-
公开(公告)号:US11334852B2
公开(公告)日:2022-05-17
申请号:US15438779
申请日:2017-02-22
申请人: AIRWATCH LLC
摘要: The secure management of attachments is described. In one example, files are identified for attachment to a message through a secure content application extension. Rather than directly attaching the files to the message, a resource locator or link to the files is generated, and the resource locator is inserted into the message. The message is then forwarded for distribution to client devices based on an addressee list for the message. The distribution of and access to the files is managed separately by a management service. The management service can notify the client devices to retrieve the files based on a file access schedule. At each of the client devices, users can access the files through a secure content file application extension using the resource locator during the file access schedule. Thus, the files are distributed through secure content file applications and not as direct attachments to messages.
-
公开(公告)号:US20180157390A1
公开(公告)日:2018-06-07
申请号:US15417247
申请日:2017-01-27
申请人: AIRWATCH LLC
发明人: Sachin Vas , Sushilvas Vasavan
IPC分类号: G06F3/0484 , G06F3/0482 , G06F17/27 , G06F9/54
CPC分类号: H04M1/72522 , G06F9/4843 , H04L51/08 , H04M1/72547
摘要: Disclosed are various embodiments for initiating execution of an application using trigger characters. A computing device detects an entry of a trigger character within a first user interface presented by a first application installed on the computing device. The computing device then identifies a string following the trigger character. The computing device then determines that the string matches a name of a second application installed on the computing device. The computing device then initiates execution of the second application. Subsequently, the computing device switches from the first user interface to a second user interface presented by the second application.
-
公开(公告)号:US10579810B2
公开(公告)日:2020-03-03
申请号:US16166446
申请日:2018-10-22
申请人: AirWatch LLC
IPC分类号: G06F21/62 , G06F21/10 , H04L29/06 , H04N21/254 , H04N21/4627
摘要: Examples of the present disclosure relate to providing policy-protected file access. Some examples involve a configuration profile that includes a credential. The credential permits access to a policy-protected file. Once installed, the configuration profile causes the second credential to be accessible by a file management application of the client device, but inaccessible by a user of the client device. A file management application provides access to the policy-protected file based on the second credential.
-
公开(公告)号:US20190057219A1
公开(公告)日:2019-02-21
申请号:US16166446
申请日:2018-10-22
申请人: AirWatch LLC
IPC分类号: G06F21/62 , H04L29/06 , G06F21/10 , H04N21/254 , H04N21/4627
摘要: Examples of the present disclosure relate to providing policy-protected file access. Some examples involve a configuration profile that includes a credential. The credential permits access to a policy-protected file. Once installed, the configuration profile causes the second credential to be accessible by a file management application of the client device, but inaccessible by a user of the client device. A file management application provides access to the policy-protected file based on the second credential.
-
公开(公告)号:US10032044B2
公开(公告)日:2018-07-24
申请号:US14879114
申请日:2015-10-09
申请人: AIRWATCH LLC
摘要: Disclosed are various examples for multi-party authentication and authentication. In one example, a user who forgets a password can gain access to secured data stored by a managed device by way of an authorization by one or more other users. This access can be granted even if the managed device is in an off-line mode or if a management server cannot be reached. In another example, access to secured data can depend upon authorization by a minimum quantity of other users. The authorization can involve an explicit approval or disapproval. Alternatively, the authorization can correspond to the presence of the minimum quantity of other users within a threshold proximity of the user who desires access.
-
公开(公告)号:US11361101B2
公开(公告)日:2022-06-14
申请号:US16019847
申请日:2018-06-27
申请人: AirWatch LLC
摘要: Disclosed are various examples for multi-party authentication and authentication. In one example, a user can gain access to secured data stored by a managed device based on the presence of the minimum quantity of other users within a threshold proximity of the user who desires access.
-
公开(公告)号:US11076034B2
公开(公告)日:2021-07-27
申请号:US15417247
申请日:2017-01-27
申请人: AIRWATCH LLC
发明人: Sachin Vas , Sushilvas Vasavan
IPC分类号: G06F3/0484 , G06F3/0482 , G06F9/54 , H04M1/7243 , H04M1/72403 , G06F9/48 , H04L12/58
摘要: Disclosed are various embodiments for initiating execution of an application using trigger characters. A computing device detects an entry of a trigger character within a first user interface presented by a first application installed on the computing device. The computing device then identifies a string following the trigger character. The computing device then determines that the string matches a name of a second application installed on the computing device. The computing device then initiates execution of the second application. Subsequently, the computing device switches from the first user interface to a second user interface presented by the second application.
-
公开(公告)号:US11659076B2
公开(公告)日:2023-05-23
申请号:US17366455
申请日:2021-07-02
申请人: AirWatch LLC
发明人: Sachin Vas , Sushilvas Vasavan
IPC分类号: H04M1/72403 , H04L51/08 , H04M1/7243 , G06F9/48
CPC分类号: H04M1/72403 , G06F9/4843 , H04L51/08 , H04M1/7243
摘要: Disclosed are various embodiments for initiating execution of an application using trigger characters. In one embodiment, a computing device detects an entry of a trigger character in an input field of a first user interface presented by a first application. The input field is specified for detection of the individual trigger character based on a trigger rule for the first application. The computing device then identifies a string following the trigger character. The computing device then determines that the string matches a name of a second application installed on the computing device based on a list of applications installed on the computing device. The computing device then initiates execution of the second application. Subsequently, the computing device switches from the first user interface to a second user interface presented by the second application.
-
公开(公告)号:US10542045B2
公开(公告)日:2020-01-21
申请号:US15438787
申请日:2017-02-22
申请人: AIRWATCH LLC
摘要: The secure management of attachments is described. In one example, a message is received by a device management computing environment from a client computing device. The message can include an addressee list, a resource locator to a file, and a schedule associated with an event, for example. The message is intended for distribution to a number of other client devices along with the file according to the addressee list. However, the file is not directly attached to the message. Instead, the distribution of and access to the file is managed separately and securely by the device management computing environment. The device management computing environment can cause the file to be accessible through the client devices using the resource locator based on the schedule associated with the event. Further, after the event, the device management computing environment can cause the file to be inaccessible and/or removed from the client devices.
-
公开(公告)号:US10108809B2
公开(公告)日:2018-10-23
申请号:US14977648
申请日:2015-12-22
申请人: AIRWATCH LLC
IPC分类号: G06F21/62
摘要: Examples of the present disclosure relate to protecting files with an information rights policy. Files can be protected as specified by a content policy associated with the file. The content policy can specify whether the file should be protected while at rest on a device as well as when the file is shared with another user of an enterprise.
-
-
-
-
-
-
-
-
-