Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Airwatch Llc patents


Recent patent applications related to Airwatch Llc. Airwatch Llc is listed as an Agent/Assignee. Note: Airwatch Llc may have other listings under different names/spellings. We're not affiliated with Airwatch Llc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "A" | Airwatch Llc-related inventors


 new patent  Providing access to applications with varying enrollment levels

Various examples of detecting whether a device meets an enrollment level are disclosed. A request to authenticate a user based upon user credentials is obtained. ... Airwatch Llc

 new patent  Generating content fragments for content distribution

Disclosed are various examples for serving certain portions of a content file from a server and accessing other portions of the content file from a local storage on a client device. A content proxy can extract a manifest file from a content package, and determine that a content file is associated with the manifest file. ... Airwatch Llc

 new patent  Secure certificate distribution

Disclosed are various examples of securely distributing certificates to client devices. A uniform resource locator (url) is sent to a client device, wherein the url represents an address from which the client device can request a user certificate. ... Airwatch Llc

Management of access sessions

Disclosed are examples of managing access sessions for a computing device. In some examples, a key is generated using a code obtained through a user interface. ... Airwatch Llc

Handling of oversized email attachments

Systems and methods herein provide for improved handling of oversized email attachments. An example system can identify an oversized email attachment before an email is sent, by comparing the size of the attachment to a maximum file size at an email server. ... Airwatch Llc

User interface for classroom management

Systems and methods presented herein can allow a teacher to manage student devices in a classroom setting to increase learning efficiency. The teacher device can receive peer-to-peer broadcasts from the student devices and track class attendance based on the broadcasts. ... Airwatch Llc

Detection of offline attempts to circumvent security policies

Disclosed are approaches for detecting attempts to circumvent security policies on a client device. A deletion of a user account on a computing device is detected, wherein the deletion is initiated locally on the computing device and the user account is associated with an enrollment of the computing device with a management service. ... Airwatch Llc

Content snip capture and sharing

To share snips of content, an identifier of a recipient of a content file is received. With reference to content access rules for the recipient, content access metadata of the content file is parsed to identify a range of the content file accessible to the recipient. ... Airwatch Llc

Provisioning devices using near-field communication

Disclosed are various examples for provisioning a client device through near-field communication (nfc). An administrator device can provide configuration parameters to a client device in a factory-reset condition through an nfc bump. ... Airwatch Llc

Secured attachment management

The secure management of attachments is described. In one example, a message is received by a device management computing environment from a client computing device. ... Airwatch Llc

Secured attachment management

The secure management of attachments is described. In one example, files are identified for attachment to a message through a secure content application extension. ... Airwatch Llc

Collaboration for network-shared documents

Disclosed are various embodiments for facilitating collaboration among users for network-shared documents. A computing environment can identify that a first identifier and a second identifier were used in a communication regarding a network-shared file being accessible on various client devices. ... Airwatch Llc

Enforcing display sharing profiles on a client device sharing display activity with a display sharing application

Disclosed are various examples for facilitating sharing of activity on a display of a client device. The client device can be enrolled as a managed device with a management service. ... Airwatch Llc

Initiating application execution with trigger characters

Disclosed are various embodiments for initiating execution of an application using trigger characters. A computing device detects an entry of a trigger character within a first user interface presented by a first application installed on the computing device. ... Airwatch Llc

05/31/18 / #20180152434

Virtual content repository

Disclosed are various examples for facilitating access to files in a virtual content repository. In one example, a request to access a file is transmitted to a management service. ... Airwatch Llc

05/31/18 / #20180150636

Anonymized application scanning for mobile devices

Disclosed are various approaches for integrating application scanning into a mobile enterprise computing management system. A management service instructs the client device to provide a list of installed applications to the management service and receives the list of installed applications from the client device. ... Airwatch Llc

05/24/18 / #20180146046

Management service migration for managed devices

Disclosed are various examples for client device migration. In one example, a client device is enrolled with a first management service. ... Airwatch Llc

05/24/18 / #20180145968

Single sign-on for managed mobile devices

Disclosed are various examples for providing a single sign-on experience for managed mobile devices. A management application executed in a computing device receives a single sign-on request from a managed client application executed by the same computing device. ... Airwatch Llc

05/24/18 / #20180145940

Systems and methods for controlling email access

Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, determining whether the email resources are accessible to the client devices via at least one unauthorized application on the client devices, and modifying the email resources to be inaccessible via the unauthorized applications on the client devices in response to a determination that the email resources are accessible via the unauthorized applications on the client devices.. . ... Airwatch Llc

05/24/18 / #20180145887

Management service migration using managed devices

Disclosed are various examples for client device migration. In one example, a client device is enrolled with a first management service. ... Airwatch Llc

05/24/18 / #20180145877

Management service migration using web applications

Disclosed are various examples for client device migration. In one example, a client device is enrolled with a first management service. ... Airwatch Llc

05/24/18 / #20180145830

System for retrieval of email certificates from remote certificate repository

An email request is received from a client device, where the email request is intended for an email server and includes a request for an email recipient's certificate. The compliance status of the client device is obtained. ... Airwatch Llc

05/17/18 / #20180139244

Management of actions initiated by applications in client devices

A client device identifies an action being performed using a first application in the client device. The client device identifies that the first application is not authorized to be used to perform the action. ... Airwatch Llc

05/10/18 / #20180131751

Distributed network diagnostics of enterprise devices utilizing device management

In response to receiving an indication from a client device experiencing a network connectivity error, a grouping of target client devices is identified for purposes of executing a distributed network diagnostic, the grouping being identified based on one or more configuration settings associated with client devices. The client devices in the identified grouping retrieve and execute an instruction. ... Airwatch Llc

05/10/18 / #20180131721

Enforcing enterprise requirements for devices registered with a registration service

Disclosed are various examples for enforcing enterprise requirements for client device deployment. One example includes receiving a device enrollment request that is part of an activation of a client device that is registered with a registration service. ... Airwatch Llc

05/10/18 / #20180131686

Selectively enabling multi-factor authentication for managed devices

Disclosed are various examples of selectively enabling multi-factor authentication for applications on managed devices. An identity provider receives an authentication request for a first client application executed in a managed client device. ... Airwatch Llc

05/10/18 / #20180131647

Email composition assistance based on out-of-office recipients in distribution lists

When a sender is drafting an email, a system herein can determine whether a user in a distribution list is out-of-office. The email application can identify a distribution list to a server along with a target date, such as a meeting date of an email invite. ... Airwatch Llc

05/10/18 / #20180129819

Redacting restricted content in files

Restricted content of a data file is identified. The restricted content is removed from the data file, and a redacted version of the data file is generated. ... Airwatch Llc

05/03/18 / #20180123994

Systems and methods for controlling email access

Various examples for remotely controlling access to email resources are provided. In one example, one or more computing devices can be configured to provide, through an access control service, at least one user interface that enables creation of resource rules configured for use by the access control service in enforcement of one or more client devices in association with email resources. ... Airwatch Llc

04/19/18 / #20180109671

Detecting driving and modifying access to a user device

Systems and methods are included for detecting driving based on user-specific models for driving detection, and restricting access to an application of the user device while a user is driving. A management agent installed on the user device can collect data from sensors in a user device and provide the data to a management server, which can build a user-specific model for driving detection for that user. ... Airwatch Llc

04/19/18 / #20180109636

Displaying content based on proximity of a user device

Systems and methods are included for displaying enterprise content on a large-format display based on proximity of one or more user devices. A management server can enroll a television and a user device and install management agents on both. ... Airwatch Llc

04/19/18 / #20180109530

Peer to peer enterprise file sharing

Disclosed are various embodiments for facilitating the distribution of files from a file repository. Files from a file repository can be distributed via peer to peer transmissions where the peer devices can perform authentication functions. ... Airwatch Llc

04/19/18 / #20180109529

Peer to peer enterprise file sharing

Disclosed are various embodiments for facilitating the distribution of files from a file repository. Files from a file repository can be distributed via peer to peer transmissions where the peer devices can perform authentication functions. ... Airwatch Llc

04/19/18 / #20180109528

Peer to peer enterprise file sharing

Disclosed are various embodiments for facilitating the distribution of files from a file repository. Files from a file repository can be distributed via peer to peer transmissions where the peer devices can perform authentication functions. ... Airwatch Llc

04/19/18 / #20180109430

Federated mobile device management

In one example of federated mobile device management, a first management server federates with a second management server based on an exchange of one or more identity authentication certificates between them. After the first and second management servers have federated or affiliated, they can exchange mobile device management data, including compliance policies, rules, resources, etc., with each other. ... Airwatch Llc

04/19/18 / #20180109412

Detecting driving and modifying access to a user device

Systems and methods are included for detecting driving based on user-specific models for driving detection, and restricting access to an application of the user device while a user is driving. A management agent installed on the user device can collect data from sensors in a user device and provide the data to a management server, which can build a user-specific model for driving detection for that user. ... Airwatch Llc

04/12/18 / #20180103028

Application program as key for authorizing access to resources

In a networked environment, a client side application executed on a client device may transmit a request to an authorization service for access to a resource. The authorization service may authenticate the user of client device and/or the client device based on user credentials and/or a device identifier. ... Airwatch Llc

03/15/18 / #20180077149

Distributing an authentication key to an application installation

Disclosed are various examples for facilitating distribution of an authentication code to installation of managed applications. An identity certificate is sent to a device by installing a configuration profile on the client device. ... Airwatch Llc

03/15/18 / #20180077148

Distributing security codes through a restricted communications channel

Disclosed are various examples for facilitating distribution of security codes for a two-factor authentication scheme or one-time passwords. Security codes can represent one-time passwords or shared secrets used to seed one-time password algorithms. ... Airwatch Llc

03/01/18 / #20180063373

Network printer detection and authentication for managed device deployment

Disclosed are various examples for network printer detection and authentication for managed device deployment. In one example, a computing environment can receive an identifier from a client device over a network, where the client device detects the identifier based on a wireless transmission performed by a transmitter in association with a print operation assigned to a network printer. ... Airwatch Llc

03/01/18 / #20180063088

Hypervisor network profiles to facilitate vpn tunnel

A system can include a host device that execute a virtual machine execution environment. A hypervisor network profile can be associated with the hypervisor of the virtual machine execution environment. ... Airwatch Llc

03/01/18 / #20180062921

Systems for configuring and managing classroom devices

Systems herein allow an administrator to efficiently set up user devices for use in a classroom environment. A management server can display a graphical user interface that includes selection options for defining and using carts of user devices. ... Airwatch Llc

03/01/18 / #20180059995

Network printer detection and authentication for managed device deployment

Disclosed are various examples for network printer detection and authentication for managed device deployment. In one example, a computing environment can access a listing of network printers received from a printer discovery service executed in an enterprise device in an intranet behind a firewall. ... Airwatch Llc

02/22/18 / #20180054442

Certificate based profile confirmation

Disclosed are various embodiments for controlling access to resources in a network environment. Methods may include installing a profile on the device and installing a certificate included in or otherwise associated with the profile on the device. ... Airwatch Llc

02/22/18 / #20180054373

Network speed detection

Disclosed are various examples for facilitating network speed testing on behalf of a client device that is associated with an enterprise. In a client device that can be a managed device managed by a management service, a network testing profile can be obtained which specifies a testing schedule as well as a network testing endpoint with which network testing can be conducted. ... Airwatch Llc

02/22/18 / #20180054354

Automated scripting for managed devices

Systems and methods are included for providing feature sets to groups of managed user devices within an enterprise mobility management (emm) system. A feature set can enable a user device to detect one or more triggering events, and in response, automatically perform a specified action. ... Airwatch Llc

02/22/18 / #20180052673

Persistent mobile device enrollment

Embodiments of the disclosure are directed to a persistent enrollment of a device in a management system. Upon detection of a triggering event, detection of whether an activator application is installed is performed. ... Airwatch Llc

02/15/18 / #20180046929

Intelligent ranking of notifications on a user device

Systems and methods are provided for accurately setting notification priority levels for applications on a user device. An example system includes a user device and a management server. ... Airwatch Llc

02/15/18 / #20180046525

Fast and accurate identification of message-based api calls in application binaries

Disclosed are various embodiments for fast and accurate identification of message-based application programming interface (api) calls in applications. A set of compliance rules is obtained from a compliance rule store. ... Airwatch Llc

01/25/18 / #20180026988

On-demand security policy activation

On-demand activation of a security policy may be provided. Upon receiving a selection of a link, a profile identified by a security policy associated with the link may be activated and the link may be opened according to the security policy. ... Airwatch Llc

01/25/18 / #20180026957

Securely authorizing access to remote resources

Methods and an apparatus are provided for securely authorizing access to remote resources. For example, a method is provided that includes receiving a request to determine whether a user device communicatively coupled to a resource server is authorized to access at least one resource hosted by the resource server and determining whether the user device communicatively coupled to the resource server is authorized to access the at least one resource hosted by the resource server based at least in part on whether the user device communicatively coupled to the resource server has been issued a management identifier. ... Airwatch Llc

01/25/18 / #20180026827

Functionality management via application modification

Methods, systems, apparatuses, and/or computer-readable media for providing device management via application modification may be provided. In some embodiments, a request to perform an action may be received. ... Airwatch Llc

01/25/18 / #20180024824

Managed clone applications

Disclosed are various embodiments relating to managed clones of applications. In one embodiment, an application is received. ... Airwatch Llc

01/18/18 / #20180020010

Analog security for digital data

Disclosed are various examples of providing analog security for digital data. Content is split into a plurality of framelets. ... Airwatch Llc

01/18/18 / #20180018154

Generating and optimizing deployment configurations for enrolled devices

Disclosed are various examples generating and optimizing deployment configurations for devices enrolled with a management service. A computing environment can be employed to receive information pertaining to a desired configuration of enrolled devices during an ingestion process where at least one user interface is generated, where the information received includes a specification of a client application, a resource, and a policy for implementation on a plurality of client devices enrolled with a management service. ... Airwatch Llc

01/11/18 / #20180013747

Controlling access to resources on a network

Disclosed are various embodiments for controlling access to data on a network. Upon receiving a request comprising a device identifier and at least one user credential to access a remote resource, the request may be authenticated according to at least one compliance policy. ... Airwatch Llc

01/04/18 / #20180007021

Public key pinning for private networks

Disclosed are various approaches for validating public keys pinned to services or servers on private networks. A client device can request a first certificate from a trust service. ... Airwatch Llc

12/28/17 / #20170374074

Continuous sensitive content authentication

Continuous sensitive content authentication is described. In one example, a request to open content, such as a photograph, spreadsheet, or text-based document, among other types of content, is received. ... Airwatch Llc

12/28/17 / #20170374067

Determining a device posture using a device posture token

Disclosed are various approaches for generating a device posture token corresponding to a client device. The device posture token can be used by a verification computing device to determine whether the client device complies with the security policies of a particular facility.. ... Airwatch Llc

12/28/17 / #20170373995

Architecture for performing actions in a third-party service by an email client

Disclosed are various approaches performing actions on data items in a third-party service with a network-accessible application programming interface from an email client. The email client can perform an action as specified fey an email service profile, which specifies how to identify the email message, the data item and how to interact with the network-accessible application programming interface.. ... Airwatch Llc

12/28/17 / #20170371932

Auto tuning data anomaly detection

Automatic tuning anomaly detection is described. The context metric keys are established during a training phase based on the surrounding context of data received from devices over time. ... Airwatch Llc

12/28/17 / #20170371532

Architecture for performing actions in a third-party service by an email client

Disclosed are various approaches performing actions on data items in a third-party service with a network-accessible application programming interface from an email client. The email client can perform an action as specified by an email service profile, which specifies how to identify the email message, the data item and how to interact with the network-accessible application programming interface.. ... Airwatch Llc

12/21/17 / #20170366646

Remote providisioning and enrollment of enterprise devices with on-premises domain controllers

An agent application executing on a client device retrieves an execute command from a command queue managed by a server and retrieves certificates and configuration settings for establishing a virtual private network (vpn) connection. An enrollment application resident on the client device executes in response to the execute command to modify a network setting of a network interface card (nic) of the client device and establish a vpn connection with a domain controller located within the corporate domain using the certificate and configuration settings. ... Airwatch Llc

12/21/17 / #20170366346

Secure demand-driven file distribution

Computer networks for secure demand-driven file distribution are described. In one example, a client device receives a notification to check in for updates. ... Airwatch Llc

12/21/17 / #20170364213

Taking bulk actions on items in a user interface

Disclosed are various approaches for generating a user interface in which data items are grouped together. Additionally, a bulk action can be taken by a user on a grouping of data items within the user interface. ... Airwatch Llc

12/07/17 / #20170353565

Systems and methods for analyzing application usage on a user device

Systems and methods are provided for analyzing application usage on a user device and optimizing application and license distribution for user devices in an enterprise. An example system includes a management server and a data server. ... Airwatch Llc

12/07/17 / #20170353497

Remote data securement on mobile devices

A server determines a status of a client device, wherein if the client device violates the compliance rule, the server accesses a device record established by the server for the client device. The device record comprises data specifying an operating system executing on the client device. ... Airwatch Llc

12/07/17 / #20170351507

Silent upgrade of software with dependencies

Disclosed are various examples for the silent upgrade of software and its dependencies on a client device. A client device can identify that a new version of the client application is available that upgrades a current version of the client application to the new version and download an installation package file for the new version of the client application. ... Airwatch Llc

11/30/17 / #20170346856

Device authentication based upon tunnel client network requests

Disclosed are various approaches for providing authentication of a user and a client device. A user's credentials can be authenticated by an identity provider. ... Airwatch Llc

11/30/17 / #20170346812

Device authentication based upon tunnel client network requests

Disclosed are various approaches for providing authentication of a user and a client device. A user's credentials can be authenticated by an identity provider. ... Airwatch Llc

11/30/17 / #20170346811

Device authentication based upon tunnel client network requests

Disclosed are various approaches for providing authentication of a user and a client device. A user's credentials can be authenticated by an identity provider. ... Airwatch Llc

11/30/17 / #20170344949

Containerized contextual conversation system

Systems herein include a managed content application that can place markers for conversations within secure documents. A separate social application can serve as the platform for the conversations, allowing for efficient conversations that can occur in real time. ... Airwatch Llc

11/23/17 / #20170339142

Loading and running virtual working environments in a mobile device management system

Systems herein allow a user to load a virtual work environment on a terminal, such as a workstation, based on authentication mechanisms built into a user device, such as a cell phone. The user device can authenticate with a management server using an saml token. ... Airwatch Llc

11/16/17 / #20170331797

Systems and methods for controlling email access

Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more email attachments from the email resources, and encoding the stripped email attachments based at least in part on one or more cryptographic keys.. . ... Airwatch Llc

11/09/17 / #20170325062

Location-based organizational groupings for management services

Examples relate to devices being managed based on their locations relative to a facility. In some examples, the location of a client device can be determined relative to a facility. ... Airwatch Llc

11/09/17 / #20170324710

Systems for providing device-specific access to an e-mail server

Systems and methods herein can provide device-specific access to an e-mail server, including an ews-based e-mail server. In an example, a management server controlled by a system administrator provides device identification information to a user device and to a tunnel server. ... Airwatch Llc

10/05/17 / #20170289170

Remote processsing of mobile applications

In an example implementation of the disclosed technology, a method includes accessing, by a management agent associated with a client device, a profile associated with a requested resource, wherein the profile comprises at least one profile criterion. The method also includes evaluating the profile criterion based, at least in part, on status information associated with the client device to determine any processing restrictions associated with the requested resource. ... Airwatch Llc

10/05/17 / #20170289128

Associating user accounts with enterprise workspaces

Various examples relate to the configuration of enterprise workspaces that can be provided in computing devices. In some examples, a computing device is enrolled with a management service that controls operation of at least a portion of the computing device. ... Airwatch Llc

10/05/17 / #20170288959

Configuring enterprise workspaces

Various examples relate to the configuration of enterprise workspaces that can be provided in computing devices. In some examples, a computing device is enrolled with a management service that controls operating of at least a portion of the computing device. ... Airwatch Llc

10/05/17 / #20170288883

Certificate distribution using derived credentials

Disclosed are approaches for distributing credentials using derived credentials, such as by relaying a simple certificate enrollment protocol (scep) payload. A computing device configures a device profile corresponding to a client device. ... Airwatch Llc

10/05/17 / #20170286689

Detecting vulnerabilities in managed client devices

Various examples relate to detecting vulnerabilities in managed client devices. In some examples, a system determines whether a vulnerability scan of a computing device is required to be performed. ... Airwatch Llc

10/05/17 / #20170286129

Managed application detection logic

Various examples for application management detection are described. In one example, depending upon whether an installation token includes a unique token value, a client device can determine whether an application is managed or unmanaged. ... Airwatch Llc

10/05/17 / #20170286081

Silent installation of software with dependencies

Disclosed are various examples for the silent installation of software and its dependencies using a single installation package file. A computing environment can generate a core installation package file that directs an installer application to silently install a secondary installer application and copy one or more installation package files to memory accessible by the secondary installer application. ... Airwatch Llc

10/05/17 / #20170286075

Resource injection for application wrapping

Disclosed are various approaches for injecting resources into wrapped applications. A computing device first obtains a compiled version of a target application package. ... Airwatch Llc

09/28/17 / #20170279792

Application authentication wrapper

Disclosed are various approaches for implementing an application authentication wrapper. An authentication request, such as a kerberos request, is created for authenticating the computing device. ... Airwatch Llc

09/28/17 / #20170279733

Controllng distribution of resources on a network

Disclosed are various embodiments for controlling distribution of resources on a network. In one embodiment, among others, a processor receives a request from a client device to access resources hosted by a distribution service. ... Airwatch Llc

09/28/17 / #20170279731

Controllng distribution of resources in a network

Disclosed are various embodiments for accessing resources when a client device complies with distribution rules. A client device receives selected resources and distribution rules associated with the resources. ... Airwatch Llc

09/28/17 / #20170278070

Content access based on location or time

Disclosed are various approaches for providing access to content based on the location of a client device or the current time. A calendar service creates an event comprising a time and a duration. ... Airwatch Llc

09/28/17 / #20170277885

Password hint policies on a user provided device

Disclosed are various examples for remotely managing passwords using local security policies. A client device can be enrolled with a management service. ... Airwatch Llc

09/21/17 / #20170269955

Enforcing compliance rules using guest management components

A system can include a host device that includes a virtual machine execution environment that includes a hypervisor and a virtual machine. The virtual machine can execute a guest management component. ... Airwatch Llc

09/21/17 / #20170269954

Enforcing compliance rules using host management components

A system can include a host device that includes a virtual machine execution environment. The host device can execute a host management component in the host device and determine whether a hypervisor or a virtual machine in the virtual machine execution environment violates at least one compliance rule. ... Airwatch Llc

09/14/17 / #20170264593

System and method to secure the streaming of media to a valid client

Disclosed are various examples for securing the streaming of a media file from a web service to a media player. A request for a portion of a media file can be received including an authentication key. ... Airwatch Llc

09/07/17 / #20170255378

Systems and methods for performing erasures within a graphical user interface

Examples described herein include improved systems and methods for performing erasures and edits within a graphical user interface. A computing device can include a processor that detects skin contact with a touch-screen display of the computing device. ... Airwatch Llc

08/31/17 / #20170250977

Provisioning of applications deployed on client devices

Disclosed are various examples for deploying applications on client devices through a management service. A client device can be enrolled with a management service. ... Airwatch Llc

08/10/17 / #20170230848

Visual privacy systems for enterprise mobility management

Systems herein allow a user to use their personal user device to perform functions in an enterprise environment in exchange for enrolling at a management server. The management server can provide a privacy component that allows the user to view a privacy profile summarizing data collection activities of the management server. ... Airwatch Llc

08/10/17 / #20170230334

Enterprise mobility management and network micro-segmentation

Disclosed are various examples for the use of network micro-segmentation in enterprise mobility management. In one example, a gateway receives network traffic from a client device through a virtual private network (vpn) tunnel. ... Airwatch Llc

08/10/17 / #20170230281

Segregating vpn traffic based on the originating application

Disclosed are various examples for segregating virtual private network (vpn) traffic based on the originating client application. A tunnel endpoint receives, through a network tunnel, network traffic sent by a client application executed by a client device. ... Airwatch Llc

08/10/17 / #20170228549

Preventing restricted content from being presented to unauthorized individuals

A system includes a computing device and a storage device storing computer instructions that are executable by the computing device. The computer instructions cause the computing device to detect a request to render content in a first display of a primary user device. ... Airwatch Llc

08/10/17 / #20170228245

Managed virtual machine deployment

A system can include computer instructions that can cause a computing device to obtain a request to access an application on behalf of a user. The request can be obtained from a client device associated with the user. ... Airwatch Llc

08/10/17 / #20170228107

Generating predictive action buttons within a graphical user interface

Examples described herein include systems for generating a predictive action button within a graphical user interface. The system can launch an action generator that tracks a user's behavior, either directly or through the use of an action profile. ... Airwatch Llc

08/03/17 / #20170222977

Configuring network security based on device management characteristics

Disclosed are various examples for configuring network security based on device management characteristics. In one example, a specification of a set of network resources on an internal network is received from an administrator client. ... Airwatch Llc

08/03/17 / #20170220368

Thin client with managed profile-specific remote virtual machines

Systems herein include thin clients that operate with managed profile-based virtual machines. This can allow users to utilize personal user devices in an enterprise environment without subjecting sensitive enterprise credentials to the user device. ... Airwatch Llc

06/01/17 / #20170155684

Enforcement of proximity based policies

Embodiments of the disclosure are related to enforcing a policy on a computing device, or a companion device, based upon its proximity to another computing device, or an anchor device. In one example, the anchor device and companion device can report their location with respect to one another to a policy server. ... Airwatch Llc

06/01/17 / #20170155660

Controlling electronically communicated resources

Methods, systems, and devices provide control over resources electronically communicated among computing devices. In some embodiments, a management application identifies multiple entities for communicating electronic content. ... Airwatch Llc

06/01/17 / #20170155640

Single sign-on for managed mobile devices using kerberos

Disclosed are various examples for single-sign on by way of managed mobile devices using kerberos. For example, a certificate is received from a client device. ... Airwatch Llc

05/18/17 / #20170142048

Enhanced e-mail delivery to mobile devices

Systems and methods for providing e-mail to a mobile client are disclosed. In one example, the method can include receiving, at a server associated with transmitting e-mail to the mobile client, an indication of a battery level in the mobile client. ... Airwatch Llc

05/18/17 / #20170140658

Systems for classroom media sharing

Systems herein allow a student to share media with other students in a classroom with the permission of a teacher. The student can send a sharing request to a management server with a sender student device. ... Airwatch Llc

05/18/17 / #20170139845

Managing grouped student devices with timed locks

Systems and methods presented here can allow a teacher to schedule the locking of one or more student devices into an asset at some time in the future. A teacher device can be used to configure lock information, including student identifying information, lock type information, asset information, and lock timing information. ... Airwatch Llc

05/11/17 / #20170133058

Systems for optimized presentation capture

Systems herein allow a user to record a presentation with a slides file. The system can record action events generated by a viewer application that displays slides of the slides file. ... Airwatch Llc

05/04/17 / #20170126755

Systems for content recommendation based on a meeting invite

Systems herein can recommend files to users based on meeting information. The system can include a secure email gateway that forwards meeting invitations to an email server and a content server. ... Airwatch Llc

05/04/17 / #20170126692

Remote processsing of mobile applications

In an example implementation of the disclosed technology, a method includes accessing, by a management agent associated with a client device, a profile associated with a requested resource, wherein the profile comprises at least one profile criterion. The method also includes evaluating the profile criterion based, at least in part, on status information associated with the client device to determine any processing restrictions associated with the requested resource. ... Airwatch Llc

05/04/17 / #20170126661

Multi-factor authentication for managed applications using single sign-on technology

Disclosed are various examples for facilitating multi-factor authentication for client applications that are configured to use single sign-on technology. An authentication request for a first client application executed in a client device is received by an identity provider. ... Airwatch Llc

05/04/17 / #20170126660

Selectively enabling multi-factor authentication for managed devices

Disclosed are various examples of selectively enabling multi-factor authentication for applications on managed devices. An identity provider receives an authentication request for a first client application executed in a managed client device. ... Airwatch Llc

05/04/17 / #20170124342

Applying rights management policies to protected files

Examples of the present disclosure relate to protecting tiles with an information rights policy. Files can be protected as specified by a content policy associated with the file. ... Airwatch Llc

05/04/17 / #20170124036

Decoupling and relocating bookmarks and annotations from files

Disclosed are various examples for generating, storing, and loading references separate from a file. A request can be received to generate a reference for a file. ... Airwatch Llc

04/27/17 / #20170118246

Detection of offline attempts to circumvent security policies

Disclosed are approaches for detecting attempts to circumvent security policies on a client device. A deletion of a user account on a computing device is detected, wherein the deletion is initiated locally on the computing device and the user account is associated with an enrollment of the computing device with a management service. ... Airwatch Llc

04/27/17 / #20170118211

Native enrollment of mobile devices

Disclosed are approaches for native enrollment of mobile devices. A first message is received from a client device, wherein the first message comprises an enrollment request for the client device. ... Airwatch Llc

04/27/17 / #20170118197

Sharing data between sandboxed applications with certificates

Disclosed are various approaches for sharing data between sandboxed applications with certificates. A request for a certificate is received from a client device. ... Airwatch Llc

04/27/17 / #20170118186

Searching content associated with multiple applications

Disclosed are examples of searching for content associated with multiple applications. In various examples, a first application can obtain a search query and provide a request to a second application to search for content associated with the second application that corresponds to the search query. ... Airwatch Llc

04/27/17 / #20170115979

Enforcement of updates for devices unassociated with a directory service

Disclosed are approaches for enforcement of updates for devices unassociated with a directory service. An application executing on a computing device can determine, based on a policy received from a management service, that the computing device is to use an update service specified in the policy to receive updates. ... Airwatch Llc

04/13/17 / #20170104766

Analog security for digital data

Disclosed are various examples of providing analog security for digital data. Content is split into a plurality of framelets. ... Airwatch Llc

03/23/17 / #20170083590

Secure bubble content recommendation based on a calendar invite

Systems herein allow a user device to monitor calendar events with a secure bubble application. When an event is upcoming, the secure bubble application can present a notification. ... Airwatch Llc

03/16/17 / #20170078336

Providing on-demand vpn connectivity on a per-application basis

Disclosed are various approaches for providing on-demand virtual private network (vpn) connectivity on a per-application basis. First, an application is determined to have begun execution on a computing device. ... Airwatch Llc

03/16/17 / #20170078306

Individual-specific content management

A method, system, apparatus, and computer program product are provided for facilitating individual-specific content management. For example, a method is provided that includes receiving information regarding at least one prerequisite condition relating to at least one individual, receiving information regarding the at least one individual, determining whether the at least one prerequisite condition is satisfied, and causing individual-specific content associated with the at least one individual to be transmitted. ... Airwatch Llc

03/16/17 / #20170078261

Directory service user synchronization

Disclosed are various examples for enrolling a client device and synchronizing user attributes for the client device across multiple directory services. A search request for user attributes can be sent to a first directory service with an identifier for a user account. ... Airwatch Llc

03/16/17 / #20170076101

Systems for modular document editing

Systems herein allow a content manager to share portions of a document with different groups of users. The system can parse the document into screen shots of each page along with an information bundle that describes how to format content on each page. ... Airwatch Llc

03/09/17 / #20170068829

Screen shot marking and identification for device security

Disclosed are examples of marking screenshots and identifying screenshots that have been marked. A client application or a computing environment can generate a watermark template for encoding in a user interface of the client application where the watermark template is not visible to the user of a client device. ... Airwatch Llc

03/02/17 / #20170064549

Providing access to applications with varying enrollment levels

Various examples of detecting whether a device meets an enrollment level are disclosed. A request to authenticate a user based upon user credentials is obtained. ... Airwatch Llc

03/02/17 / #20170064040

Per-application network content filtering

Disclosed are various examples for providing network content filtering to client devices on a per-application basis. A network stack receives a request from an application to connect to a network service. ... Airwatch Llc

03/02/17 / #20170063857

Providing access to applications with varying enrollment levels

Various examples of detecting whether a device meets an enrollment level are disclosed. A request to authenticate a user based upon user credentials is obtained. ... Airwatch Llc

03/02/17 / #20170061720

Controlling physical access to secure areas via client devices in a networked environment

A method is disclosed for providing physical access credentials to a client device. The method may include receiving a request for a physical access credential, where the first request includes at least one user access credential and at least one physical access point identifier. ... Airwatch Llc

03/02/17 / #20170060887

On demand file sync

Disclosed are various examples for downloading data objects by enforcing a threshold amount of allocated data. A file sync application determines which data objects to download to the client device such that the total amount of downloaded data meets or falls below the threshold amount of allocated data. ... Airwatch Llc

02/23/17 / #20170053136

Policy-based trusted peer-to-peer connections

Disclosed are various examples for implementations of policy-based trusted peer-to-peer connections. A computing device can receive a message from a first client device, the message specifying a public address of the first client device and an identifier of the second client, device. ... Airwatch Llc

02/16/17 / #20170048279

Rights management services integration with mobile device management

Rights management services (rms) integration with mobile device management (mdm) may be provided. A functionality associated with a document may be restricted according to a document management policy. ... Airwatch Llc

02/16/17 / #20170048097

Managing devices through secondary communication channels

Disclosed are examples of managing devices through secondary communication channels. In some examples, a management component detects an impediment with a data communication channel for a device. ... Airwatch Llc

02/16/17 / #20170046339

Multimedia searching

Disclosed are examples that relate to searching for audio in multimedia files. A transcript specification can be obtained from a file manager that provides restricted access to files associated with an enterprise. ... Airwatch Llc

02/09/17 / #20170041375

Generating content fragments for content distribution

Disclosed are various examples for specifying portions of content files that can be stored on a client device. A content file stored in a remote storage area can be segmented into content fragments. ... Airwatch Llc

02/09/17 / #20170041299

Systems and methods for controlling email access

Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more email attachments from the email resources, and encoding the stripped email attachments based at least in part on one or more cryptographic keys.. . ... Airwatch Llc

02/09/17 / #20170041188

Differential staging of devices in bulk enrollment

Disclosed are various examples for differential staging of devices in bulk enrollment. In one example, a computing environment can detect a network connection event where a client device establishes a connection with a network device that is communicatively coupled to the computing environment. ... Airwatch Llc

02/09/17 / #20170041151

Secure certificate distribution

Disclosed are various examples of securely distributing certificates to client devices. A uniform resource locator (url) is sent to a client device, wherein the url represents an address from which the client device can request a user certificate. ... Airwatch Llc

02/09/17 / #20170039388

Multi-party authentication and authorization

Disclosed are various examples for multi-party authentication and authentication. In one example, a user who forgets a password can gain access to secured data stored by a managed device by way of an authorization by one or more other users. ... Airwatch Llc

02/02/17 / #20170032042

Multiple domain directory integration

Disclosed are various examples of integrating multiple domains within a directory service. A computing device retrieves a first list of members in a first group of users for the domain from a first directory service for a first domain. ... Airwatch Llc

02/02/17 / #20170031737

Restricted application visibility

Disclosed are various examples of providing a secured application launcher for initiating execution of access-restricted applications. A computer disables a default launch activity alias for a user application, wherein the default launch activity alias comprises a first reference to an application programming interface (api) to initiate execution of the user application. ... Airwatch Llc

01/26/17 / #20170026444

Policy driven media consumption framework

Disclosed are various examples of providing a client device with media content based on policies applied to the client devices. A computing device receives a request for media content from a client device. ... Airwatch Llc

01/26/17 / #20170026353

Management of access sessions

Disclosed are examples of managing access sessions for a computing device. In some examples, a computing device obtains a key and timeout data from secured storage. ... Airwatch Llc

01/26/17 / #20170026308

Controlling resources used by computing devices

Various examples for controlling resources used by client devices are disclosed. A management application executing in at least one computing device can identify client devices executing an instance of a client application that are available for management, where the client application is configured to control at least one function of a respective one of the client devices. ... Airwatch Llc

01/12/17 / #20170012846

Application network usage management

Disclosed are examples that relate to monitoring network usage by client devices and enforcing compliance rules related thereto. In various examples, a system can intercept a network call in transit from a client application to an operating system of a client device, wherein the network call is configured to cause a content provider to transmit content to the operating system over a carrier network, and wherein the network call is further configured to cause the operating system to transmit the content to the client application; can modify the configuration of the network call such that the network call causes the operating system to transmit the content to the management component; can receive the content from the operating system; can analyze the content for network usage; can create a network usage analysis; and, can provide the content to the client application.. ... Airwatch Llc

01/05/17 / #20170005802

Systems and methods for controlling email access

Embodiments of the disclosure relate to controlling access to email content. According to various embodiments as described herein, an email message may be accessed by a computing device to identify a uniform resource locator (url) within the email message, wherein the url corresponds to a resource residing in a protected location that is not accessible by a native browser application of the client device. ... Airwatch Llc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Airwatch Llc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Airwatch Llc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###