Abstract:
A system and method are disclosed for tracking documents in a computing environment, including documents stored locally on computing devices. A monitoring module stored on a computing device may determine that a user is trying to open a document stored locally on the computing device and communicate a signature associated with the document to a document tracking system. A document tracking system may compare the signature with a set of stored signatures to see if the document corresponds to a document already being tracked. If the document is not being tracked already, the document tracking system may upload the document into the system, send a link to a newer version or determine one or more actions to be performed on the document based on the signature.
Abstract:
Systems and methods for controlling access to multiple applications on a computing device are provided. One embodiment of a system includes an access device configured to: receive a request to access a first application and a device identifier; authenticate the user using a user credential associated with the user and store the device identifier in association with a login identifier in response to authentication of the user. The access device can be further configured to receive a request to access a second application and the device identifier. The access device can allow access to the second application based on the previous authentication of the user.
Abstract:
A system for controlling access includes a computing device, configured to: determine a first identifier associated with a first access point being used by the computing device to access a network; determine first access control data associated with the first identifier and a first application executing on the computing device; and control access to data over the network by the first application based on the first access control data.
Abstract:
A system for document searching can include a camera. The system may further include an image capturing module configured to capture a first image of a first portion of a document, a feature recognition module in communication with the image capturing module, the feature recognition module configured to determine a first feature associated with the first image, a search module configured to send search information to a server and receive a first result from a first search of a set of documents that was performed based on one or more search criteria determined based on the first feature associated with the first image, and a search interface configured to present the first result on the device.
Abstract:
A system and method are disclosed for tracking documents in a computing environment, including documents stored locally on computing devices. A monitoring module stored on a computing device may determine that a user is trying to open a document stored locally on the computing device and communicate a signature associated with the document to a document tracking system. A document tracking system may compare the signature with a set of stored signatures to see if the document corresponds to a document already being tracked. If the document is not being tracked already, the document tracking system may upload the document into the system, send a link to a newer version or determine one or more actions to be performed on the document based on the signature.
Abstract:
A system for document searching can include a camera. The system may further include an image capturing module configured to capture a first image of a first portion of a document, a feature recognition module in communication with the image capturing module, the feature recognition module configured to determine a first feature associated with the first image, a search module configured to send search information to a server and receive a first result from a first search of a set of documents that was performed based on one or more search criteria determined based on the first feature associated with the first image, and a search interface configured to present the first result on the device.
Abstract:
A system for controlling access includes a computing device, configured to: determine a first identifier associated with a first access point being used by the computing device to access a network; determine first access control data associated with the first identifier and a first application executing on the computing device; and control access to data over the network by the first application based on the first access control data.
Abstract:
Systems and methods for controlling access to multiple applications on a computing device are provided. One embodiment of a system includes an access device configured to: receive a request to access a first application and a device identifier; authenticate the user using a user credential associated with the user and store the device identifier in association with a login identifier in response to authentication of the user. The access device can be further configured to receive a request to access a second application and the device identifier. The access device can allow access to the second application based on the previous authentication of the user.
Abstract:
A system for controlling access includes a computing device, configured to: determine a first identifier associated with a first access point being used by the computing device to access a network; determine first access control data associated with the first identifier and a first application executing on the computing device; and control access to data over the network by the first application based on the first access control data.
Abstract:
Systems and methods for controlling access to multiple applications on a computing device are provided. One embodiment of a system includes an access device configured to: receive a request to access a first application and a device identifier; authenticate the user using a user credential associated with the user and store the device identifier in association with a login identifier in response to authentication of the user. The access device can be further configured to receive a request to access a second application and the device identifier. The access device can allow access to the second application based on the previous authentication of the user.