Patent application number | Description | Published |
20110283347 | USING A TRUSTED TOKEN AND PUSH FOR VALIDATING THE REQUEST FOR SINGLE SIGN ON - Providing access to an enterprise application from a telecommunications device via a client, through a device server, and an intermediate application gateway (IAG), is disclosed. The server is communication with the client and the IAG. The IAG and client are in indirect communication via the server. The client is operative to request an enterprise application token from the IAG using a dataset comprising a device identifier and a user identifier, without concurrently prompting a user for the dataset. The IAG is operative to prepare a token in response to the request, and push the token to an e-mail address associated with the telecommunications device via the server's push proxy gateway. The client is operative to employ the token in communications addressed to an enterprise application via the server and the IAG. The IAG is operative to replace the token in each communication with identification information called for by the enterprise application. | 11-17-2011 |
20120208586 | COMMUNICATIONS SYSTEM CONFIGURED TO CORRECT AN ASSOCIATION MISMATCH AND RELATED METHODS - A communications system includes a service provider device, a mobile wireless communications device, and a plurality of communication infrastructure nodes. The plurality of communication infrastructure nodes are configured to generate an association mismatch communications path between the service provider device and the mobile wireless communications device, the association mismatch communications path including at least two communication infrastructure nodes in series. The plurality of communications infrastructure nodes are also configured to generate a corrected association communications path between the service provider device and the mobile wireless communications device from the mismatch communications path, the corrected association communications path including just a single communication infrastructure node from the at least two communication infrastructure nodes. | 08-16-2012 |
20130097316 | Associating Services to Perimeters - In some implementations, a method includes receiving, from a user of a first device, a request to enable access, through a second device, to a server resource account of an enterprise. The first device includes a first enterprise perimeter including an internal resource and a first enterprise identifier and configured to prevent external resources from accessing the internal resource. A request is wirelessly transmit, to the second device, to the second device for a second enterprise identifier assigned to a second enterprise perimeter included in the second device. Whether to grant access to the internal resource is determined based on a first enterprise identifier assigned to the first device and a second enterprise identifier assigned to the second device. | 04-18-2013 |
20130219471 | ESTABLISHING CONNECTIVITY BETWEEN AN ENTERPRISE SECURITY PERIMETER OF A DEVICE AND AN ENTERPRISE - A first device establishes a connection with a second device and attempts access, via the connection to an enterprise server of an enterprise. The first device may have a number of security perimeters, ones of which are allowed to use various communications proxies provided by the second device. If the first device and the second device are associated with a same common enterprise, an enterprise perimeter of the first device may be enabled to access the enterprise using an enterprise proxy of the second device. | 08-22-2013 |
20130304847 | METHOD, SYSTEM AND APPARATUS FOR TRANSFERRING DATA VIA MORE THAN ONE COMMUNICATIONS INTERFACE - A method system and apparatus for transferring data via more than one communications interface are provided. A data file is transferred, at a processor of a device, and via at least one communications network, on a first communications interface of the device and a second communications interface of the device, the second communications interface different from the first communications interface. | 11-14-2013 |
20140310512 | SECURE NETWORK TUNNEL BETWEEN A COMPUTING DEVICE AND AN ENDPOINT - The present disclosure presents a system, method and apparatus herein enabling secure coupling of a computing device, such as a mobile device with an endpoint, such as an application server. The computing device can include any electronic device such as a computer, a server, an application server, a mobile device or tablet. The endpoint can be any electronic device as well that is located within an enterprise network. In at least one embodiment, the secure coupling of the mobile device with a computing device can include a security gateway server. In one example, the security gateway server can be a tunnel service server. In another embodiment, an application server can include a tunnel service module to provide the secure coupling with the mobile device. | 10-16-2014 |
20150178690 | METHODS AND APPARATUS FOR MANAGING HIERARCHICAL CALENDER EVENTS - An example disclosed method involves associating a second calendar event with a first calendar event as a hierarchical child of the first calendar event, and displaying the first and second calendar events at date and time locations on the same calendar view of a calendar program. | 06-25-2015 |