Cloud based mobile device management systems and methods

    公开(公告)号:US09473537B2

    公开(公告)日:2016-10-18

    申请号:US14711961

    申请日:2015-05-14

    摘要: The present disclosure relates to cloud based mobile device management (MDM) systems and methods to use the “cloud” to pervasively manage mobile devices. The cloud based MDM systems and methods provide an ability to manage mobile devices with or without MDM clients while no requiring an MDM appliance or service at the enterprise. This provides a “no hardware, no software” deployment. In an exemplary embodiment, a client-less implementation leverages the ActiveSync protocol proxied through distributed cloud nodes to enforce mobile policies. In another exemplary embodiment, a client-based implementation uses a platform specific application and associated application programming interfaces (API) to connect managed mobile devices and provide MDM features through the cloud. Advantageously, the cloud based MDM systems and methods provide reliability and resiliency, elasticity, lower cost, mobility, integration of management and security, and agility over conventional MDM based solutions.

    Cloud based social networking policy and compliance systems and methods
    3.
    发明授权
    Cloud based social networking policy and compliance systems and methods 有权
    基于云的社交网络政策和合规体系和方法

    公开(公告)号:US09369433B1

    公开(公告)日:2016-06-14

    申请号:US13315002

    申请日:2011-12-08

    IPC分类号: G06F15/173 H04L29/06

    摘要: Cloud based social networking policy and compliance systems and methods use the “cloud” to pervasively enforce security and policy on websites such as Web 2.0 social networking sites. The cloud based systems and methods provide a cloud based social networking policy enforcement and compliance system that gives enterprises full control and visibility into what their employees are seeing and posting to various websites. In particular, the cloud based systems and methods provide an enterprise to have granular policy-based Web 2.0 control and detailed compliance reports. Unique, customized policies may be applied to groups and/or individuals. Polices may be customized based on application. Data leakage may be avoided by prevention of file uploads and the like. Additionally, the cloud based systems and methods may provide advanced policies requiring administrator approval for user generated content to be posted to Web 2.0 sites.

    摘要翻译: 基于云的社交网络策略和合规性系统和方法使用“云”在Web 2.0社交网站等网站上普遍执行安全和策略。 基于云的系统和方法提供了一个基于云的社交网络策略执行和合规系统,使企业能够对其员工的看法和发布到各个网站进行充分的控制和了解。 特别地,基于云的系统和方法为企业提供基于策略的Web 2.0控制和详细合规性报告。 独特的,定制的政策可能适用于团体和/或个人。 政策可以根据应用进行定制。 可以通过防止文件上传等来避免数据泄漏。 此外,基于云的系统和方法可能会提供需要管理员批准的高级策略,以便将用户生成的内容发布到Web 2.0站点。

    Systems and methods for concurrent wireless local area network access and sensing
    4.
    发明授权
    Systems and methods for concurrent wireless local area network access and sensing 有权
    并发无线局域网接入和传感的系统和方法

    公开(公告)号:US08694624B2

    公开(公告)日:2014-04-08

    申请号:US12468164

    申请日:2009-05-19

    IPC分类号: G06F15/173

    摘要: This invention describes systems and methods for combining the Wireless Local Area Network (WLAN) infrastructure and Wireless Intrusion Prevention Systems (WIPS) by leveraging a common radio platform equipped with more than one WLAN radio and a unified management system. The invention provides all the benefits of the WLAN, without sacrificing the 24×7 dedicated security monitoring and performance troubleshooting available from an overlay WIPS system, while reducing the deployment cost and management complexity, by sharing a common hardware platform for the WLAN Access Point (AP) and WIPS sensor and leveraging an integrated management system.

    摘要翻译: 本发明描述了通过利用配备有多于一个WLAN无线电和统一管理系统的公共无线电平台来组合无线局域网(WLAN)基础设施和无线入侵防御系统(WIPS)的系统和方法。 本发明提供了WLAN的所有优点,而不牺牲覆盖WIPS系统可用的24×7专用安全监控和性能故障排除,同时通过共享WLAN接入点的通用硬件平台(而不是部署成本和管理复杂性) AP)和WIPS传感器,并利用集成管理系统。

    SYSTEMS AND METHODS FOR SECURE ACCESS TO REMOTE NETWORKS UTILIZING WIRELESS NETWORKS
    6.
    发明申请
    SYSTEMS AND METHODS FOR SECURE ACCESS TO REMOTE NETWORKS UTILIZING WIRELESS NETWORKS 审中-公开
    利用无线网络安全访问远程网络的系统和方法

    公开(公告)号:US20110099280A1

    公开(公告)日:2011-04-28

    申请号:US12607151

    申请日:2009-10-28

    IPC分类号: G06F15/16

    摘要: The present disclosure provides secure connectivity to remote networks on demand without requiring an interactive logon at a wireless client. Specifically, the present invention utilizes a proxy in a wireless network, such as an Access Point (AP) or the like, to provide client access to a remote, hosted network external to the wireless network. The present invention utilizes existing wireless security protocols and other security mechanisms between the proxy and the remote, hosted network. In operation, a wireless network proxy responds to a wireless client that is seeking a remote, hosted network, such as through an association request. The wireless network proxy then serves as an intermediary between the remote, hosted network and the wireless client to enable secure end-to-end communication.

    摘要翻译: 本公开提供了对远程网络的安全连接,而无需在无线客户端进行交互式登录。 具体地说,本发明利用诸如接入点(AP)等的无线网络中的代理来提供对无线网络外部的远程托管网络的客户端访问。 本发明利用代理和远程托管网络之间的现有无线安全协议和其他安全机制。 在操作中,无线网络代理器响应寻求远程托管网络的无线客户端,例如通过关联请求。 无线网络代理然后用作远程,托管网络和无线客户端之间的中介,以实现安全的端到端通信。

    Systems and methods for wireless vulnerability analysis
    7.
    发明授权
    Systems and methods for wireless vulnerability analysis 有权
    无线漏洞分析的系统和方法

    公开(公告)号:US07577424B2

    公开(公告)日:2009-08-18

    申请号:US11312042

    申请日:2005-12-19

    CPC分类号: H04L63/1433

    摘要: Security vulnerability assessment for wireless networks is provided. Systems and methods for security vulnerability assessment simulate an attack upon the wireless network, capture the response from the wireless network, and identify a vulnerability associated with the wireless network after analyzing the response from the wireless network.

    摘要翻译: 提供无线网络的安全漏洞评估。 用于安全漏洞评估的系统和方法模拟对无线网络的攻击,捕获来自无线网络的响应,并在分析来自无线网络的响应之后识别与无线网络相关联的漏洞。

    Buffer allocation using probability of dropping unordered segments
    8.
    发明授权
    Buffer allocation using probability of dropping unordered segments 有权
    使用丢弃无序段的概率进行缓冲区分配

    公开(公告)号:US07570653B2

    公开(公告)日:2009-08-04

    申请号:US10932937

    申请日:2004-09-02

    IPC分类号: H04L12/56

    摘要: Allocation of buffer space for segment re-ordering is restricted based on a probability that the flow would consume too much space. A flow's current or recently past space consumption is used to predict the flow's activity with respect to future consumption. If the prediction of future consumption is high relative to other flows and to the total allocable buffer space in the device, then a decreasing amount of space than would otherwise be provided is allocated to the flow. In a preferred embodiment, if a flow's buffers are below a predetermined threshold for the flow (i.e., the “flow threshold”), and the amount of overall system memory space is above a predetermined system threshold then buffer allocation can proceed normally for that flow. For example, all of an additional amount of space that the flow may currently be requesting can be allocated to the flow. However, if one or both of the system threshold or the flow threshold requirements are not met then allocation can be according to a prediction of the behavior (i.e., consumption) of the flow.

    摘要翻译: 基于流量消耗太多空间的概率来限制用于段重新排序的缓冲区空间的分配。 流量当前或最近过去的空间消耗用于预测流量相对于未来消费的活动。 如果未来消费的预测相对于其他流量以及设备中的总可分配缓冲区空间较高,那么将向流量分配比原来提供的空间少的空间。 在优选实施例中,如果流的缓冲器低于用于流的预定阈值(即,“流量阈值”),并且整个系统存储器空间的量高于预定系统阈值,则缓冲器分配可以对于该流程正常进行 。 例如,可以向流程分配流程当前可以请求的所有额外的空间量。 然而,如果不满足系统阈值或流量阈值要求中的一个或两个,则可以根据流的行为(即,消耗)的预测进行分配。

    Optimum frame fragmentation method for communication over error prone channels
    9.
    发明授权
    Optimum frame fragmentation method for communication over error prone channels 有权
    用于通过错误通道的通信的最优帧分段方法

    公开(公告)号:US07400587B2

    公开(公告)日:2008-07-15

    申请号:US10712797

    申请日:2003-11-13

    申请人: Amit Sinha

    发明人: Amit Sinha

    IPC分类号: G06F11/00

    CPC分类号: H04L1/20 H04L1/0007 H04W24/00

    摘要: A frame fragmentation method for digital communications over error prone channels is presented. The technique maximizes data throughput based on the bit error rate and frame overhead. The technique can be used to determine optimum fragmentation thresholds for wireless links that are characterized by significant bit error rates.

    摘要翻译: 提出了一种用于在易出错通道上进行数字通信的帧分片方法。 该技术基于比特错误率和帧开销使数据吞吐量最大化。 该技术可用于确定以有效位错误率为特征的无线链路的最优分段阈值。