WO2004021114A3 - Enterprise-wide security system for computer devices - Google Patents

Enterprise-wide security system for computer devices Download PDF

Info

Publication number
WO2004021114A3
WO2004021114A3 PCT/US2003/026645 US0326645W WO2004021114A3 WO 2004021114 A3 WO2004021114 A3 WO 2004021114A3 US 0326645 W US0326645 W US 0326645W WO 2004021114 A3 WO2004021114 A3 WO 2004021114A3
Authority
WO
WIPO (PCT)
Prior art keywords
node
enterprise
security system
computer devices
computing node
Prior art date
Application number
PCT/US2003/026645
Other languages
French (fr)
Other versions
WO2004021114A2 (en
Inventor
Majid Shahbazi
Original Assignee
Td Security Inc Dba Trust Digi
Majid Shahbazi
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Td Security Inc Dba Trust Digi, Majid Shahbazi filed Critical Td Security Inc Dba Trust Digi
Priority to US10/527,235 priority Critical patent/US7669237B2/en
Priority to AU2003260071A priority patent/AU2003260071A1/en
Priority to EP03791770A priority patent/EP1540446A2/en
Publication of WO2004021114A2 publication Critical patent/WO2004021114A2/en
Publication of WO2004021114A3 publication Critical patent/WO2004021114A3/en
Priority to US11/441,049 priority patent/US7865938B2/en
Priority to US12/972,410 priority patent/US8341693B2/en
Priority to US13/630,830 priority patent/US8850530B2/en
Priority to US14/499,754 priority patent/US9998478B2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/084Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/086Access security using security domains
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Abstract

A system and method for securing data in mobile devices (104) includes a computing node (102) and a plurality of mobile devices (104). A node security program (202) executed in the computing node (102) interfaces with a device security program (204) executed at a mobile device (104). The computing node (102) is responsible for managing the security based on a node security profile (208) interpreted by a node security program (202) executed in the computing node (102). A device discovery method and arrangement (106) also detects and locates various information (120) about the mobile devices (104) based on a scan profile (206).
PCT/US2003/026645 2002-08-27 2003-08-27 Enterprise-wide security system for computer devices WO2004021114A2 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
US10/527,235 US7669237B2 (en) 2002-08-27 2003-08-27 Enterprise-wide security system for computer devices
AU2003260071A AU2003260071A1 (en) 2002-08-27 2003-08-27 Enterprise-wide security system for computer devices
EP03791770A EP1540446A2 (en) 2002-08-27 2003-08-27 Enterprise-wide security system for computer devices
US11/441,049 US7865938B2 (en) 2002-08-27 2006-05-26 Enterprise-wide security system for computer devices
US12/972,410 US8341693B2 (en) 2002-08-27 2010-12-17 Enterprise-wide security system for computer devices
US13/630,830 US8850530B2 (en) 2002-08-27 2012-09-28 Enterprise-wide security system for computer devices
US14/499,754 US9998478B2 (en) 2002-08-27 2014-09-29 Enterprise-wide security for computer devices

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US40603202P 2002-08-27 2002-08-27
US60/406,032 2002-08-27

Related Child Applications (3)

Application Number Title Priority Date Filing Date
US10/527,235 A-371-Of-International US7669237B2 (en) 2002-08-27 2003-08-27 Enterprise-wide security system for computer devices
US10527235 A-371-Of-International 2003-08-27
US11/441,049 Division US7865938B2 (en) 2002-08-27 2006-05-26 Enterprise-wide security system for computer devices

Publications (2)

Publication Number Publication Date
WO2004021114A2 WO2004021114A2 (en) 2004-03-11
WO2004021114A3 true WO2004021114A3 (en) 2004-05-13

Family

ID=31978258

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2003/026645 WO2004021114A2 (en) 2002-08-27 2003-08-27 Enterprise-wide security system for computer devices

Country Status (4)

Country Link
US (5) US7669237B2 (en)
EP (1) EP1540446A2 (en)
AU (1) AU2003260071A1 (en)
WO (1) WO2004021114A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8850530B2 (en) 2002-08-27 2014-09-30 Mcafee, Inc. Enterprise-wide security system for computer devices
US8935384B2 (en) 2010-05-06 2015-01-13 Mcafee Inc. Distributed data revocation using data commands

Families Citing this family (149)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7962622B2 (en) * 2001-08-07 2011-06-14 Motorola Mobility, Inc. System and method for providing provisioning and upgrade services for a wireless device
US7243163B1 (en) 2001-08-07 2007-07-10 Good Technology, Inc. System and method for full wireless synchronization of a data processing apparatus with a messaging system
US7788699B2 (en) * 2002-03-06 2010-08-31 Vir2Us, Inc. Computer and method for safe usage of documents, email attachments and other content that may contain virus, spy-ware, or malicious code
US7743158B2 (en) * 2002-12-04 2010-06-22 Ntt Docomo, Inc. Access network dynamic firewall
US7330763B1 (en) * 2003-04-30 2008-02-12 Advanced Neuromodulation Systems, Inc. Method for securing the operating system in a handheld medical device and apparatus
US9118711B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9118710B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc System, method, and computer program product for reporting an occurrence in different manners
US9118708B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Multi-path remediation
US8984644B2 (en) 2003-07-01 2015-03-17 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US20070113272A2 (en) 2003-07-01 2007-05-17 Securityprofiling, Inc. Real-time vulnerability monitoring
US9100431B2 (en) 2003-07-01 2015-08-04 Securityprofiling, Llc Computer program product and apparatus for multi-path remediation
US9350752B2 (en) 2003-07-01 2016-05-24 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9118709B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US8627489B2 (en) 2003-10-31 2014-01-07 Adobe Systems Incorporated Distributed document version control
US7930757B2 (en) * 2003-10-31 2011-04-19 Adobe Systems Incorporated Offline access in a document control system
EP1709556A4 (en) * 2003-12-23 2011-08-10 Trust Digital Llc System and method for enforcing a security policy on mobile devices using dynamically generated security profiles
US7167788B2 (en) * 2004-01-30 2007-01-23 United Technologies Corporation Dual-architecture microserver card
US7873646B2 (en) * 2004-02-25 2011-01-18 Research In Motion Limited Method for modifying notifications in an electronic device
US7398061B2 (en) * 2004-02-26 2008-07-08 Research In Motion Limited Method and apparatus for changing the behavior of an electronic device
US7698275B2 (en) * 2004-05-21 2010-04-13 Computer Associates Think, Inc. System and method for providing remediation management
US7760882B2 (en) * 2004-06-28 2010-07-20 Japan Communications, Inc. Systems and methods for mutual authentication of network nodes
US7725716B2 (en) 2004-06-28 2010-05-25 Japan Communications, Inc. Methods and systems for encrypting, transmitting, and storing electronic information and files
US7543144B2 (en) * 2004-07-21 2009-06-02 Beachhead Solutions System and method for lost data destruction of electronic data stored on portable electronic devices
US7421589B2 (en) * 2004-07-21 2008-09-02 Beachhead Solutions, Inc. System and method for lost data destruction of electronic data stored on a portable electronic device using a security interval
US7540016B2 (en) * 2004-07-21 2009-05-26 Beachhead Solutions, Inc. System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall
US20060150238A1 (en) * 2005-01-04 2006-07-06 Symbol Technologies, Inc. Method and apparatus of adaptive network policy management for wireless mobile computers
US20060184792A1 (en) * 2005-02-17 2006-08-17 Scalable Software Protecting computer systems from unwanted software
US8565726B2 (en) * 2008-11-06 2013-10-22 Mcafee, Inc. System, method and device for mediating connections between policy source servers, corporate repositories, and mobile devices
EP1866789B8 (en) * 2005-02-28 2020-04-15 McAfee, LLC Mobile data security system and methods
US20060205449A1 (en) * 2005-03-08 2006-09-14 Broadcom Corporation Mechanism for improved interoperability when content protection is used with an audio stream
US20060236364A1 (en) * 2005-03-31 2006-10-19 Nokia Corporation Policy based method, device, system and computer program for controlling external connection activity
US7516478B2 (en) * 2005-06-03 2009-04-07 Microsoft Corporation Remote management of mobile devices
US7970386B2 (en) 2005-06-03 2011-06-28 Good Technology, Inc. System and method for monitoring and maintaining a wireless device
US7734315B2 (en) * 2005-06-17 2010-06-08 Rathus Spencer A Wireless communication device management
US8923931B2 (en) 2005-06-17 2014-12-30 Marshall Feature Recognition Llc Wireless communication device management
US20060294580A1 (en) * 2005-06-28 2006-12-28 Yeh Frank Jr Administration of access to computer resources on a network
US8626128B2 (en) 2011-04-07 2014-01-07 Microsoft Corporation Enforcing device settings for mobile devices
US8010997B2 (en) * 2005-06-30 2011-08-30 Microsoft Corporation Enforcing device settings for mobile devices
US8832047B2 (en) 2005-07-27 2014-09-09 Adobe Systems Incorporated Distributed document version control
US8544058B2 (en) * 2005-12-29 2013-09-24 Nextlabs, Inc. Techniques of transforming policies to enforce control in an information management system
US8533338B2 (en) 2006-03-21 2013-09-10 Japan Communications, Inc. Systems and methods for providing secure communications for transactions
US8145200B2 (en) * 2006-07-31 2012-03-27 Research In Motion Limited Method and apparatus for configuring unique profile settings for multiple services
US20080027955A1 (en) * 2006-07-31 2008-01-31 May Darrell R System and method for storage and display of time-dependent events
US7730404B2 (en) * 2006-07-31 2010-06-01 Research In Motion Limited Electronic device and method of messaging meeting invitees
US20080026729A1 (en) * 2006-07-31 2008-01-31 Research In Motion Limited Method and apparatus for configuring unique profile settings for multiple services
US8949933B2 (en) * 2006-08-15 2015-02-03 International Business Machines Corporation Centralized management of technical records across an enterprise
US8259568B2 (en) 2006-10-23 2012-09-04 Mcafee, Inc. System and method for controlling mobile device access to a network
US9336387B2 (en) 2007-07-30 2016-05-10 Stroz Friedberg, Inc. System, method, and computer program product for detecting access to a memory device
US8505073B2 (en) * 2007-12-31 2013-08-06 United States Cellular Corporation Service utilization control manager
DE102008015344A1 (en) * 2008-03-20 2009-01-22 Daimler Ag Fuel i.e. hydrogen, cell system controlling method for supplying power to load system, involves forming fuel cell system for reaction of fuel with oxidant, where system is switchable between resting and operating conditions
US8769048B2 (en) 2008-06-18 2014-07-01 Commvault Systems, Inc. Data protection scheduling, such as providing a flexible backup window in a data protection system
US20100036845A1 (en) * 2008-08-07 2010-02-11 Research In Motion Limited System and Method for Negotiating the Access Control List of Data Items in an Ad-Hoc Network with Designated Owner Override Ability
US9882769B2 (en) * 2008-08-08 2018-01-30 Blackberry Limited System and method for registration of an agent to process management object updates
US8725688B2 (en) 2008-09-05 2014-05-13 Commvault Systems, Inc. Image level copy or restore, such as image level restore without knowledge of data object metadata
US9881284B2 (en) 2008-10-02 2018-01-30 ecoATM, Inc. Mini-kiosk for recycling electronic devices
US10853873B2 (en) 2008-10-02 2020-12-01 Ecoatm, Llc Kiosks for evaluating and purchasing used electronic devices and related technology
US11010841B2 (en) 2008-10-02 2021-05-18 Ecoatm, Llc Kiosk for recycling electronic devices
CA2926097C (en) * 2008-10-02 2020-11-10 ecoATM, Inc. Secondary market and vending system for devices
US7881965B2 (en) 2008-10-02 2011-02-01 ecoATM, Inc. Secondary market and vending system for devices
US20100088748A1 (en) * 2008-10-03 2010-04-08 Yoel Gluck Secure peer group network and method thereof by locking a mac address to an entity at physical layer
US20100088399A1 (en) * 2008-10-03 2010-04-08 Yoel Gluck Enterprise security setup with prequalified and authenticated peer group enabled for secure DHCP and secure ARP/RARP
US9043919B2 (en) 2008-10-21 2015-05-26 Lookout, Inc. Crawling multiple markets and correlating
US8621211B1 (en) 2008-10-24 2013-12-31 Juniper Networks, Inc. NETCONF/DMI-based secure network device discovery
US7607174B1 (en) 2008-12-31 2009-10-20 Kaspersky Lab Zao Adaptive security for portable information devices
US7584508B1 (en) 2008-12-31 2009-09-01 Kaspersky Lab Zao Adaptive security for information devices
US8739245B2 (en) * 2009-01-14 2014-05-27 Cisco Technology, Inc. Flexible supplicant access control
US20110055571A1 (en) * 2009-08-24 2011-03-03 Yoel Gluck Method and system for preventing lower-layer level attacks in a network
US8346305B2 (en) * 2009-09-25 2013-01-01 Intel Corporation Theft deterrent techniques and secure mobile platform subscription for wirelessly enabled mobile devices
US8806620B2 (en) * 2009-12-26 2014-08-12 Intel Corporation Method and device for managing security events
US9532222B2 (en) 2010-03-03 2016-12-27 Duo Security, Inc. System and method of notifying mobile devices to complete transactions after additional agent verification
US9544143B2 (en) 2010-03-03 2017-01-10 Duo Security, Inc. System and method of notifying mobile devices to complete transactions
US9552478B2 (en) 2010-05-18 2017-01-24 AO Kaspersky Lab Team security for portable information devices
EP4083813A1 (en) * 2010-06-25 2022-11-02 BlackBerry Limited Management of media files
US9122709B2 (en) * 2010-06-25 2015-09-01 Blackberry Limited Management of media files
US9147085B2 (en) 2010-09-24 2015-09-29 Blackberry Limited Method for establishing a plurality of modes of operation on a mobile device
US8869307B2 (en) * 2010-11-19 2014-10-21 Mobile Iron, Inc. Mobile posture-based policy, remediation and access control for enterprise resources
US20120151022A1 (en) * 2010-12-10 2012-06-14 Symbol Technologies, Inc. System and method for rapid staging of a mobile device
DE202012013245U1 (en) 2011-04-06 2015-09-14 ecoATM, Inc. Automat for recycling electronic devices
US20130039266A1 (en) 2011-08-08 2013-02-14 Research In Motion Limited System and method to increase link adaptation performance with multi-level feedback
US9467463B2 (en) 2011-09-02 2016-10-11 Duo Security, Inc. System and method for assessing vulnerability of a mobile device
US9344335B2 (en) 2011-09-09 2016-05-17 Microsoft Technology Licensing, Llc Network communication and cost awareness
US10165007B2 (en) 2011-09-15 2018-12-25 Microsoft Technology Licensing, Llc Securing data usage in computing devices
US20130086376A1 (en) * 2011-09-29 2013-04-04 Stephen Ricky Haynes Secure integrated cyberspace security and situational awareness system
US9077756B1 (en) * 2012-03-05 2015-07-07 Symantec Corporation Limiting external device access to mobile computing devices according to device type and connection context
US9407443B2 (en) 2012-06-05 2016-08-02 Lookout, Inc. Component analysis of software applications on computing devices
US9589129B2 (en) 2012-06-05 2017-03-07 Lookout, Inc. Determining source of side-loaded software
US9015793B2 (en) * 2012-12-21 2015-04-21 Mcafee, Inc. Hardware management interface
US9419953B2 (en) 2012-12-23 2016-08-16 Mcafee, Inc. Trusted container
US9208215B2 (en) 2012-12-27 2015-12-08 Lookout, Inc. User classification based on data gathered from a computing device
US9633216B2 (en) 2012-12-27 2017-04-25 Commvault Systems, Inc. Application of information management policies based on operation with a geographic entity
US9245128B2 (en) 2013-03-06 2016-01-26 Microsoft Technology Licensing, Llc Limiting enterprise applications and settings on devices
US9361083B2 (en) 2013-03-06 2016-06-07 Microsoft Technology Licensing, Llc Enterprise management for devices
US9459968B2 (en) 2013-03-11 2016-10-04 Commvault Systems, Inc. Single index to query multiple backup formats
US9998536B2 (en) * 2013-05-29 2018-06-12 Microsoft Technology Licensing, Llc Metered network synchronization
US9418222B1 (en) * 2013-09-27 2016-08-16 Symantec Corporation Techniques for detecting advanced security threats
US9642008B2 (en) 2013-10-25 2017-05-02 Lookout, Inc. System and method for creating and assigning a policy for a mobile communications device based on personal data
US9973534B2 (en) 2013-11-04 2018-05-15 Lookout, Inc. Methods and systems for secure network connections
US9754117B2 (en) 2014-02-24 2017-09-05 Northcross Group Security management system
US10169121B2 (en) 2014-02-27 2019-01-01 Commvault Systems, Inc. Work flow management for an information management system
US10645157B2 (en) * 2014-03-31 2020-05-05 Google Llc Content synchronization using profiles
US9432369B2 (en) * 2014-04-16 2016-08-30 Bank Of America Corporation Secure data containers
US9378384B2 (en) 2014-04-16 2016-06-28 Bank Of America Corporation Secure endpoint file export in a business environment
US9430674B2 (en) 2014-04-16 2016-08-30 Bank Of America Corporation Secure data access
US9740574B2 (en) 2014-05-09 2017-08-22 Commvault Systems, Inc. Load balancing across multiple data paths
US11249858B2 (en) 2014-08-06 2022-02-15 Commvault Systems, Inc. Point-in-time backups of a production application made accessible over fibre channel and/or ISCSI as data sources to a remote application by representing the backups as pseudo-disks operating apart from the production application and its host
US9852026B2 (en) 2014-08-06 2017-12-26 Commvault Systems, Inc. Efficient application recovery in an information management system based on a pseudo-storage-device driver
KR20160025283A (en) * 2014-08-27 2016-03-08 삼성전자주식회사 Computing device and system for providing pull printing using mobile terminal, and pull printing method using mobile terminal
US10284386B2 (en) * 2014-08-28 2019-05-07 Maxlinear, Inc. Method and apparatus for providing a high security mode in a network
US10401411B2 (en) 2014-09-29 2019-09-03 Ecoatm, Llc Maintaining sets of cable components used for wired analysis, charging, or other interaction with portable electronic devices
ES2870629T3 (en) 2014-10-02 2021-10-27 Ecoatm Llc App for device evaluation and other processes associated with device recycling
WO2016053378A1 (en) 2014-10-02 2016-04-07 ecoATM, Inc. Wireless-enabled kiosk for recycling consumer devices
US10445708B2 (en) 2014-10-03 2019-10-15 Ecoatm, Llc System for electrically testing mobile devices at a consumer-operated kiosk, and associated devices and methods
WO2016069742A1 (en) 2014-10-31 2016-05-06 ecoATM, Inc. Methods and systems for facilitating processes associated with insurance services and/or other services for electronic devices
EP3968255A1 (en) 2014-10-31 2022-03-16 ecoATM, LLC Systems and methods for recycling consumer electronic devices
CA2967021C (en) 2014-11-06 2024-03-12 ecoATM, Inc. Methods and systems for evaluating and recycling electronic devices
WO2016094789A1 (en) 2014-12-12 2016-06-16 ecoATM, Inc. Systems and methods for recycling consumer electronic devices
US11171941B2 (en) * 2015-02-24 2021-11-09 Nelson A. Cicchitto Mobile device enabled desktop tethered and tetherless authentication
US10848485B2 (en) 2015-02-24 2020-11-24 Nelson Cicchitto Method and apparatus for a social network score system communicably connected to an ID-less and password-less authentication system
US11122034B2 (en) 2015-02-24 2021-09-14 Nelson A. Cicchitto Method and apparatus for an identity assurance score with ties to an ID-less and password-less authentication system
AU2016258533B2 (en) 2015-05-01 2017-11-30 Lookout, Inc. Determining source of side-loaded software
ES2758755T3 (en) 2015-06-01 2020-05-06 Duo Security Inc Method of applying endpoint health standards
US10135871B2 (en) 2015-06-12 2018-11-20 Accenture Global Solutions Limited Service oriented software-defined security framework
US9766825B2 (en) 2015-07-22 2017-09-19 Commvault Systems, Inc. Browse and restore for block-level backups
US10296368B2 (en) 2016-03-09 2019-05-21 Commvault Systems, Inc. Hypervisor-independent block-level live browse for access to backed up virtual machine (VM) data and hypervisor-free file-level recovery (block-level pseudo-mount)
US10127647B2 (en) 2016-04-15 2018-11-13 Ecoatm, Llc Methods and systems for detecting cracks in electronic devices
US10440053B2 (en) 2016-05-31 2019-10-08 Lookout, Inc. Methods and systems for detecting and preventing network connection compromise
US9885672B2 (en) 2016-06-08 2018-02-06 ecoATM, Inc. Methods and systems for detecting screen covers on electronic devices
US10269110B2 (en) 2016-06-28 2019-04-23 Ecoatm, Llc Methods and systems for detecting cracks in illuminated electronic device screens
US10009344B2 (en) 2016-06-29 2018-06-26 Duo Security, Inc. Systems and methods for endpoint management classification
US10097996B2 (en) 2016-08-01 2018-10-09 At&T Intellectual Property I, L.P. Method and system to dynamically authenticate and grant access to non-trusted anonymous Wi-Fi
US11044240B2 (en) 2016-08-01 2021-06-22 At&T Intellectual Property I, L.P. Method and system to manage access to a wireless local area network
US10740193B2 (en) 2017-02-27 2020-08-11 Commvault Systems, Inc. Hypervisor-independent reference copies of virtual machine payload data based on block-level pseudo-mount
US10891069B2 (en) 2017-03-27 2021-01-12 Commvault Systems, Inc. Creating local copies of data stored in online data repositories
US10218697B2 (en) 2017-06-09 2019-02-26 Lookout, Inc. Use of device risk evaluation to manage access to services
US10664352B2 (en) 2017-06-14 2020-05-26 Commvault Systems, Inc. Live browsing of backed up data residing on cloned disks
US10412113B2 (en) 2017-12-08 2019-09-10 Duo Security, Inc. Systems and methods for intelligently configuring computer security
US11122071B2 (en) 2018-06-29 2021-09-14 Forescout Technologies, Inc. Visibility and scanning of a variety of entities
US10460330B1 (en) 2018-08-09 2019-10-29 Capital One Services, Llc Intelligent face identification
US10762214B1 (en) * 2018-11-05 2020-09-01 Harbor Labs Llc System and method for extracting information from binary files for vulnerability database queries
US11658962B2 (en) 2018-12-07 2023-05-23 Cisco Technology, Inc. Systems and methods of push-based verification of a transaction
US10860443B2 (en) 2018-12-10 2020-12-08 Commvault Systems, Inc. Evaluation and reporting of recovery readiness in a data storage management system
CA3130102A1 (en) 2019-02-12 2020-08-20 Ecoatm, Llc Kiosk for evaluating and purchasing used electronic devices
EP3924917A1 (en) 2019-02-12 2021-12-22 ecoATM, LLC Connector carrier for electronic device kiosk
JP2021530793A (en) 2019-02-18 2021-11-11 エコエーティーエム, エルエルシー Neural networks based on physical state assessment of electronic devices, and associated systems and methods
US20200379946A1 (en) * 2019-05-30 2020-12-03 Apple Inc. Device, method, and graphical user interface for migrating data to a first device during a new device set-up workflow
US11308034B2 (en) 2019-06-27 2022-04-19 Commvault Systems, Inc. Continuously run log backup with minimal configuration and resource usage from the source machine
WO2021121574A1 (en) * 2019-12-18 2021-06-24 Huawei Technologies Co., Ltd. Executing security negotiation for network configuration
US11922467B2 (en) 2020-08-17 2024-03-05 ecoATM, Inc. Evaluating an electronic device using optical character recognition
US20230168877A1 (en) * 2021-11-29 2023-06-01 International Business Machines Corporation Upgrading operating software ("os") for devices in a multi-device ecosystem

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010041576A1 (en) * 2000-04-06 2001-11-15 I'anson Colin Deriving location information about a communicating entity
US20020032853A1 (en) * 2000-04-17 2002-03-14 Preston Dan A. Secure dynamic link allocation system for mobile data communication
US20030140246A1 (en) * 2002-01-18 2003-07-24 Palm, Inc. Location based security modification system and method

Family Cites Families (145)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1496984A (en) 1975-12-03 1978-01-05 Diebold Inc Automatic banking equipment
EP0661677A3 (en) 1993-12-28 1995-12-20 Eastman Kodak Co Method and apparatus for customer identification at automated teller machines.
US5884323A (en) 1995-10-13 1999-03-16 3Com Corporation Extendible method and apparatus for synchronizing files on two different computer systems
US5727202A (en) 1995-10-18 1998-03-10 Palm Computing, Inc. Method and apparatus for synchronizing information on two different computer systems
US5864757A (en) 1995-12-12 1999-01-26 Bellsouth Corporation Methods and apparatus for locking communications devices
US6026165A (en) 1996-06-20 2000-02-15 Pittway Corporation Secure communications in a wireless system
US5807175A (en) 1997-01-15 1998-09-15 Microsoft Corporation Dynamic detection of player actuated digital input devices coupled to a computer port
US6006274A (en) 1997-01-30 1999-12-21 3Com Corporation Method and apparatus using a pass through personal computer connected to both a local communication link and a computer network for indentifying and synchronizing a preferred computer with a portable computer
US6073142A (en) 1997-06-23 2000-06-06 Park City Group Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments
US6317868B1 (en) * 1997-10-24 2001-11-13 University Of Washington Process for transparently enforcing protection domains and access control as well as auditing operations in software components
US5987610A (en) 1998-02-12 1999-11-16 Ameritech Corporation Computer virus screening methods and systems
US6393461B1 (en) * 1998-02-27 2002-05-21 Fujitsu Limited Communication management system for a chat system
CN1359487A (en) 1998-09-17 2002-07-17 英戴克系统公司 Apparatus and methods for unlocking password protected software systems to recover master password
US6360322B1 (en) 1998-09-28 2002-03-19 Symantec Corporation Automatic recovery of forgotten passwords
US7136645B2 (en) * 1998-10-09 2006-11-14 Netmotion Wireless, Inc. Method and apparatus for providing mobile and other intermittent connectivity in a computing environment
US6158010A (en) 1998-10-28 2000-12-05 Crosslogix, Inc. System and method for maintaining security in a distributed computer network
US20010039624A1 (en) 1998-11-24 2001-11-08 Kellum Charles W. Processes systems and networks for secured information exchange using computer hardware
US6694434B1 (en) 1998-12-23 2004-02-17 Entrust Technologies Limited Method and apparatus for controlling program execution and program distribution
JP3833409B2 (en) * 1999-02-05 2006-10-11 株式会社日立製作所 Communication proxy device
GB9907514D0 (en) 1999-04-01 1999-05-26 Ncr Int Inc Self service terminal
US6678827B1 (en) * 1999-05-06 2004-01-13 Watchguard Technologies, Inc. Managing multiple network security devices from a manager device
US6466660B1 (en) * 1999-05-14 2002-10-15 Sun Microsystems, Inc. Method and apparatus for retroactively updating a communication billing system
US6678835B1 (en) 1999-06-10 2004-01-13 Alcatel State transition protocol for high availability units
JP2001022716A (en) 1999-07-09 2001-01-26 Nec Corp Communication service providing system
US6301484B1 (en) 1999-08-31 2001-10-09 Qualcomm Incorporated Method and apparatus for remote activation of wireless device features using short message services (SMS)
EP1216587B1 (en) 1999-10-01 2006-06-21 Swisscom Mobile AG Method for verifying in a mobile device the authenticity of electronic certificates issued by a certification authority and corresponding identification module
US6460050B1 (en) 1999-12-22 2002-10-01 Mark Raymond Pace Distributed content identification system
US6684244B1 (en) 2000-01-07 2004-01-27 Hewlett-Packard Development Company, Lp. Aggregated policy deployment and status propagation in network management systems
US6839766B1 (en) 2000-01-14 2005-01-04 Cisco Technology, Inc. Method and apparatus for communicating cops protocol policies to non-cops-enabled network devices
US6973488B1 (en) 2000-03-31 2005-12-06 Intel Corporation Providing policy information to a remote device
US20020093527A1 (en) 2000-06-16 2002-07-18 Sherlock Kieran G. User interface for a security policy system and method
US6897885B1 (en) * 2000-06-19 2005-05-24 Hewlett-Packard Development Company, L.P. Invisible link visualization method and system in a hyperbolic space
US6901519B1 (en) 2000-06-22 2005-05-31 Infobahn, Inc. E-mail virus protection system and method
US7249369B2 (en) * 2000-07-10 2007-07-24 Oracle International Corporation Post data processing
US7194689B2 (en) 2000-08-22 2007-03-20 Microsoft Corporation Generic user control point tool for universal plug and play (UPnP) devices
GB2366691B (en) 2000-08-31 2002-11-06 F Secure Oyj Wireless device management
US7136907B1 (en) * 2000-10-19 2006-11-14 International Business Machines Corporation Method and system for informing an operating system in a system area network when a new device is connected
US7428583B1 (en) 2000-10-31 2008-09-23 Intel Corporation Network policy distribution
EP1340167A2 (en) 2000-11-28 2003-09-03 4thPass Inc. Method and system for maintaining and distributing wireless applications
US6766165B2 (en) * 2000-12-05 2004-07-20 Nortel Networks Limited Method and system for remote and local mobile network management
US6954790B2 (en) 2000-12-05 2005-10-11 Interactive People Unplugged Ab Network-based mobile workgroup system
US20020083342A1 (en) * 2000-12-21 2002-06-27 Webb Brian T. Systems, methods and computer program products for accessing devices on private networks via clients on a public network
US6798757B2 (en) 2001-01-11 2004-09-28 Hitachi, Ltd. Establishing a route with a level of quality of service in a mobile network
US7089592B2 (en) 2001-03-15 2006-08-08 Brighterion, Inc. Systems and methods for dynamic detection and prevention of electronic fraud
US7003562B2 (en) 2001-03-27 2006-02-21 Redseal Systems, Inc. Method and apparatus for network wide policy-based analysis of configurations of devices
US7003578B2 (en) 2001-04-26 2006-02-21 Hewlett-Packard Development Company, L.P. Method and system for controlling a policy-based network
WO2002097587A2 (en) * 2001-05-31 2002-12-05 Internet Security Systems, Inc. Method and system for implementing security devices in a network
AU2002310341A1 (en) 2001-06-07 2002-12-16 Unwired Express, Inc. Method and system for providing context awareness
US7546629B2 (en) * 2002-03-06 2009-06-09 Check Point Software Technologies, Inc. System and methodology for security policy arbitration
US7222359B2 (en) * 2001-07-27 2007-05-22 Check Point Software Technologies, Inc. System methodology for automatic local network discovery and firewall reconfiguration for mobile computing devices
US20030028651A1 (en) 2001-07-31 2003-02-06 Schreckengast James O. Proprietary information utility
US7596565B2 (en) 2001-08-07 2009-09-29 Good Technology System and method for maintaining wireless file folders at a wireless device
US20030037129A1 (en) 2001-08-14 2003-02-20 Smartpipes, Incorporated Modular remote network policy management system
US6986160B1 (en) * 2001-08-31 2006-01-10 Mcafee, Inc. Security scanning system and method utilizing generic IP addresses
EP1451702A4 (en) 2001-09-28 2009-11-11 Fiberlink Comm Corp Client-side network access polices and management applications
US7317699B2 (en) 2001-10-26 2008-01-08 Research In Motion Limited System and method for controlling configuration settings for mobile communication devices and services
AU2002346574A1 (en) 2001-11-27 2003-06-10 Accenture Llp Service control architecture
US6661780B2 (en) 2001-12-07 2003-12-09 Nokia Corporation Mechanisms for policy based UMTS QoS and IP QoS management in mobile IP networks
US20030130953A1 (en) 2002-01-09 2003-07-10 Innerpresence Networks, Inc. Systems and methods for monitoring the presence of assets within a system and enforcing policies governing assets
US7024214B2 (en) 2002-02-26 2006-04-04 Microsoft Corporation Synchronizing over a number of synchronization mechanisms using flexible rules
WO2003090492A1 (en) 2002-04-16 2003-10-30 Mobile Operandi Communications Corp. Method and system of over-the-air activation and modification of a mobile phone
AU2003221742A1 (en) * 2002-04-19 2003-11-03 Computer Associates Think, Inc. System and method for managing wireless devices in an enterprise
GB2388275B (en) 2002-04-30 2005-11-02 Hewlett Packard Co Wireless data network security
CA2387328C (en) 2002-05-24 2012-01-03 Diversinet Corp. Mobile terminal system
US7747730B1 (en) 2002-06-28 2010-06-29 Netfuel, Inc. Managing computer network resources
AU2003242968A1 (en) 2002-07-16 2004-02-02 Haim Engler Automated network security system and method
US20040022258A1 (en) 2002-07-30 2004-02-05 Docomo Communications Laboratories Usa, Inc. System for providing access control platform service for private networks
AU2003260071A1 (en) 2002-08-27 2004-03-19 Td Security, Inc., Dba Trust Digital, Llc Enterprise-wide security system for computer devices
KR20040021744A (en) 2002-09-04 2004-03-11 삼성전자주식회사 Method for processing information and data in mobile telephone
US20060190984A1 (en) 2002-09-23 2006-08-24 Credant Technologies, Inc. Gatekeeper architecture/features to support security policy maintenance and distribution
US7665118B2 (en) 2002-09-23 2010-02-16 Credant Technologies, Inc. Server, computer memory, and method to support security policy maintenance and distribution
US7448067B2 (en) 2002-09-30 2008-11-04 Intel Corporation Method and apparatus for enforcing network security policies
US7242676B2 (en) 2002-10-17 2007-07-10 Herman Rao Wireless LAN authentication, authorization, and accounting system and method utilizing a telecommunications network
US7308706B2 (en) 2002-10-28 2007-12-11 Secure Computing Corporation Associative policy model
US7827607B2 (en) 2002-11-27 2010-11-02 Symantec Corporation Enhanced client compliancy using database of security sensor data
US7308703B2 (en) 2002-12-18 2007-12-11 Novell, Inc. Protection of data accessible by a mobile device
US7526800B2 (en) 2003-02-28 2009-04-28 Novell, Inc. Administration of protection of data accessible by a mobile device
AU2003299729A1 (en) 2002-12-18 2004-07-14 Senforce Technologies, Inc. Methods and apparatus for administration of policy based protection of data accessible by a mobile device
US7631089B2 (en) 2002-12-31 2009-12-08 Intel Corporation System for device-access policy enforcement
US7233664B2 (en) 2003-03-13 2007-06-19 New Mexico Technical Research Foundation Dynamic security authentication for wireless communication networks
FR2854303A1 (en) 2003-04-23 2004-10-29 France Telecom METHOD FOR SECURING A MOBILE TERMINAL AND METHOD APPLICATIONS, THE EXECUTION OF APPLICATIONS REQUIRING A HIGH SECURITY LEVEL
US7142851B2 (en) 2003-04-28 2006-11-28 Thomson Licensing Technique for secure wireless LAN access
US7103772B2 (en) 2003-05-02 2006-09-05 Giritech A/S Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers
US7591017B2 (en) 2003-06-24 2009-09-15 Nokia Inc. Apparatus, and method for implementing remote client integrity verification
US20050167405A1 (en) * 2003-08-11 2005-08-04 Richard Stoltz Optical ablation using material composition analysis
US7386888B2 (en) 2003-08-29 2008-06-10 Trend Micro, Inc. Network isolation techniques suitable for virus protection
US20050097199A1 (en) 2003-10-10 2005-05-05 Keith Woodard Method and system for scanning network devices
US7269653B2 (en) 2003-11-07 2007-09-11 Hewlett-Packard Development Company, L.P. Wireless network communications methods, communications device operational methods, wireless networks, configuration devices, communications systems, and articles of manufacture
GB0329502D0 (en) 2003-12-19 2004-01-28 Nokia Corp Control decisions in a communication system
EP1709556A4 (en) 2003-12-23 2011-08-10 Trust Digital Llc System and method for enforcing a security policy on mobile devices using dynamically generated security profiles
US10375023B2 (en) 2004-02-20 2019-08-06 Nokia Technologies Oy System, method and computer program product for accessing at least one virtual private network
US20050203881A1 (en) 2004-03-09 2005-09-15 Akio Sakamoto Database user behavior monitor system and method
EP1745589B1 (en) 2004-04-30 2014-07-16 BlackBerry Limited System and method for configuring devices for secure operations
AU2005239005A1 (en) 2004-04-30 2005-11-10 Research In Motion Limited System and method for handling data transfers
US20050268326A1 (en) 2004-05-04 2005-12-01 Microsoft Corporation Checking the security of web services configurations
US7559080B2 (en) 2004-05-04 2009-07-07 Microsoft Corporation Automatically generating security policies for web services
US8073911B2 (en) 2004-05-12 2011-12-06 Bluespace Software Corporation Enforcing compliance policies in a messaging system
US7526792B2 (en) 2004-06-09 2009-04-28 Intel Corporation Integration of policy compliance enforcement and device authentication
US7760882B2 (en) 2004-06-28 2010-07-20 Japan Communications, Inc. Systems and methods for mutual authentication of network nodes
US7945945B2 (en) 2004-08-06 2011-05-17 Enterasys Networks, Inc. System and method for address block enhanced dynamic network policy management
US8799242B2 (en) 2004-10-08 2014-08-05 Truecontext Corporation Distributed scalable policy based content management
US9032192B2 (en) 2004-10-28 2015-05-12 Broadcom Corporation Method and system for policy based authentication
US7389432B2 (en) * 2004-11-10 2008-06-17 Microsoft Corporation Advanced power management for computer displays
US7346340B2 (en) 2004-12-23 2008-03-18 Spyder Navigations L.L.C. Provision of user policy to terminal
EP1842140A4 (en) 2005-01-19 2012-01-04 Truecontext Corp Policy-driven mobile forms applications
WO2006085320A1 (en) 2005-02-11 2006-08-17 Trisixty Security Inc. System and method for network policy management
US7606797B2 (en) 2005-02-24 2009-10-20 Kaboodle, Inc. Reverse value attribute extraction
US20110167470A1 (en) 2005-02-28 2011-07-07 Trust Digital, Llc Mobile data security system and methods
US8565726B2 (en) 2008-11-06 2013-10-22 Mcafee, Inc. System, method and device for mediating connections between policy source servers, corporate repositories, and mobile devices
EP1866789B8 (en) 2005-02-28 2020-04-15 McAfee, LLC Mobile data security system and methods
US7516478B2 (en) 2005-06-03 2009-04-07 Microsoft Corporation Remote management of mobile devices
US8010997B2 (en) 2005-06-30 2011-08-30 Microsoft Corporation Enforcing device settings for mobile devices
US7933584B2 (en) 2005-10-15 2011-04-26 Huawei Technologies Co., Ltd. Method for implementing security update of mobile station and a correlative reacting system
WO2007053848A1 (en) 2005-11-01 2007-05-10 Mobile Armor, Llc Centralized dynamic security control for a mobile device network
SE529490C2 (en) 2005-12-19 2007-08-28 Smarttrust Ab Procedure and system for formatting provisioning content in a mobile device management system
US8156566B2 (en) 2005-12-29 2012-04-10 Nextlabs, Inc. Associating code to a target through code inspection
US8544058B2 (en) 2005-12-29 2013-09-24 Nextlabs, Inc. Techniques of transforming policies to enforce control in an information management system
KR101359324B1 (en) 2006-03-27 2014-02-24 텔레콤 이탈리아 소시에떼 퍼 아찌오니 System for enforcing security policies on mobile communications devices
US8607300B2 (en) 2006-07-18 2013-12-10 Genband Us Llc Network security policy mediation
US9111088B2 (en) 2006-08-14 2015-08-18 Quantum Security, Inc. Policy-based physical security system for restricting access to computer resources and data flow through network equipment
US8903365B2 (en) 2006-08-18 2014-12-02 Ca, Inc. Mobile device management
US20080052383A1 (en) 2006-08-25 2008-02-28 Gpxs Holding Ltd. System and method for mobile device application management
US7933611B2 (en) 2006-09-01 2011-04-26 Research In Motion Limited Disabling operation of features on a handheld mobile communication device based upon location
US8000692B2 (en) 2006-09-19 2011-08-16 Microsoft Corporation Mobile device manners propagation and compliance
US8095124B2 (en) 2006-10-20 2012-01-10 Verizon Patent And Licensing Inc. Systems and methods for managing and monitoring mobile data, content, access, and usage
US8259568B2 (en) 2006-10-23 2012-09-04 Mcafee, Inc. System and method for controlling mobile device access to a network
US7971232B2 (en) 2006-10-30 2011-06-28 Microsoft Corporation Setting group policy by device ownership
US8104080B2 (en) 2007-01-26 2012-01-24 Microsoft Corporation Universal schema for representing management policy
US20080184277A1 (en) 2007-01-26 2008-07-31 Microsoft Corporation Systems management policy validation, distribution and enactment
US20080184200A1 (en) 2007-01-26 2008-07-31 Microsoft Corporation Software configuration policies' validation, distribution, and enactment
US20080222707A1 (en) 2007-03-07 2008-09-11 Qualcomm Incorporated Systems and methods for controlling service access on a wireless communication device
US7853998B2 (en) 2007-03-22 2010-12-14 Mocana Corporation Firewall propagation
US20110004913A1 (en) 2007-07-31 2011-01-06 Symbol Technologies, Inc. Architecture for seamless enforcement of security policies when roaming across ip subnets in ieee 802.11 wireless networks
US20090049518A1 (en) 2007-08-08 2009-02-19 Innopath Software, Inc. Managing and Enforcing Policies on Mobile Devices
US8375136B2 (en) 2007-08-08 2013-02-12 Innopath Software, Inc. Defining and implementing policies on managed object-enabled mobile devices
US8516539B2 (en) 2007-11-09 2013-08-20 Citrix Systems, Inc System and method for inferring access policies from access event records
US8862657B2 (en) 2008-01-25 2014-10-14 Seven Networks, Inc. Policy based content service
US20090228868A1 (en) * 2008-03-04 2009-09-10 Max Drukman Batch configuration of multiple target devices
US8935741B2 (en) 2008-04-17 2015-01-13 iAnywhere Solutions, Inc Policy enforcement in mobile devices
US8041346B2 (en) 2008-05-29 2011-10-18 Research In Motion Limited Method and system for establishing a service relationship between a mobile communication device and a mobile data server for connecting to a wireless network
US8321526B2 (en) 2009-01-28 2012-11-27 Headwater Partners I, Llc Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account
WO2010016849A1 (en) 2008-08-08 2010-02-11 Innopath Software, Inc. Intelligent mobile device management client
US8931033B2 (en) 2008-12-12 2015-01-06 Microsoft Corporation Integrating policies from a plurality of disparate management agents
US8935384B2 (en) 2010-05-06 2015-01-13 Mcafee Inc. Distributed data revocation using data commands
US8447986B2 (en) 2010-06-23 2013-05-21 Microsoft Corporation Accessing restricted content based on proximity

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010041576A1 (en) * 2000-04-06 2001-11-15 I'anson Colin Deriving location information about a communicating entity
US20020032853A1 (en) * 2000-04-17 2002-03-14 Preston Dan A. Secure dynamic link allocation system for mobile data communication
US20030140246A1 (en) * 2002-01-18 2003-07-24 Palm, Inc. Location based security modification system and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8850530B2 (en) 2002-08-27 2014-09-30 Mcafee, Inc. Enterprise-wide security system for computer devices
US8935384B2 (en) 2010-05-06 2015-01-13 Mcafee Inc. Distributed data revocation using data commands

Also Published As

Publication number Publication date
US20110162049A1 (en) 2011-06-30
US8341693B2 (en) 2012-12-25
AU2003260071A8 (en) 2004-03-19
US20130047219A1 (en) 2013-02-21
US7669237B2 (en) 2010-02-23
US7865938B2 (en) 2011-01-04
US20060112427A1 (en) 2006-05-25
EP1540446A2 (en) 2005-06-15
US8850530B2 (en) 2014-09-30
AU2003260071A1 (en) 2004-03-19
US9998478B2 (en) 2018-06-12
US20070186275A1 (en) 2007-08-09
WO2004021114A2 (en) 2004-03-11
US20150106924A1 (en) 2015-04-16

Similar Documents

Publication Publication Date Title
WO2004021114A3 (en) Enterprise-wide security system for computer devices
WO2003012635A3 (en) A device configuration and management development system
AU2003297465A1 (en) Information communication system, information communication device, information communication method, and computer program
WO2003028343A3 (en) Communication system for location sensitive information and method therefor
WO2005078645A3 (en) System and method of using rfid devices to analyze customer traffic patterns in order to improve a merchant's layout
WO2004006536A3 (en) Method of preventing unauthorized distribution and use of electronic keys using a key seed
WO2004003911A3 (en) Removable memory information management
WO2003062959A3 (en) Systems and methods for inventory management
WO2002017075A3 (en) A method of enabling a wireless information device to access data services
AU2002253354A1 (en) Method, system, and program for querying data in a personal information manager database
AU2003277508A1 (en) Learning/thinking machine and learning/thinking method based on structured knowledge, computer system, and information generation method
WO2004010249A3 (en) System and method for utilizing profile information
WO2005022291A3 (en) Method and system for management of electronic receipts on portable devices
WO2004013734A3 (en) Method and system for executing applications on a mobile device
MXPA03003684A (en) Portable data acquisition and management system and associated device and method.
WO2003104960A3 (en) Temporary communication areas for a computer user interface
AU2002321885A1 (en) Patient point-of-care computer system
AU2003282749A1 (en) Method and system for facilitating data access and management on a secure token
AU3512800A (en) System, method and computer program product for allowing access to enterprise resources using biometric devices
AU2003301359A1 (en) System and method for providing computer upgrade information
AU6179800A (en) Education/training management system, training management computer, class attendee terminal device, manager terminal device, education/training management method
EP1335305A3 (en) Algorithm for dynamic selection of data locking granularity
WO2003081467A3 (en) Synchronizing users on shared data with locks
WO2004044738A3 (en) Techniques for supporting application-specific access controls with a separate server
WO2004008283A3 (en) Repository-independent system and method for asset management and reconciliation

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2003791770

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2003791770

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2006112427

Country of ref document: US

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 10527235

Country of ref document: US

WWP Wipo information: published in national office

Ref document number: 10527235

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP