会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • ADMINISTRATION OF PROTECTION OF DATA ACCESSIBLE BY A MOBILE DEVICE
    • 移动设备可访问数据的管理
    • US20080052395A1
    • 2008-02-28
    • US11926454
    • 2007-10-29
    • Michael WrightPeter BoucherGabe NaultMerrill SmithSterling JacobsonJonathan WoodRobert Mims
    • Michael WrightPeter BoucherGabe NaultMerrill SmithSterling JacobsonJonathan WoodRobert Mims
    • G06F15/173
    • H04L63/20H04L63/045H04L63/08H04L63/166H04L67/18H04W4/02
    • The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
    • 描述了由诸如企业网络内的服务器计算机系统或单独的移动计算设备在客户端移动计算设备上的数据保护。 描述了安全工具,其基于与移动设备正在操作的网络环境相关联的位置来提供不同的安全策略。 描述了用于检测移动设备的位置的方法。 此外,安全工具还可以提供基于安全特征来实施不同的策略。 安全功能的示例包括正在传输数据的有线或无线连接的类型,防病毒软件的操作或网络适配器卡的类型。 不同的安全策略提供可以基于检测到的与移动设备相关联的位置和/或主动安全特征来定制的强制机制。 执行机制的实例是自适应端口阻塞,文件隐藏和文件加密。
    • 4. 发明申请
    • ADMINISTRATION OF PROTECTION OF DATA ACCESSIBLE BY A MOBILE DEVICE
    • 移动设备可访问数据的管理
    • US20080109679A1
    • 2008-05-08
    • US11926371
    • 2007-10-29
    • Michael WrightPeter BoucherGabe NaultMerrill SmithSterling JacobsonJonathan WoodRobert Mims
    • Michael WrightPeter BoucherGabe NaultMerrill SmithSterling JacobsonJonathan WoodRobert Mims
    • G06F11/07
    • H04L63/102H04L63/107H04L63/20H04L67/34H04W12/08
    • The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
    • 描述了由企业网络内的服务器计算机系统或单独的移动计算设备对客户端移动计算设备上的数据进行管理。 描述了安全工具,其基于与移动设备正在操作的网络环境相关联的位置来提供不同的安全策略。 描述了用于检测移动设备的位置的方法。 此外,安全工具还可以提供基于安全特征来实施不同的策略。 安全功能的示例包括正在传输数据的有线或无线连接的类型,防病毒软件的操作或网络适配器卡的类型。 不同的安全策略提供可以基于检测到的与移动设备相关联的位置和/或主动安全特征来定制的强制机制。 执行机制的实例是自适应端口阻塞,文件隐藏和文件加密。