Abstract:
A system comprising a first mobile device and a second mobile device. The first mobile device includes a memory and an output arrangement. The memory stores a staging profile. The staging profile is used to configure at least a portion of the first mobile device. The second mobile device includes an input arrangement. The input arrangement obtains the staging profile from the output arrangement. At least a portion of the second mobile device is configured using the staging profile.
Abstract:
Described is a method and system for controlling usage of software on a computng device An authorization key (16a) is generated as a function of a device string (6a), a unique string (6a) stored in the device, and a software string (10), a unique string (10) stored in software (4) authorized for use on the device The authorization key (16a) is encrypted using a private key and stored in the device Upon a request to use software (4) on the device, the authorization key (16a) is decrypted using a public key corresponding to the private key A test key is generated as a function of the device string and a request software string, a unique string stored in the software for which use has been requested The authorizatin key is compared to the test key When the test key matches the authorization key, usage of the requested software is permitted
Abstract:
Described is a method including receiving an offline management policy from an enterprise management system of a network, the offline management policy including a triggering parameter and a management action and storing the offline management policy. The collected parameter is compared to the triggering parameter when a device is offline from the network and the management action is initiated when the collected parameter satisfies the triggering parameter.
Abstract:
A system for staging a mobile device is described. The mobile device includes a processor that executes a software application. A memory stores a unique identifier for the mobile device. The unique hardware identifier is readable by the software application and unreadable by any system that is external to the mobile device. The mobile device also includes a radio frequency identification (RFID) tag associated with the mobile device. The RFID tag stores a unique serial number that is readable by a staging system external to the mobile device and by the software application. The staging system encrypts a staging profile using both the unique serial number and the unique hardware identifier to create a device-specific key. The staging system writes the encrypted staging profile to the RFID tag.
Abstract:
Described is a system having a receiving element to receive configuration information for a network appliance and a generation element to generate codes for a readable element. The readable element is configured to be read by a reading element of the network appliance and the configuration information configures the network appliance for operation on a network.
Abstract:
Automatic Security Compliance Assessment (ASCA) systems and methods are provided for automatically generating and determining a security rating for a plurality of Settings Objects (SOs), where each of the SOs define particular configurations of subsystems of a wireless computing device. Each SO collectively defines a collection of Values specified for Configurable Attributes that can be used to define a different configuration for a particular subsystem associated with a particular Setting Class that is used to guide the creation of that particular SO. The server can store a group of security rating templates, each of which includes the information needed to determine an expected security rating for any SOs created per a particular Settings Class. For any combination of device settings, the resultant SOs can be used to generate an expected security rating.
Abstract:
Automatic Security Compliance Assessment (ASCA) systems and methods are provided for automatically generating and determining a security rating for a plurality of Settings Objects (SOs), where each of the SOs define particular configurations of subsystems of a wireless computing device. Each SO collectively defines a collection of Values specified for Configurable Attributes that can be used to define a different configuration for a particular subsystem associated with a particular Setting Class that is used to guide the creation of that particular SO. The server can store a group of security rating templates, each of which includes the information needed to determine an expected security rating for any SOs created per a particular Settings Class. For any combination of device settings, the resultant SOs can be used to generate an expected security rating.
Abstract:
Described is a method for receiving, on a first device connected to a network, a communication including information corresponding to a second device which is not connected to the network. The information is stored on the first device and transmitted to an enterprise management system for the network, wherein the information includes an indication that the information corresponds to the second device.
Abstract:
A wireless networking system includes a network appliance and at least one mobile device. The mobile device comprises an application module, a discriminating application programming interface (API) that is executable within the context of the application and configured to receive data related to execution of the application and to determine whether the data is of a type that is to be monitored, and a monitoring API that is executable within the context of the application and configured to extract the data if the discriminating API determines the data is of a type that is to be monitored. The mobile device further comprises a wireless agent configured to extract and transmit the monitored data to the network appliance.