Managing use of network resources
    21.
    发明授权

    公开(公告)号:US11032283B2

    公开(公告)日:2021-06-08

    申请号:US15180911

    申请日:2016-06-13

    Abstract: Some aspects of what is described here relate to managing the use of network resources on a mobile device. User input received at the device indicates whether to allow an application associated with a first perimeter on the device to access a network resource associated with a second perimeter on the device. For example, in some instances user input may indicate whether to allow data from applications associated with a personal perimeter on the device to be transmitted over an enterprise communication system. When outbound data associated with the first perimeter are received, the device determines, according to the indication from the user input, whether to route the outbound data to the network resource associated with the second perimeter.

    ASSOCIATING SERVICES TO PERIMETERS
    24.
    发明申请
    ASSOCIATING SERVICES TO PERIMETERS 审中-公开
    与周边地区的协调服务

    公开(公告)号:US20160337862A1

    公开(公告)日:2016-11-17

    申请号:US15218776

    申请日:2016-07-25

    Abstract: In some implementations, a method includes receiving, from a user of a first device, a request to enable access, through a second device, to a server resource account of an enterprise. The first device includes a first enterprise perimeter including an internal resource and a first enterprise identifier and configured to prevent external resources from accessing the internal resource. A request is wirelessly transmit, to the second device, to the second device for a second enterprise identifier assigned to a second enterprise perimeter included in the second device. Whether to grant access to the internal resource is determined based on a first enterprise identifier assigned to the first device and a second enterprise identifier assigned to the second device.

    Abstract translation: 在一些实现中,一种方法包括从第一设备的用户接收通过第二设备访问企业的服务器资源帐户的请求。 第一设备包括包括内部资源和第一企业标识符的第一企业周界,并且被配置为防止外部资源访问内部资源。 对于分配给包括在第二设备中的第二企业边界的第二企业标识符,请求向第二设备无线地传输到第二设备。 基于分配给第一设备的第一企业标识符和分配给第二设备的第二企业标识来确定是否授予对内部资源的访问。

    System and method for controlling applications to mitigate the effects of malicious software
    25.
    发明授权
    System and method for controlling applications to mitigate the effects of malicious software 有权
    用于控制应用程序以减轻恶意软件影响的系统和方法

    公开(公告)号:US09419997B2

    公开(公告)日:2016-08-16

    申请号:US14473485

    申请日:2014-08-29

    CPC classification number: H04L63/145 G06F21/53 G06F21/56 H04L63/14

    Abstract: Methods and systems for mitigating the effects of a malicious software application are disclosed. A dedicated module on the computing device receives from a malicious software detector a message indicating whether the application is malicious or has a malicious component. The dedicated module obtains a set of permissions to be granted to the application, and instructs software on the computing device that controls the permissions of the application to grant the set of permissions.

    Abstract translation: 公开了用于减轻恶意软件应用的影响的方法和系统。 计算设备上的专用模块从恶意软件检测器接收指示该应用是恶意的还是具有恶意组件的消息。 专用模块获得要授予应用程序的一组权限,并指示控制应用程序权限的计算设备上的软件授予该权限集。

    Communications system providing personnel access based upon near-field communication and related methods
    26.
    发明授权
    Communications system providing personnel access based upon near-field communication and related methods 有权
    基于近场通信和相关方法提供人员接入的通信系统

    公开(公告)号:US09269207B2

    公开(公告)日:2016-02-23

    申请号:US14223626

    申请日:2014-03-24

    Abstract: A security system may include an access control device associated with a personnel access position. The access control device may include a first Near-Field Communication (NFC) sensor, and a first controller configured to selectively grant personnel access based upon receiving a valid security code from the first NFC sensor, and to deny personnel access and generate an access denial electronic message(s) based upon receiving an invalid security code from the first NFC sensor. The system may also include a mobile wireless communications device(s) including a second NFC sensor and a second controller, which may be configured to communicate a security code via the second NFC sensor to the first NFC sensor based upon proximity therewith, and to receive a corresponding access denial electronic message from the first controller based upon the security code being invalid.

    Abstract translation: 安全系统可以包括与人员访问位置相关联的访问控制装置。 访问控制设备可以包括第一近场通信(NFC)传感器和第一控制器,其被配置为基于从第一NFC传感器接收到有效的安全代码来选择性地授予人员访问,并且拒绝人员访问并生成访问拒绝 基于从第一NFC传感器接收到无效的安全代码的电子消息。 该系统还可以包括包括第二NFC传感器和第二控制器的移动无线通信设备,其可以被配置为基于与第一NFC传感器的邻近性将第二NFC传感器传递到第一NFC传感器,并且接收 基于安全码无效的来自第一控制器的对应的访问拒绝电子消息。

    PRESENTING METADATA FROM MULTIPLE PERIMETERS
    28.
    发明申请
    PRESENTING METADATA FROM MULTIPLE PERIMETERS 有权
    从多个PERIMETERS提供元数据

    公开(公告)号:US20140207821A1

    公开(公告)日:2014-07-24

    申请号:US14166980

    申请日:2014-01-29

    Abstract: In some implementations, a method for managing data in a user device includes pushing first metadata for a first resource in a first perimeter to a service external to the first perimeter. The first perimeter is configured to prevent external resources from accessing resources in the first perimeter. Second metadata for a second resource in a second perimeter is pushed to the external service. The external service is external to the second perimeter, the second perimeter being configured to prevent external resources from accessing resources in the second perimeter. Information is presented to the user based on a combination of the first metadata and the second metadata.

    Abstract translation: 在一些实现中,用于管理用户设备中的数据的方法包括将第一周边中的第一资源的第一元数据推送到第一周边外部的服务。 第一个周边配置为防止外部资源访问第一个周边的资源。 第二个周边的第二个资源的第二个元数据被推送到外部服务。 外部服务在第二个周边外部,第二个周边配置为防止外部资源访问第二个周边的资源。 基于第一元数据和第二元数据的组合,向用户呈现信息。

Patent Agency Ranking