AirWatch, LLC Patent applications |
Patent application number | Title | Published |
20140331040 | Systems and Methods for Controlling Email Access - Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more email attachments from the email resources, and encoding the stripped email attachments based at least in part on one or more cryptographic keys. | 11-06-2014 |
20140258711 | Application Specific Certificate Management - Application specific certificate deployment may be provided. An application may generate a security certificate comprising a public key and a first private key. The public key may be stored in a shared segment of a memory store, from where it may be retrieved and signed. The signed public key may be re-deployed and/or used to transmit securely encrypted resources. | 09-11-2014 |
20140245381 | Systems and Methods for Controlling Email Access - Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, identifying at least one resource rule associated with the email resources, and adding at least one URL to the email resources in accordance with the resource rules. | 08-28-2014 |
20140245008 | Systems and Methods for Controlling Email Access - Embodiments of the disclosure relate to proxying at least one email resource in transit to at least one client device from at least one email service, removing at least one URL from the email resources, and adding at least one modified URL to the email resources. | 08-28-2014 |
20140165213 | Systems and Methods for Controlling Email Access - Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, determining whether the email resources are accessible to the client devices via at least one unauthorized application on the client devices, and modifying the email resources to be inaccessible via the unauthorized applications on the client devices in response to a determination that the email resources are accessible via the unauthorized applications on the client devices. | 06-12-2014 |
20140165153 | Systems and Methods for Controlling Email Access - Embodiments of the disclosure relate to proxying at least one email resource in transit to at least one client device from at least one email service, removing at least one URL from the email resources, and adding at least one modified URL to the email resources. | 06-12-2014 |
20140165148 | Systems and Methods for Controlling Email Access - Embodiments of the disclosure relate to identifying email resources associated with client devices, identifying resource rules, determining whether the email resources satisfy the resource rules, and modifying the email resources based on the resource rules if the resource rules are not satisfied by the email resources. | 06-12-2014 |
20140165132 | Systems and Methods for Controlling Email Access - Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, identifying at least one resource rule associated with the email resources, and adding at least one URL to the email resources in accordance with the resource rules. | 06-12-2014 |
20140164759 | Systems and Methods for Controlling Email Access - Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more email attachments from the email resources, and encoding the stripped email attachments based at least in part on one or more cryptographic keys. | 06-12-2014 |
20140115668 | Systems and Methods for Controlling Network Access - Disclosed are various embodiments for systems and methods for controlling access of networks. In one embodiment, an access control service receives requests to access network beacons from client devices. In response, the access control service determines whether the client devices satisfy authorization rules associated with the network beacons. If the access control service determines that the client devices satisfy the authorization rules associated with the network beacons, the access control service authorizes the client devices to access the network beacons. Subsequently, if the client devices cease to satisfy the authorization rules associated with the network beacons, the access control service terminates the authorization of the client devices to access the network beacons. | 04-24-2014 |
20130339073 | INFLUENCING THE UTILIZATION OF RESOURCES IN A CIRCUMSCRIBED VENUE - Disclosed are various embodiments for influencing the utilization of resources in a circumscribed venue. In one embodiment, a computer-based optimization service identifies resources associated with a circumscribed venue. The optimization service determines the optimal utilization of the venue resources based on venue-specific and participant-specific variables. The optimization service transmits optimization data based on the optimal utilization to client devices associated with venue participants. | 12-19-2013 |
20130254401 | Controlling Distribution of Resources on a Network - Disclosed are various embodiments for controlling distribution of resources on a network. In one embodiment, a distribution service receives a request from a client device to access resources hosted by a distribution service. In response, the distribution service determines whether the client device is authorized to access the distribution service. The distribution service identifies which of the resources hosted by the distribution service are accessible to the client device based on the resource grouping identifiers associated with the client device. The distribution service determines which distribution rules are associated with the identified resources, the distribution rules including location rules and time rules. The distribution service then transmits the identified resources and identified distribution rules to the client device, where the resources are configured to be exclusively accessible via a containerized client application on the client device while the client device satisfies the distribution rules associated with the resources. | 09-26-2013 |