Patent application number | Description | Published |
20110319056 | REMOTE ACCESS TO A MOBILE DEVICE - The disclosed subject matter relates to various architectures that can facilitate establishing a remote user interface (UI) by way of a secure connection session. The remote UI can reflect one or more interfaces extant on a mobile device (e.g., a smartphone with a Linux-based operating system (OS)), yet can be implemented on a remote device, typically of a higher form factor and/or equipped with superior computing, interface, and presentation resources. In particular, the remote UI can access all or a subset of the data or services extant on the mobile device. | 12-29-2011 |
20120159567 | CONTEXTUAL ROLE AWARENESS - The disclosed subject matter relates to an architecture that can provide contextual role awareness. For example, rather than focusing on features and functionality at the device level, features and functionality can be controlled based upon various roles that can be related to various personas of a user. Thus, in a business or enterprise setting, the enterprise can manage a business role in accordance with that enterprise's security objectives, which might dramatically limit certain features for the user. However, the user can quickly switch roles, away from the business role in order to again access desired features, yet without compromising the security objectives of the enterprise. | 06-21-2012 |
20130231093 | ENHANCED DEPLOYMENT OF APPLICATIONS - Systems and methods for managing distribution of applications are provided herein. A host server can act as an intermediary between a communications device and an app store in order to manage distribution of applications to the communications device. Thus, the host server can receive from the communications device an app request for an application that resides at the app store. The host server can examine various catalog information and provide a package that includes the application to the communications device. | 09-05-2013 |
20130260713 | USAGE METERING FOR CUSTOM APPLICATION CONTAINERS - Systems and methods for metering network usage based upon an active container are provided herein. Multiple containers that encapsulate respective sets of applications included in an application layer of a mobile operating system can be provided. These containers can interface to the mobile operating system and manage interaction between the mobile operating system and the encapsulated application(s). Usage data facilitated by an application from the respective sets of applications can be identified and the usage data can be associated to an appropriate container, which is detail not available to device-level usage data. | 10-03-2013 |
20130260730 | CUSTOM APPLICATION CONTAINER FOR MOBILE OPERATING SYSTEMS AND/OR DEVICES - Systems and methods for providing a custom application container for a mobile operating system are provided herein. A container that encapsulates an application layer of a mobile operating system can be provided. Thus, the container can include all applications that reside in the application layer and operate as a proxy for system calls issued by the applications to the mobile operating system. In particular, the container can intercept core service request and forward those requests to pluggable extensions relating to a core service requested by the core service request. | 10-03-2013 |
20140201531 | ENHANCED MOBILE SECURITY - Systems and methods for utilizing a remote server for storing credentials associated with a mobile device. For example, a login credential and/or a token credential can be stored at the remote server rather than at the mobile device. Because these credentials are stored at the remote server, the ecosystem including the mobile device and certain applications or services used by the mobile device can be more secure than conventional architectures. | 07-17-2014 |
20140201532 | ENHANCED MOBILE SECURITY - Systems and methods for utilizing a remote server for storing credentials associated with a mobile device. For example, a login credential and/or a token credential can be stored at the remote server rather than at the mobile device. Because these credentials are stored at the remote server, the ecosystem including the mobile device and certain applications or services used by the mobile device can be more secure than conventional architectures. | 07-17-2014 |
20140208313 | ENHANCED DEPLOYMENT OF APPLICATIONS - Systems and methods for managing distribution of applications are provided herein. A host server can act as an intermediary between a communications device and an app store in order to manage distribution of applications to the communications device. Thus, the host server can receive from the communications device an app request for an application that resides at the app store. The host server can examine various catalog information and provide a package that includes the application to the communications device. | 07-24-2014 |