Extending management control to IoT devices

    公开(公告)号:US11178185B2

    公开(公告)日:2021-11-16

    申请号:US16730184

    申请日:2019-12-30

    Abstract: A technique uses a managed computing device to extend management control by an organization to IoT (Internet of Things) devices in a local environment of the computing device. The computing device discovers any local IoT devices and participates in a communication with a server to bring one or more of the IoT devices under management control. In some examples, extending management control involves enrolling selected IoT devices into a management framework of the organization and directing communications between the server and the respective IoT devices through the managed device, which provides a point-of-presence for administering management of the selected IoT devices in the local environment.

    LEVERAGING LOCATION INFORMATION OF A SECONDARY DEVICE

    公开(公告)号:US20200213318A1

    公开(公告)日:2020-07-02

    申请号:US16730352

    申请日:2019-12-30

    Abstract: A technique for managing computerized access includes a first computing device that receives location information from a second computing device that shares its network connection with the first computing device. The first computing device applies the location information received from the second computing device when requesting access to a resource on the network. The first computing device thus effectively leverages the presence of the second computing device and its location information to increase authentication strength and/or to facilitate the administration of access rights.

    SYSTEMS AND METHODS FOR ADDING WATERMARKS USING AN EMBEDDED BROWSER

    公开(公告)号:US20220300584A1

    公开(公告)日:2022-09-22

    申请号:US17838759

    申请日:2022-06-13

    Abstract: Embodiments described include systems and methods for adding watermarks using an embedded browser. To provide protection to sensitive information from a network application rendered via an embedded browser of a client application, the client application can generate an overlay with a digital watermark, and apply the overlay over the embedded browser. The client application can selectively generate such overlays, and can customize the format of the digital watermark according to the information rendered on the embedded browser. The watermark can remain with any information that is imaged from the embedded browser, and provides a deterrent against misuse of the information via image capture from a computer screen for instance. By adjusting properties (e.g., contrast) of such an image, the watermark can be made visible and detectable, thus allowing such imaging activities and information to be tracked.

    EXTENDING MANAGEMENT CONTROL TO loT DEVICES

    公开(公告)号:US20220030033A1

    公开(公告)日:2022-01-27

    申请号:US17495054

    申请日:2021-10-06

    Abstract: A technique uses a managed computing device to extend management control by an organization to IoT (Internet of Things) devices in a local environment of the computing device. The computing device discovers any local IoT devices and participates in a communication with a server to bring one or more of the IoT devices under management control. In some examples, extending management control involves enrolling selected IoT devices into a management framework of the organization and directing communications between the server and the respective IoT devices through the managed device, which provides a point-of-presence for administering management of the selected IoT devices in the local environment.

    AUTHENTICATING TO SECURED RESOURCE VIA COUPLED DEVICES

    公开(公告)号:US20200213317A1

    公开(公告)日:2020-07-02

    申请号:US16730304

    申请日:2019-12-30

    Abstract: A technique for performing authentication includes a first device receiving security data from a second device that shares its network connection with the first device. The first device applies the security data received from the second device when requesting authentication to a secured resource on the network. For example, the security data may include a token code or other data that may be used as a token, such as identification information about the second device.

    Systems and methods for adding watermarks using an embedded browser

    公开(公告)号:US12229229B2

    公开(公告)日:2025-02-18

    申请号:US17838759

    申请日:2022-06-13

    Abstract: Embodiments described include systems and methods for adding watermarks using an embedded browser. To provide protection to sensitive information from a network application rendered via an embedded browser of a client application, the client application can generate an overlay with a digital watermark, and apply the overlay over the embedded browser. The client application can selectively generate such overlays, and can customize the format of the digital watermark according to the information rendered on the embedded browser. The watermark can remain with any information that is imaged from the embedded browser, and provides a deterrent against misuse of the information via image capture from a computer screen for instance. By adjusting properties (e.g., contrast) of such an image, the watermark can be made visible and detectable, thus allowing such imaging activities and information to be tracked.

    EXTENDING MANAGEMENT CONTROL TO IoT DEVICES
    10.
    发明申请

    公开(公告)号:US20200213360A1

    公开(公告)日:2020-07-02

    申请号:US16730184

    申请日:2019-12-30

    Abstract: A technique uses a managed computing device to extend management control by an organization to IoT (Internet of Things) devices in a local environment of the computing device. The computing device discovers any local IoT devices and participates in a communication with a server to bring one or more of the IoT devices under management control. In some examples, extending management control involves enrolling selected IoT devices into a management framework of the organization and directing communications between the server and the respective IoT devices through the managed device, which provides a point-of-presence for administering management of the selected IoT devices in the local environment.

Patent Agency Ranking