摘要:
Systems and methods for enhanced electronic asset protection are described. One aspect of one described embodiment includes receiving an indication to activate asset protection, the client device having a local data store; and activating asset protection in response to the indication, wherein asset protection comprises disabling the local data store and disabling the client device. In another embodiment, a computer-readable medium (such as, for example random access memory or a computer disk) includes code for carrying out such a method.
摘要:
Systems and methods for monitoring and displaying performance metrics are described. One aspect of one described embodiment includes receiving performance metrics associated with a plurality of network connections to a plurality of networks, each of the plurality of network connections associated with a client device; determining a status of one of the plurality of networks based at least in part on the performance metrics; and providing the status of the one of the plurality of networks to a user interface.
摘要:
Systems and methods for enhanced network access are described. One aspect of one described embodiment includes receiving a request to connect to a network, the request associated with a user, determining a policy associated with the user, identifying at least one available network connection, determining at least one property of the at least one available network connection, evaluating the property based at least in part on the policy, and selecting the at least one available network connection based on the evaluation. In another embodiment, a computer-readable medium (such as, for example random access memory or a computer disk) includes code for carrying out such a method.
摘要:
Systems are methods for enhanced network client security are described. One aspect of one embodiment of the present invention includes receiving a security-related policy associated with a user, determining a security model associated with the security-related policy, and applying the security model to a network connection on a client device. One aspect of another embodiment of the present invention includes receiving a first measure associated with a usage characteristic, the usage characteristic associated with a user, receiving a second measure associated with the usage characteristic, comparing the first measure and second measure, and determining the likelihood that an unauthorized access has occurred based at least in part on the comparison.
摘要:
Certain embodiments are systems and methods for intelligently managing applications, hardware, connection access, and user requirements on electronic devices and systems. One aspect includes a resource manager functionality that takes into account parameters associated with some or all of multiple communications options, applications and platform, and uses those parameters to optimize the user experience in that context based on externalities and on certain information which indicates or suggests what the user prefers. Another aspect of the present invention is a method of controlling system resources on a client device. This may involve determining application requirements for applications currently in use on the client device, determining client device resource requirements based on the application requirements, and adjusting resource settings based on the resource requirements. Another aspect of the present invention is a connection module.
摘要:
Embodiments of the present invention comprise an application-driven connection module that maintains network connectivity to at least one application server and enables only intended applications to operate between the client and the server.