Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Airwatch Llc patents


Recent patent applications related to Airwatch Llc. Airwatch Llc is listed as an Agent/Assignee. Note: Airwatch Llc may have other listings under different names/spellings. We're not affiliated with Airwatch Llc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "A" | Airwatch Llc-related inventors


 new patent  Controlling access to resources on a network

Disclosed are various embodiments for controlling access to data on a network. Upon receiving a request comprising a device identifier and at least one user credential to access a remote resource, the request may be authenticated according to at least one compliance policy. If the request is authenticated, a resource... Airwatch Llc

Public key pinning for private networks

Disclosed are various approaches for validating public keys pinned to services or servers on private networks. A client device can request a first certificate from a trust service. The client device can then validate that the first certificate from the trust service is signed by a preinstalled certificate stored on... Airwatch Llc

Architecture for performing actions in a third-party service by an email client

Disclosed are various approaches performing actions on data items in a third-party service with a network-accessible application programming interface from an email client. The email client can perform an action as specified by an email service profile, which specifies how to identify the email message, the data item and how... Airwatch Llc

Auto tuning data anomaly detection

Automatic tuning anomaly detection is described. The context metric keys are established during a training phase based on the surrounding context of data received from devices over time. Anomaly and tuning windows are also established for metric ranges of the context metric keys. After the training phase, incoming data is... Airwatch Llc

Architecture for performing actions in a third-party service by an email client

Disclosed are various approaches performing actions on data items in a third-party service with a network-accessible application programming interface from an email client. The email client can perform an action as specified fey an email service profile, which specifies how to identify the email message, the data item and how... Airwatch Llc

Determining a device posture using a device posture token

Disclosed are various approaches for generating a device posture token corresponding to a client device. The device posture token can be used by a verification computing device to determine whether the client device complies with the security policies of a particular facility.... Airwatch Llc

Continuous sensitive content authentication

Continuous sensitive content authentication is described. In one example, a request to open content, such as a photograph, spreadsheet, or text-based document, among other types of content, is received. Based on a sensitivity level or access profile rule associated with the content, an individual can be prompted to perform an... Airwatch Llc

Taking bulk actions on items in a user interface

Disclosed are various approaches for generating a user interface in which data items are grouped together. Additionally, a bulk action can be taken by a user on a grouping of data items within the user interface. An example of such a user interface can be within an email client used... Airwatch Llc

Secure demand-driven file distribution

Computer networks for secure demand-driven file distribution are described. In one example, a client device receives a notification to check in for updates. In response, the client device checks in with a device services computing device on a computer network. The device services computing device determines a path list to... Airwatch Llc

Remote providisioning and enrollment of enterprise devices with on-premises domain controllers

An agent application executing on a client device retrieves an execute command from a command queue managed by a server and retrieves certificates and configuration settings for establishing a virtual private network (VPN) connection. An enrollment application resident on the client device executes in response to the execute command to... Airwatch Llc

Silent upgrade of software with dependencies

Disclosed are various examples for the silent upgrade of software and its dependencies on a client device. A client device can identify that a new version of the client application is available that upgrades a current version of the client application to the new version and download an installation package... Airwatch Llc

Remote data securement on mobile devices

A server determines a status of a client device, wherein if the client device violates the compliance rule, the server accesses a device record established by the server for the client device. The device record comprises data specifying an operating system executing on the client device. The server determines whether... Airwatch Llc

Systems and methods for analyzing application usage on a user device

Systems and methods are provided for analyzing application usage on a user device and optimizing application and license distribution for user devices in an enterprise. An example system includes a management server and a data server. The management server can provide instructions to the user device to install a tracking... Airwatch Llc

Containerized contextual conversation system

Systems herein include a managed content application that can place markers for conversations within secure documents. A separate social application can serve as the platform for the conversations, allowing for efficient conversations that can occur in real time. The markers can be stored with the documents and identify the conversation,... Airwatch Llc

Device authentication based upon tunnel client network requests

Disclosed are various approaches for providing authentication of a user and a client device. A user's credentials can be authenticated by an identity provider. In addition, a device posture assessment that analyzes the device from which the authentication request originates is also performed. An authentication request can be authenticated based... Airwatch Llc

Device authentication based upon tunnel client network requests

Disclosed are various approaches for providing authentication of a user and a client device. A user's credentials can be authenticated by an identity provider. In addition, a device posture assessment that analyzes the device from which the authentication request originates is also performed. An authentication request can be authenticated based... Airwatch Llc

Device authentication based upon tunnel client network requests

Disclosed are various approaches for providing authentication of a user and a client device. A user's credentials can be authenticated by an identity provider. In addition, a device posture assessment that analyzes the device from which the authentication request originates is also performed. An authentication request can be authenticated based... Airwatch Llc

Loading and running virtual working environments in a mobile device management system

Systems herein allow a user to load a virtual work environment on a terminal, such as a workstation, based on authentication mechanisms built into a user device, such as a cell phone. The user device can authenticate with a management server using an SAML token. The management server can track... Airwatch Llc

Systems and methods for controlling email access

Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more email attachments from the email resources, and encoding the stripped email attachments based at least in part on one or more cryptographic keys.... Airwatch Llc

Location-based organizational groupings for management services

Examples relate to devices being managed based on their locations relative to a facility. In some examples, the location of a client device can be determined relative to a facility. An organizational group can be associated with the location. The client device can be associated with the organizational group. Whether... Airwatch Llc

Systems for providing device-specific access to an e-mail server

Systems and methods herein can provide device-specific access to an e-mail server, including an EWS-based e-mail server. In an example, a management server controlled by a system administrator provides device identification information to a user device and to a tunnel server. The management server also provides a custom request identifier... Airwatch Llc

Provisioning devices using near-field communication

Disclosed are various examples for provisioning a client device through near-field communication (NFC). An administrator device can provide configuration parameters to a client device in a factory-reset condition through an NFC bump. A second NFC bump can be performed that provides enrollment parameters to the client device, after which the... Airwatch Llc

Email notifications

Disclosed are various examples for communicating notifications for received email messages. A monitoring service monitors inboxes to which clients are subscribed. When a message arrives in a subscribed inbox, the monitoring service sends a notification to a notification brokering service. The notification brokering service then forwards the notification to the... Airwatch Llc

Anonymized application scanning for mobile devices

Disclosed are various approaches for integrating application scanning into a mobile enterprise computing management system. A management service can add a first command to a command queue associated with a client device, wherein the first command instructs the client device to provide a list of installed applications to the management... Airwatch Llc

Configuring network connections for computing devices

Examples relate to the configuration of network connections for computing devices. In some examples, a computing device determines that a network is inaccessible through a first network connection provided by a network access node. The computing device determines that the network is accessible through a first computing device that provides... Airwatch Llc

Application network usage management

Disclosed are various embodiments for monitoring network usage by client devices and enforcing compliance rules related thereto. A management component of a client application can be provided to identify a first function call made in the source code of the client application to invoke a media player function on the... Airwatch Llc

Managed device scatternet administration

Managed device scatternet administration is described herein. In one example, to form a scatternet of managed devices, a network entry request including a unique device identifier and a public key is received from a client device. The public key is validated and the structure of the scatternet is examined to... Airwatch Llc

Integrated application scanning and mobile enterprise computing management system

Disclosed are various approaches for integrating application scanning into a mobile enterprise computing management system. A management service can add a first command to a command queue associated with a client device, wherein the first command instructs the client device to provide a unique device identifier associated with the client... Airwatch Llc

Resource injection for application wrapping

Disclosed are various approaches for injecting resources into wrapped applications. A computing device first obtains a compiled version of a target application package. The computing device then decompiles the compiled version of the target application package to generate a source code version of the target application package. Then, the computing... Airwatch Llc

Silent installation of software with dependencies

Disclosed are various examples for the silent installation of software and its dependencies using a single installation package file. A computing environment can generate a core installation package file that directs an installer application to silently install a secondary installer application and copy one or more installation package files to... Airwatch Llc

Managed application detection logic

Various examples for application management detection are described. In one example, depending upon whether an installation token includes a unique token value, a client device can determine whether an application is managed or unmanaged. Additionally, the client device can determine whether the application is managed or unmanaged based on whether... Airwatch Llc

Detecting vulnerabilities in managed client devices

Various examples relate to detecting vulnerabilities in managed client devices. In some examples, a system determines whether a vulnerability scan of a computing device is required to be performed. The system installs a vulnerability detection component in the computing device in response to determining that the vulnerability scan is required... Airwatch Llc

Certificate distribution using derived credentials

Disclosed are approaches for distributing credentials using derived credentials, such as by relaying a simple certificate enrollment protocol (SCEP) payload. A computing device configures a device profile corresponding to a client device. The device profile can include a SCEP payload. The computing device later receives an override for the SCEP... Airwatch Llc

Configuring enterprise workspaces

Various examples relate to the configuration of enterprise workspaces that can be provided in computing devices. In some examples, a computing device is enrolled with a management service that controls operating of at least a portion of the computing device. A management component creates a user account with a distributor... Airwatch Llc

Associating user accounts with enterprise workspaces

Various examples relate to the configuration of enterprise workspaces that can be provided in computing devices. In some examples, a computing device is enrolled with a management service that controls operation of at least a portion of the computing device. A management component creates a user account with a distributor... Airwatch Llc

10/05/17 / #20170289170

Remote processsing of mobile applications

In an example implementation of the disclosed technology, a method includes accessing, by a management agent associated with a client device, a profile associated with a requested resource, wherein the profile comprises at least one profile criterion. The method also includes evaluating the profile criterion based, at least in part,... Airwatch Llc

09/28/17 / #20170277885

Password hint policies on a user provided device

Disclosed are various examples for remotely managing passwords using local security policies. A client device can be enrolled with a management service. The management service then transmits a password policy requiring a password hint to be defined by the user. A management component executed on the client device can then... Airwatch Llc

09/28/17 / #20170278070

Content access based on location or time

Disclosed are various approaches for providing access to content based on the location of a client device or the current time. A calendar service creates an event comprising a time and a duration. The calendar service assigns a beacon identifier to the event. The calendar service then links a document... Airwatch Llc

09/28/17 / #20170279731

Controllng distribution of resources in a network

Disclosed are various embodiments for accessing resources when a client device complies with distribution rules. A client device receives selected resources and distribution rules associated with the resources. The client device determines whether the client device complies with the distribution rules. When the resources are modified, the changes are sent... Airwatch Llc

09/28/17 / #20170279733

Controllng distribution of resources on a network

Disclosed are various embodiments for controlling distribution of resources on a network. In one embodiment, among others, a processor receives a request from a client device to access resources hosted by a distribution service. In response, the processor determines whether the client device is authorized to access the distribution service.... Airwatch Llc

09/28/17 / #20170279792

Application authentication wrapper

Disclosed are various approaches for implementing an application authentication wrapper. An authentication request, such as a Kerberos request, is created for authenticating the computing device. The authentication request is encrypted to generate an encrypted authentication request. The encrypted authentication request is then forwarded to a reverse proxy server. An encrypted... Airwatch Llc

09/21/17 / #20170269954

Enforcing compliance rules using host management components

A system can include a host device that includes a virtual machine execution environment. The host device can execute a host management component in the host device and determine whether a hypervisor or a virtual machine in the virtual machine execution environment violates at least one compliance rule. The host... Airwatch Llc

09/21/17 / #20170269955

Enforcing compliance rules using guest management components

A system can include a host device that includes a virtual machine execution environment that includes a hypervisor and a virtual machine. The virtual machine can execute a guest management component. The virtual machine can also determine whether at least one of the hypervisor or the host device violates at... Airwatch Llc

09/14/17 / #20170264593

System and method to secure the streaming of media to a valid client

Disclosed are various examples for securing the streaming of a media file from a web service to a media player. A request for a portion of a media file can be received including an authentication key. A web service can validate the authentication key. If the authentication key validates, the... Airwatch Llc

09/07/17 / #20170255378

Systems and methods for performing erasures within a graphical user interface

Examples described herein include improved systems and methods for performing erasures and edits within a graphical user interface. A computing device can include a processor that detects skin contact with a touch-screen display of the computing device. The processor can also detect, based on the skin contact, a gesture that... Airwatch Llc

08/31/17 / #20170250977

Provisioning of applications deployed on client devices

Disclosed are various examples for deploying applications on client devices through a management service. A client device can be enrolled with a management service. The management service can determine application settings that are associated with an application and generate an application profile for the application. The application profile can be... Airwatch Llc

08/10/17 / #20170228107

Generating predictive action buttons within a graphical user interface

Examples described herein include systems for generating a predictive action button within a graphical user interface. The system can launch an action generator that tracks a user's behavior, either directly or through the use of an action profile. User behavior can be tracked in individual applications or across multiple applications... Airwatch Llc

08/10/17 / #20170228245

Managed virtual machine deployment

A system can include computer instructions that can cause a computing device to obtain a request to access an application on behalf of a user. The request can be obtained from a client device associated with the user. The computer instructions can further cause the computing device to determine whether... Airwatch Llc

08/10/17 / #20170228549

Preventing restricted content from being presented to unauthorized individuals

A system includes a computing device and a storage device storing computer instructions that are executable by the computing device. The computer instructions cause the computing device to detect a request to render content in a first display of a primary user device. The computer instructions further cause the computing... Airwatch Llc

08/10/17 / #20170230281

Segregating vpn traffic based on the originating application

Disclosed are various examples for segregating virtual private network (VPN) traffic based on the originating client application. A tunnel endpoint receives, through a network tunnel, network traffic sent by a client application executed by a client device. The tunnel endpoint identifies characteristics of the client application or the client device.... Airwatch Llc

08/10/17 / #20170230334

Enterprise mobility management and network micro-segmentation

Disclosed are various examples for the use of network micro-segmentation in enterprise mobility management. In one example, a gateway receives network traffic from a client device through a virtual private network (VPN) tunnel. The gateway determines one or more device management attributes associated with the client device in response to... Airwatch Llc

08/10/17 / #20170230848

Visual privacy systems for enterprise mobility management

Systems herein allow a user to use their personal user device to perform functions in an enterprise environment in exchange for enrolling at a management server. The management server can provide a privacy component that allows the user to view a privacy profile summarizing data collection activities of the management... Airwatch Llc

08/03/17 / #20170222977

Configuring network security based on device management characteristics

Disclosed are various examples for configuring network security based on device management characteristics. In one example, a specification of a set of network resources on an internal network is received from an administrator client. The set of network resources are those network resources that a particular application executed in client... Airwatch Llc

08/03/17 / #20170220368

Thin client with managed profile-specific remote virtual machines

Systems herein include thin clients that operate with managed profile-based virtual machines. This can allow users to utilize personal user devices in an enterprise environment without subjecting sensitive enterprise credentials to the user device. A management server can determine a profile associated with the user device. Based on the profile,... Airwatch Llc

06/01/17 / #20170155640

Single sign-on for managed mobile devices using kerberos

Disclosed are various examples for single-sign on by way of managed mobile devices using Kerberos. For example, a certificate is received from a client device. In response, a Kerberos ticket-granting ticket is generated and sent to the client device. A request for a service ticket is later received from the... Airwatch Llc

06/01/17 / #20170155660

Controlling electronically communicated resources

Methods, systems, and devices provide control over resources electronically communicated among computing devices. In some embodiments, a management application identifies multiple entities for communicating electronic content. The management application determines that at least a subset of the entities required for communicating the electronic content is available for electronic communication. The... Airwatch Llc

06/01/17 / #20170155684

Enforcement of proximity based policies

Embodiments of the disclosure are related to enforcing a policy on a computing device, or a companion device, based upon its proximity to another computing device, or an anchor device. In one example, the anchor device and companion device can report their location with respect to one another to a... Airwatch Llc

05/25/17 / #20170147157

Managing network resource permissions for applications using an application catalog

Disclosed are various examples for managing network resource permissions for applications through the use of an application catalog. A user interface presenting an application catalog is generated that includes a listing of applications that are available to managed client devices in an organization. A selection of a particular application from... Airwatch Llc

05/25/17 / #20170149686

Resource watermarking and management

A method, system and non-transitory computer-readable medium product are provided for resource watermarking and management. In the context of a method, a method is provided that includes identifying resources associated with a device and identifying a watermark template. The method further includes associating the watermark template with the resources, and... Airwatch Llc

05/18/17 / #20170139845

Managing grouped student devices with timed locks

Systems and methods presented here can allow a teacher to schedule the locking of one or more student devices into an asset at some time in the future. A teacher device can be used to configure lock information, including student identifying information, lock type information, asset information, and lock timing... Airwatch Llc

05/18/17 / #20170140658

Systems for classroom media sharing

Systems herein allow a student to share media with other students in a classroom with the permission of a teacher. The student can send a sharing request to a management server with a sender student device. The management server can identify a teacher device and send the sharing request to... Airwatch Llc

05/18/17 / #20170142048

Enhanced e-mail delivery to mobile devices

Systems and methods for providing e-mail to a mobile client are disclosed. In one example, the method can include receiving, at a server associated with transmitting e-mail to the mobile client, an indication of a battery level in the mobile client. The method can also include comparing the battery level... Airwatch Llc

05/11/17 / #20170133058

Systems for optimized presentation capture

Systems herein allow a user to record a presentation with a slides file. The system can record action events generated by a viewer application that displays slides of the slides file. The system can also record an audio segment for each displayed slide. An action information file can be created... Airwatch Llc

05/04/17 / #20170124036

Decoupling and relocating bookmarks and annotations from files

Disclosed are various examples for generating, storing, and loading references separate from a file. A request can be received to generate a reference for a file. A data object can be generated corresponding to the reference. The data object can include characteristics of the file proximate to an area in... Airwatch Llc

05/04/17 / #20170124342

Applying rights management policies to protected files

Examples of the present disclosure relate to protecting tiles with an information rights policy. Files can be protected as specified by a content policy associated with the file. The content policy can specify whether the file should be protected while at rest on a device as well as when the... Airwatch Llc

Patent Packs
05/04/17 / #20170126660

Selectively enabling multi-factor authentication for managed devices

Disclosed are various examples of selectively enabling multi-factor authentication for applications on managed devices. An identity provider receives an authentication request for a first client application executed in a managed client device. The authentication request includes a first authentication factor corresponding to a management credential. The identity provider then determines... Airwatch Llc

05/04/17 / #20170126661

Multi-factor authentication for managed applications using single sign-on technology

Disclosed are various examples for facilitating multi-factor authentication for client applications that are configured to use single sign-on technology. An authentication request for a first client application executed in a client device is received by an identity provider. The identity provider then receives data generated by a single sign-on credential... Airwatch Llc

05/04/17 / #20170126692

Remote processsing of mobile applications

In an example implementation of the disclosed technology, a method includes accessing, by a management agent associated with a client device, a profile associated with a requested resource, wherein the profile comprises at least one profile criterion. The method also includes evaluating the profile criterion based, at least in part,... Airwatch Llc

05/04/17 / #20170126755

Systems for content recommendation based on a meeting invite

Systems herein can recommend files to users based on meeting information. The system can include a secure email gateway that forwards meeting invitations to an email server and a content server. The system can extract invitee information, meeting timing information, and an attachment from the meeting invitation. During a time... Airwatch Llc

04/27/17 / #20170115979

Enforcement of updates for devices unassociated with a directory service

Disclosed are approaches for enforcement of updates for devices unassociated with a directory service. An application executing on a computing device can determine, based on a policy received from a management service, that the computing device is to use an update service specified in the policy to receive updates. The... Airwatch Llc

04/27/17 / #20170118186

Searching content associated with multiple applications

Disclosed are examples of searching for content associated with multiple applications. In various examples, a first application can obtain a search query and provide a request to a second application to search for content associated with the second application that corresponds to the search query. The request can include a... Airwatch Llc

04/27/17 / #20170118197

Sharing data between sandboxed applications with certificates

Disclosed are various approaches for sharing data between sandboxed applications with certificates. A request for a certificate is received from a client device. The certificate is then generated, wherein the certificate comprises data to be shared between applications executing on the client device. A response is sent to the client... Airwatch Llc

04/27/17 / #20170118211

Native enrollment of mobile devices

Disclosed are approaches for native enrollment of mobile devices. A first message is received from a client device, wherein the first message comprises an enrollment request for the client device. An application is sent to the client device, wherein the application is to be installed on the client device. A... Airwatch Llc

04/27/17 / #20170118246

Detection of offline attempts to circumvent security policies

Disclosed are approaches for detecting attempts to circumvent security policies on a client device. A deletion of a user account on a computing device is detected, wherein the deletion is initiated locally on the computing device and the user account is associated with an enrollment of the computing device with... Airwatch Llc

04/13/17 / #20170104766

Analog security for digital data

Disclosed are various examples of providing analog security for digital data. Content is split into a plurality of framelets. A first framelet is sent to a first client device. A second framelet is sent to a second client device. When the first and second client devices are oriented such that... Airwatch Llc

03/23/17 / #20170083590

Secure bubble content recommendation based on a calendar invite

Systems herein allow a user device to monitor calendar events with a secure bubble application. When an event is upcoming, the secure bubble application can present a notification. The secure bubble application can search other managed applications for content relevant to the meeting event. The secure bubble application can extract... Airwatch Llc

03/16/17 / #20170076101

Systems for modular document editing

Systems herein allow a content manager to share portions of a document with different groups of users. The system can parse the document into screen shots of each page along with an information bundle that describes how to format content on each page. When a user accesses a document, the... Airwatch Llc

03/16/17 / #20170078261

Directory service user synchronization

Disclosed are various examples for enrolling a client device and synchronizing user attributes for the client device across multiple directory services. A search request for user attributes can be sent to a first directory service with an identifier for a user account. The first directory service can query for the... Airwatch Llc

03/16/17 / #20170078306

Individual-specific content management

A method, system, apparatus, and computer program product are provided for facilitating individual-specific content management. For example, a method is provided that includes receiving information regarding at least one prerequisite condition relating to at least one individual, receiving information regarding the at least one individual, determining whether the at least... Airwatch Llc

03/16/17 / #20170078336

Providing on-demand vpn connectivity on a per-application basis

Disclosed are various approaches for providing on-demand virtual private network (VPN) connectivity on a per-application basis. First, an application is determined to have begun execution on a computing device. The application is then identified. A determination that the application is authorized to access a VPN connection is made. Subsequently, the... Airwatch Llc

Patent Packs
03/09/17 / #20170068829

Screen shot marking and identification for device security

Disclosed are examples of marking screenshots and identifying screenshots that have been marked. A client application or a computing environment can generate a watermark template for encoding in a user interface of the client application where the watermark template is not visible to the user of a client device. If... Airwatch Llc

03/02/17 / #20170060887

On demand file sync

Disclosed are various examples for downloading data objects by enforcing a threshold amount of allocated data. A file sync application determines which data objects to download to the client device such that the total amount of downloaded data meets or falls below the threshold amount of allocated data. File system... Airwatch Llc

03/02/17 / #20170061720

Controlling physical access to secure areas via client devices in a networked environment

A method is disclosed for providing physical access credentials to a client device. The method may include receiving a request for a physical access credential, where the first request includes at least one user access credential and at least one physical access point identifier. The method may also include determining... Airwatch Llc

03/02/17 / #20170063857

Providing access to applications with varying enrollment levels

Various examples of detecting whether a device meets an enrollment level are disclosed. A request to authenticate a user based upon user credentials is obtained. Applications for which the user is authorized are identified. An enrollment level associated with each of the plurality of applications is also identified. A user... Airwatch Llc

03/02/17 / #20170064040

Per-application network content filtering

Disclosed are various examples for providing network content filtering to client devices on a per-application basis. A network stack receives a request from an application to connect to a network service. The network stack then determines the identity of the application. Based at least in part on the identity of... Airwatch Llc

03/02/17 / #20170064549

Providing access to applications with varying enrollment levels

Various examples of detecting whether a device meets an enrollment level are disclosed. A request to authenticate a user based upon user credentials is obtained. Applications for which the user is authorized are identified. An enrollment level associated with each of the plurality of applications is also identified. A user... Airwatch Llc

02/23/17 / #20170053136

Policy-based trusted peer-to-peer connections

Disclosed are various examples for implementations of policy-based trusted peer-to-peer connections. A computing device can receive a message from a first client device, the message specifying a public address of the first client device and an identifier of the second client, device. The computing device can then send a query... Airwatch Llc

02/16/17 / #20170046339

Multimedia searching

Disclosed are examples that relate to searching for audio in multimedia files. A transcript specification can be obtained from a file manager that provides restricted access to files associated with an enterprise. The transcript specification can include transcript data representing audio for multiple time segments of a multimedia file. A... Airwatch Llc

02/16/17 / #20170048097

Managing devices through secondary communication channels

Disclosed are examples of managing devices through secondary communication channels. In some examples, a management component detects an impediment with a data communication channel for a device. The data communication channel can be a primary communication channel through which the device communicates with a management service. The management component detects... Airwatch Llc

02/16/17 / #20170048279

Rights management services integration with mobile device management

Rights management services (RMS) integration with mobile device management (MDM) may be provided. A functionality associated with a document may be restricted according to a document management policy. After the document has been transmitted to a receiving device, a request to un-restrict the at least one functionality associated with the... Airwatch Llc

02/09/17 / #20170039388

Multi-party authentication and authorization

Disclosed are various examples for multi-party authentication and authentication. In one example, a user who forgets a password can gain access to secured data stored by a managed device by way of an authorization by one or more other users. This access can be granted even if the managed device... Airwatch Llc

02/09/17 / #20170041151

Secure certificate distribution

Disclosed are various examples of securely distributing certificates to client devices. A uniform resource locator (URL) is sent to a client device, wherein the URL represents an address from which the client device can request a user certificate. A certificate for a registration authority is sent to the client device,... Airwatch Llc

02/09/17 / #20170041188

Differential staging of devices in bulk enrollment

Disclosed are various examples for differential staging of devices in bulk enrollment. In one example, a computing environment can detect a network connection event where a client device establishes a connection with a network device that is communicatively coupled to the computing environment. A configuration file can be copied from... Airwatch Llc

02/09/17 / #20170041375

Generating content fragments for content distribution

Disclosed are various examples for specifying portions of content files that can be stored on a client device. A content file stored in a remote storage area can be segmented into content fragments. A manifest file that specifies which portions of the content file correspond to content fragments can also... Airwatch Llc

02/09/17 / #20170041299

Systems and methods for controlling email access

Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more email attachments from the email resources, and encoding the stripped email attachments based at least in part on one or more cryptographic keys.... Airwatch Llc

02/02/17 / #20170031737

Restricted application visibility

Disclosed are various examples of providing a secured application launcher for initiating execution of access-restricted applications. A computer disables a default launch activity alias for a user application, wherein the default launch activity alias comprises a first reference to an application programming interface (API) to initiate execution of the user... Airwatch Llc

02/02/17 / #20170032042

Multiple domain directory integration

Disclosed are various examples of integrating multiple domains within a directory service. A computing device retrieves a first list of members in a first group of users for the domain from a first directory service for a first domain. The computing device then determines that a second group of users... Airwatch Llc

01/26/17 / #20170026308

Controlling resources used by computing devices

Various examples for controlling resources used by client devices are disclosed. A management application executing in at least one computing device can identify client devices executing an instance of a client application that are available for management, where the client application is configured to control at least one function of... Airwatch Llc

01/26/17 / #20170026353

Management of access sessions

Disclosed are examples of managing access sessions for a computing device. In some examples, a computing device obtains a key and timeout data from secured storage. The computing device determines whether an access session has expired based on the timeout data. Responsive to determining that the access session has expired,... Airwatch Llc

01/26/17 / #20170026444

Policy driven media consumption framework

Disclosed are various examples of providing a client device with media content based on policies applied to the client devices. A computing device receives a request for media content from a client device. A computing device also receives a device identifier and a current device context from the client device.... Airwatch Llc

01/12/17 / #20170012846

Application network usage management

Disclosed are examples that relate to monitoring network usage by client devices and enforcing compliance rules related thereto. In various examples, a system can intercept a network call in transit from a client application to an operating system of a client device, wherein the network call is configured to cause... Airwatch Llc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Airwatch Llc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Airwatch Llc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###