Patent
Providing Virtualized Private Network Tunnels
Reads0
Chats0
TLDR
In this paper, a per-application policy-controlled virtual private network (VPN) tunnel is proposed to provide access to an enterprise resource without separate authentication of the application and, in some instances, can be used in such a manner as to provide a seamless experience to the user when reestablishing a perapplication policy controlled VPN tunnel during the lifetime of the ticket.Abstract:
Various aspects of the disclosure relate to providing a per-application policy-controlled virtual private network (VPN) tunnel. In some embodiments, tickets may be used to provide access to an enterprise resource without separate authentication of the application and, in some instances, can be used in such a manner as to provide a seamless experience to the user when reestablishing a per-application policy controlled VPN tunnel during the lifetime of the ticket. Additional aspects relate to an access gateway providing updated policy information and tickets to a mobile device. Other aspects relate to selectively wiping the tickets from a secure container of the mobile device. Yet further aspects relate to operating applications in multiple modes, such as a managed mode and an unmanaged mode, and providing authentication-related services based on one or more of the above aspects.read more
Citations
More filters
Patent
Secure execution of enterprise applications on mobile devices
TL;DR: In this paper, the authors present a system for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices using a bring-your-own-device (BYOD) policy.
Patent
Advanced authentication techniques and applications
Marc Briceno,Brendon J. Wilson,Ramesh Kesanupalli,Davit Baghdasaryan,Rajiv Dholakia,William J. Blanke,Rolf Lindemann,Igor Polivanyi,Avinash Umap +8 more
TL;DR: In this paper, a system, apparatus, method, and machine readable medium are described for performing advanced authentication techniques and associated applications, and one embodiment of such a method comprises: receiving a policy identifying a set of acceptable authentication capabilities, determining a client authentication capabilities; and filtering the set of allowable authentication capabilities based on the determined set of client authentication capability to arrive at a filtered set of one or more authentication capabilities for authenticating a user.
Patent
System and method for adaptive application of authentication policies
TL;DR: In this article, a system, apparatus, method, and machine readable medium are described for adaptively implementing an authentication policy, which includes detecting a user of a client attempting to perform a current interaction with a relying party.
Patent
Application wrapping for application management framework
TL;DR: In this article, a software component, such as a native mobile application or a template application, may be modified into a managed mobile application, and metadata associated with the managed application may be generated.
Patent
Proximity and context aware mobile workspaces in enterprise systems
TL;DR: In this paper, a mobile computing device determines that the device is proximate to a location, another device, or an individual associated with an enterprise system, such as one or more specific wireless networks, enterprise applications, and documents, and may configure the device based on the received mobile workspace context.
References
More filters
Patent
System and method for knowledge retrieval, management, delivery and presentation
TL;DR: In this article, the authors present an integrated implementation framework and resulting medium for knowledge retrieval, management, delivery and presentation, which includes a first server component responsible for adding and maintaining domain-specific semantic information and a second server component that hosts semantic and other knowledge for use by the first component that work together to provide context and time-sensitive semantic information retrieval services.
Patent
System for controlling access and distribution of digital property
TL;DR: In this article, a method and device are provided for controlling access to data, where portions of the data are protected and rules concerning access rights to data are determined, and a method is also provided for distributing data for subsequent controlled use of those data.
Patent
Methods and systems for use in network management of content
TL;DR: In this article, the authors present methods, systems and apparatuses for use in managing content on at least a local network, where the change is additional content on a first client device.
Patent
Data security system and method
Ron M. Redlich,Martin A. Nemzow +1 more
TL;DR: In this paper, the method for securing data includes establishing a group of security sensitive items, filtering data and extracting and separating the security items from remainder data, and a map may be generated.
Patent
Systems and methods for collaboration
TL;DR: In this paper, the authors present a client-server infrastructure capable of supporting a variety of asynchronous and synchronous collaboration activities in a so-called collaboration place, including chatting, viewing and/or editing one or more data files.