Patent classifications
G06F21/51
Mobile device security, device management, and policy enforcement in a cloud-based system
Mobile device security, device management, and policy enforcement are described in a cloud-based system where the “cloud” is used to pervasively enforce security and policy and perform device management regardless of device type, platform, location, etc. A method includes receiving one or more mobile profiles for one or more mobile devices each associated with a user from an enterprise; responsive to enrollment of a mobile device of the one or more mobile devices, communicating to the mobile device; determining an associated mobile profile of the one or more mobile profiles for the mobile device; and configuring the mobile device based on the associated mobile profile.
COMPUTER-BASED PLATFORMS AND SYSTEMS CONFIGURED TO ENHANCE A CALL SCREEN WITH USER-CONTROLLED NOTES ASSOCIATED WITH THE CALL AND METHODS OF USE THEREOF
In some embodiments, the present disclosure provides an exemplary method that may include steps of obtaining a permission from the user to monitor a plurality of activities executed within the computing device; continually monitoring the plurality of activities executed within the computing device for a predetermined period of time; identifying an indication of an incoming interaction session within the predetermined period of time; verifying at least one session interaction parameter associated with the incoming interaction session to identify the incoming interaction session as a repeat interaction session; dynamically retrieving at least one relation-specific notation from a plurality of relation-specific notations to display; instructing an input GUI element to display input data associated with the repeat interaction; automatically updating the plurality of relation-specific notations associated with the historical data relationship; and instructing at least one programmable output GUI to display a notification identifying the update of the plurality of relation-specific notations.
COMPUTER-BASED PLATFORMS AND SYSTEMS CONFIGURED TO ENHANCE A CALL SCREEN WITH USER-CONTROLLED NOTES ASSOCIATED WITH THE CALL AND METHODS OF USE THEREOF
In some embodiments, the present disclosure provides an exemplary method that may include steps of obtaining a permission from the user to monitor a plurality of activities executed within the computing device; continually monitoring the plurality of activities executed within the computing device for a predetermined period of time; identifying an indication of an incoming interaction session within the predetermined period of time; verifying at least one session interaction parameter associated with the incoming interaction session to identify the incoming interaction session as a repeat interaction session; dynamically retrieving at least one relation-specific notation from a plurality of relation-specific notations to display; instructing an input GUI element to display input data associated with the repeat interaction; automatically updating the plurality of relation-specific notations associated with the historical data relationship; and instructing at least one programmable output GUI to display a notification identifying the update of the plurality of relation-specific notations.
RAPID LAUNCH OF SECURE EXECUTABLES IN A VIRTUALIZED ENVIRONMENT
Rapid launch of secure executables in a virtualized environment includes using a persisted security cache in a virtualized component (VC), such as a virtual machine. The VC generates a cache integrity value (IV), such as a hash value, for the security cache and sends it to a remote validator, which returns an indication of security cache validity or invalidity. Upon receiving a request to execute applications, the VC analyzes whether the applications have been determined to be safe to execute and have not been altered. The VC retrieves application IVs from the security cache, rather than hashing each of the applications, thereby saving compute time, and sends the application IVs to a remote validator, which returns an indication of application validity or invalidity.
RAPID LAUNCH OF SECURE EXECUTABLES IN A VIRTUALIZED ENVIRONMENT
Rapid launch of secure executables in a virtualized environment includes using a persisted security cache in a virtualized component (VC), such as a virtual machine. The VC generates a cache integrity value (IV), such as a hash value, for the security cache and sends it to a remote validator, which returns an indication of security cache validity or invalidity. Upon receiving a request to execute applications, the VC analyzes whether the applications have been determined to be safe to execute and have not been altered. The VC retrieves application IVs from the security cache, rather than hashing each of the applications, thereby saving compute time, and sends the application IVs to a remote validator, which returns an indication of application validity or invalidity.
AUTOMATED PERSISTENT CONTEXT-AWARE DEVICE PROVISIONING
An information handling system may determine a personality flag value during a boot process, and execute a system update handler configured for connecting to a control plane. The system may also provision a software application in a current operating system environment or erase the existing operating system and provisional new environment including receiving the software application responsive to a secure profile and validating the software application prior to loading.
AUTOMATED PERSISTENT CONTEXT-AWARE DEVICE PROVISIONING
An information handling system may determine a personality flag value during a boot process, and execute a system update handler configured for connecting to a control plane. The system may also provision a software application in a current operating system environment or erase the existing operating system and provisional new environment including receiving the software application responsive to a secure profile and validating the software application prior to loading.
Systems and methods of software load verification
A system configured to perform software load verification. The system includes a memory, a network interface, and a processor. The memory is configured to store first data indicating expected load events. The network interface is configured to receive load verification data and a cryptographic signature from a software update target device. The load verification data is descriptive of particular load events related to loading software at the software update target device. The processor is configured to authenticate that the load verification data is received from the software update target device based on the cryptographic signature. The processor is also configured to, responsive to authenticating that the load verification data is received from the software update target device, performing a comparison of the particular load events and the expected load events. The processor is further configured to perform a response action based on results of the comparison.
Systems and methods of software load verification
A system configured to perform software load verification. The system includes a memory, a network interface, and a processor. The memory is configured to store first data indicating expected load events. The network interface is configured to receive load verification data and a cryptographic signature from a software update target device. The load verification data is descriptive of particular load events related to loading software at the software update target device. The processor is configured to authenticate that the load verification data is received from the software update target device based on the cryptographic signature. The processor is also configured to, responsive to authenticating that the load verification data is received from the software update target device, performing a comparison of the particular load events and the expected load events. The processor is further configured to perform a response action based on results of the comparison.
Certificate based profile confirmation
Disclosed are various embodiments for controlling access to resources in a network environment. Methods may include installing a profile on the device and installing a certificate included in or otherwise associated with the profile on the device. A request to execute an application, and/or access a resource using a particular application, is received and determination is made as to whether the certificate is installed on the device based on an identification of the certificate by the application. If the certificate is installed on the device, then execution of the application and/or access to the resource is allowed. If the certificate is not installed on the device, then the request for execution and/or access is refused.