone of the application may then be deployed to the client device under management.