摘要:
A method for ensuring compliance with organizational policies is described herein. The method can include the step of monitoring one or more parameters of a managed computing device for compliance with one or more policies of an organization in which the organizational policies may include limitations on the managed computing device. The method can also include the step of detecting a non-conformance event at the managed computing device with respect to at least one organizational policy. In response to the detection of the non-conformance event, the operation of the managed computing device may be restricted with respect to features or data associated with the organization.
摘要:
A managed services platform and method of operation of same are described herein. The platform can include a device management service (DMS) server in which the DMS server can act as a gateway for communications with one or more computing devices, and the computing devices are associated with a first entity. The platform can also include an application service (AS) server in which the AS server is communicatively coupled with the DMS server. When a first computing device contacts the DMS server, the DMS server is operable to provide a bundle to the first computing device. As an example, the bundle contains content that at least includes one or more configuration messages and an application set that contains one or more predefined applications. The content of the bundle can be determined at least in part by the first entity.
摘要:
A method and system of runtime injection for a secure application are described herein. During runtime of the secure application, a conventional request from the secure application can be intercepted. The intercepted conventional request can be modified such that the request is unrecognizable to an unsecure application, which can create a secure request. In addition, the secure request can be passed to a system process to enable the system process to process the secure request.
摘要:
A method and system for data usage accounting are described herein. On a computing device that includes enterprise applications and personal applications, a datagram send request for an enterprise application can be received. The datagram send request may involve unreliable transport communication with a final destination and may be conducted in a native fashion with respect to the enterprise application. Based on the datagram send request, addressing information of a relay destination that is different from the final destination can be received. In addition, outbound datagrams of the unreliable transport communication can be corresponded with the received addressing information of the relay destination. The outbound datagrams of the unreliable transport communication may also be supplemented with the addressing information of the final destination. The outbound datagrams of the unreliable transport communication may also be transmitted to the relay destination to enable a data usage accounting of the datagram send request.
摘要:
A method and system of selectively permitting a non-secure application to communicate with a secure application are described herein. The method can be practiced in a system that support an environment designed to restrict secure applications from processing requests from non-secure applications. In particular, a request can be received from a non-secure application by a system framework and, through the system framework, it can be determined that a secure application is capable of processing the request. The request can be delegated from the system framework to a secure framework. In addition, through the secure framework, it can be determined whether the non-secure application is an authorized non-secure application. If the non-secure application is an authorized non-secure application, the secure application can be permitted to process the request from the non-secure application.
摘要:
A system and method for encapsulating a target application are described herein. In particular, an analysis of the target application can be performed to determine one or more characteristics of the target application. Based on the analysis of the target application, a blueprint of the target application can be generated. Based on the blueprint, an encapsulation application can be constructed for the target application. In addition, the target application can be encapsulated with the encapsulation application to create an encapsulated target application to enable adaptive loading of the target application.
摘要:
A method and system for selective preservation of materials related to discovery is described herein. The method includes the step of receiving at a computing device a preservation notification based on a litigation event against an enterprise that warrants preservation of related documents. In response to the receipt of the preservation notification, the computing device can be placed in a preservation mode. As part of the preservation mode, materials from at least enterprise materials on the computing device that are to be preserved for discovery can be identified. In addition, the computing device may be a personal computing device of an associate of the enterprise. The method can also include the step of automatically creating back-up copies of the identified materials to comply with preservation requirements related to the litigation event.
摘要:
A method and system for automatic provisioning of applications are described herein. The method can include the step of offering a plurality of applications for download to electronic devices in which each of at least some of the applications may be formatted for one of a plurality of operating environments. The method can also include the steps of receiving a request for at least one application in which the request can be associated with a first electronic device and selecting an application for delivery to the first electronic device. The selected application can be an application that may be formatted for the operating environment of the first electronic device and may be among the offered applications that are formatted for differing operating environments.
摘要:
A system and method for isolating secure communication events from a non-secure application are described herein. The method can include the steps of intercepting a communication event from an external communications network or an external communications device and determining whether the communication event is a secure communication event. If the communication event is a secure communication event, the secure communication event can be processed by a secure application. In addition, the secure communication event can be prevented from being processed by the non-secure application.
摘要:
A method for ensuring compliance with organizational policies is described herein. The method can include the step of monitoring one or more parameters of a managed computing device for compliance with one or more policies of an organization in which the organizational policies may include limitations on the managed computing device. The method can also include the step of detecting a non-conformance event at the managed computing device with respect to at least one organizational policy. In response to the detection of the non-conformance event, the operation of the managed computing device may be restricted with respect to features or data associated with the organization.