This disclosure relates to securely managing electronic resources.
In many instances, computational devices may include data, applications, and/or network resources whose accessibility are controlled by security protocols. For examples, the security protocols may include user accounts, administration rights, password protection, database management, and others. Though, resources associated with different enterprises and users may require different secured accessibility.
Like reference symbols in the various drawings indicate like elements.
This disclosure provides details and examples of securely managing electronic resources, including techniques for dynamically generating perimeters. A perimeter may generally refer to a logical separation of resources, such as applications, stored data and/or network access. Resources included in a perimeter may be encrypted and password protected to securely separate those resources from resources in different perimeters. For example, resources in different perimeters may not be allowed to transfer between each other. In some implementations, perimeters may include personal perimeters and enterprise perimeters (or corporate perimeters). A personal perimeter may generally refer to a perimeter created by default for a user and managed by the same or a different user through a wireless communication device. An enterprise perimeter may generally refer to a perimeter created for or by a user and managed by a remote management server (e.g., a BlackBerry Enterprise Server (BES)). The personal perimeter may provide permission to be accessed by personal applications, and the enterprise perimeter, when unlocked by the user, may provide permission to be accessed by enterprise applications.
A wireless communication device, such as a tablet computer (e.g., BlackBerry Playbook tablet PC), may be associated with a default perimeter (e.g., a personal perimeter). The default perimeter may include data, application, network access, or other resources that can be used by the wireless communication device for “out of the box” operations. In some implementations, a user of the wireless communication device may add an enterprise account (e.g., a server resource account) to the wireless communication device. The enterprise account may be, for example, an ActiveSync email account, calendar account, or contacts account. The wireless communication device may detect a setting or policy (e.g., a device password protection policy) when the account is set up on the wireless communication device. The setting or policy may be detected by the wireless communication device as a pattern or a parameter. In some implementations, the wireless communication device may dynamically generate a new perimeter based on an event. For example, when a setting or policy is detected, the wireless communication device may automatically generate a new enterprise perimeter to securely separate resources associated with the enterprise account and provide access privileges of the enterprise account to the wireless communication device. In some other implementations, when the setting or policy is detected, a graphic user interface prompt may show on the wireless communication device. The wireless communication device may generate the new enterprise perimeter in accordance with user input through the interface. The new enterprise perimeter may be a private “enterprise” perimeter that can allow the user to download and locally access resources included in the enterprise perimeter on the wireless communication device.
In some aspects, the wireless communication device may access an enterprise server based on using tethering techniques such as a bridge device. Tethering can happen, for example, when the bridge device is a cellular phone (e.g., BlackBerry smartphone), which has both cellular services and wireless local area network (WLAN) services (e.g., Wi-Fi services) enabled, while the wireless communication device can use the WLAN services but not the cellular services. The cellular phone may access, through a cellular network, an enterprise account associated with an enterprise perimeter on an enterprise server. The cellular phone may perform tethering to the wireless communication device through the WLAN. When tethering, a user can add an enterprise account on the wireless communication device through the cellular phone. The wireless communication device may detect a setting or policy stored on the cellular phone associated with the enterprise perimeter, when enterprise account is added on the wireless communication device. The wireless communication device may retrieve settings or policies associated with the enterprise perimeter from the cellular phone. A new, “private”, enterprise perimeter may then be automatically generated on the wireless communication device based on the retrieved settings or policies.
As for a high-level description of system elements, the communication system 100 includes a wireless communication device 102 communicably coupled to networks 104a and 104b (individually and collectively referred to as 104). In addition, the wireless communication device 102 may interact with a device owner 110, one or more users 106a and 106b (individually and collectively referred to as 106), one or more administrators 108a-c (individually and collectively referred to as 108), a combination of the foregoing, or others. The wireless communication device 102 includes perimeters 110a-c, and each perimeter 110 includes data 112, network access resource 114 for providing access to networks, applications 116 for providing services to users 106, configuration files 118 for configuring resources, and a policy 120 for defining policies for accessing enterprise accounts. As for a high-level description of operation, the device 102 receives a request to add resources for accessing an enterprise account in the enterprise network 104a. In response to the request, the device 102 requests account settings and other information for accessing the enterprise account. The device 102 detects that the enterprise account includes one or more security policies based on a pattern included in the account settings such as an email address. The device 102 retrieves the one or more security policies from a server in the enterprise network 104a and automatically generates a perimeter 110 to include applications 116 and one or more security policies 120 for accessing the enterprise account.
Turning to a more detailed description of the elements of the communication system 100, the wireless communication device 102 may be any local or remote computing device operable to receive requests from the user via a user interface, such as a Graphical User Interface (GUI), a CLI (Command Line Interface), or any of numerous other user interfaces. Thus, where reference is made to a particular interface, it should be understood that any other user interface may be substituted in its place. In various implementations, the wireless communication device 102 comprises an electronic computing device operable to receive, transmit, process and store any appropriate data associated with the communication system 100. As used in this disclosure, the wireless communication device 102 is intended to encompass any electronic device and/or computing device that has wireless communication capability. For example, the wireless communication device 102 may comprise a tablet computer, a personal computer, a laptop computer, touch screen terminal, workstation, network computer, kiosk, wireless data port, wireless or wireline phone, personal data assistant (PDA), smartphone, at least one processor within these or other devices, or any other suitable processing device. For example, the wireless communication device 102 may comprise a wireless communication device that includes an input device, such as a keypad, touch screen, mouse, or other device that can accept information, and an output device that conveys information associated with the operation of the resources, including digital data, visual information, or GUI. Both the input device and output device may include fixed or removable storage media such as a magnetic computer disk, CD-ROM, or other suitable media to both receive input from and provide output to users of terminals 106 through the display, such as a GUI. In addition, the device 102 may also include less or more perimeters 110 as compared with the three illustrated perimeters 110. In some implementations, the wireless communication device 102 may include at least one personal perimeter for out-of-the-box operation. Based on validating the identity of the user 106 for accessing the enterprise account, the user 106 may be authenticated to use services and/or access resources associated with the enterprise perimeter 110. The enterprise server may automatically generate policies on the wireless communication device 102. The wireless communication device 102 may then dynamically create a new perimeter 110 associated with the enterprise account, which is discussed in more detail in regards to
The perimeter 110 may include password protection, encryption, and other process for controlling access to resources assigned to the perimeter or internal resources. A perimeter 110 may be generated by the device owner 104, a user 106, an administrator 108, or others. In some examples, the perimeter 110a may be a personal perimeter created by default for the user 106a and managed by the user 106a. In some examples, the perimeter 110a may be an enterprise perimeter created by an administrator 108a for an enterprise and may be managed by a remote management server. In some implementations, each personal perimeter 110 may be associated with a personal account, and each enterprise perimeter 110 may be associated with an enterprise account. In addition, a given perimeter 110 may be accessed by the device owner 104, a user 106, an administrator 108, a combination of the foregoing, or others. In some implementations, each perimeter may be associated with a single user 106; while each user 106 may access multiple device perimeters 110. For example, the user 106a may access resources within both the perimeter 110a and the perimeter 110b. The user 106b may have access to resources in only one perimeter 110c. The device owner 105 may have the ability to remove individual perimeters 110 from the wireless communication device 102. In some implementations, the user 106 may set up or log in to an enterprise account via a user interface. As described previously, the enterprise account may be an account that pushes data to the device 102 (e.g., ActiveSync). When the wireless communication device 102 accesses the account, the perimeter 110 may include policies identifying one or more security settings for the enterprise account. These policies may be at least one of maintained or enforced by an enterprise server (not shown) residing in an enterprise network (or corporate network) 104a. While the perimeters 110 are illustrated as including all aforementioned resources such as data 112, network access resource 114, one or more applications 116, one or more configuration files 118, and one or more policies 120, the perimeters 110 may include some, all or different resources without departing from the scope of the disclosure.
In some implementations, the perimeter 110 may include one of one or more of the following states: unlocked (e.g., all operations to files in a file system domain are allowed; soft locked (e.g., all operations to the files in the domain are allowed, but running applications are prohibited, and user interactions are prevented, until the user unlocks; hard locked (e.g., no operations are allowed to access files in the domain, and the underlying encryption domain is locked); or others. When the system boots up, the domain may be hard locked, i.e., no application can access any resources until the user enters a password. When domain unlocking is executed, the user may be prompted for a password. When the user is validated, the underlying file system domain may be unlocked, and the state of the domain may change to unlocked. When the user selects the “lock” option in the user interface, or an idle timeout occurs, the domain may be soft locked. That is, applications that are running can still write/read from the domain, open/create new files and run as usual. However, user interactions may be prevented since the user interface is locked. If the backend (e.g., the enterprise server) sends a “hard lock” command, the underlying file system may be hard locked. The applications may no longer open, read, write or perform any operations on the files in the domain. Specifically, the domain may be hard locked when it is a) out of reboot, or b) if the backend sends a hard lock command. Otherwise, the domain may either be unlocked or soft locked. The underlying file system domain may not be locked unless it has never been unlocked after reboot or the backend has requested for the file system domain to be locked. Once a user enters a password, the underlying file system may be locked. In some implementations, the user can lock or unlock the user interface.
In the illustrated implementation shown in
The network access resource 114 may include any parameters, variables, policies, algorithms, instructions, settings, or rules for granting access to the network 102a or 102b or other network. For example, the network access resource 114 may include or identify firewall policies for accessing the enterprise network 104a. In some implementations, the network access resources 114 include or otherwise identify one or more of the following: a username; a password; a security token; a Virtual Private Network (VPN) configuration; firewall policies; a communication protocol; encryption key certificates, or others.
The applications 116 may comprise any application, program, module, process, or other software that may execute, change, delete, generate, or otherwise manage business information according to the present disclosure. In certain cases, the communication system 100 may implement a composite application 135. For example, portions of the composite application may be implemented as Enterprise Java Beans (EJBs) or design-time components may have the ability to generate run-time implementations into different platforms, such as J2EE (Java 2 Platform, Enterprise Edition), ABAP (Advanced Business Application Programming) objects, or Microsoft's .NET. Further, while illustrated as internal to the wireless communication device 102, one or more processes associated with the application 116 may be stored, referenced, or executed remotely. For example, a portion of the application 116 may be an interface to a web service that is remotely executed. Moreover, the application 116 may be a child or sub-module of another software module or enterprise application (not illustrated) without departing from the scope of this disclosure. In some implementations, the application 116 may be a hosted solution that allows multiple parties in different portions of the process to perform the respective processing. For example, the enterprise network 102 may access the application 116 on the wireless communication device 102 or even as a hosted application located over network 102b without departing from the scope of this disclosure. In another example, portions of the application 116 may be used by the user 106 working directly at the wireless communication device 102, as well as remotely via enterprise network 102a. In some implementations, the applications 116 may be configured to access at least one of a personal perimeter 110 or an enterprise perimeter 110, which may be referred to as dual mode applications or hybrid mode applications. A dual mode application 116 may access either a personal perimeter 110 or an enterprise perimeter 110. A hybrid mode application 116 may access both a personal perimeter 110 and an enterprise perimeter 110.
The configuration files 118 may include any parameters, variables, policies, algorithms, instructions, settings, or rules for configuring software of the wireless communication device 102. For example, the configurations 118 may include a table that identifies settings for one or more applications 116. In some implementations, the configuration file 118 identifies initial settings for one or more applications 116. In addition to user applications 116, the configuration file 118 may identify settings for other types of applications such as operating system settings. The files 118 are often written in ASCII (rarely UTF-8) and line-oriented, with lines terminated by a newline or carriage return/line feed pair, depending on the operating system.
The policy 120 may include any parameters, variables, policies, algorithms, instructions, settings, or rules for accessing accounts. For example, the policy 120a may identify one or more accounts external in the network 104 and information for accessing the accounts. For example, the policy 120 may include a password, an encryption algorithm and key, and access rules. In some implementations, the policy 120 may include or otherwise identify one or more of the following: a password; an encryption key; access rules; a specific account; a network address; internal resources; a user; an owner; an administrator; a time period; or other information. With regard to external accounts, the policy 120 may identify a specific account and associated rules or information for accessing the external account. In some implementations, a policy 120 may define or otherwise identify a process for user authentication prior to enabling access to an account. For example, the policy 120 may identify the type and content of user authentication (e.g., password strength, lifecycle) to apply to an account-access request.
The wireless communication device 102 may be connected to multiple networks, such as the enterprise network 104a and the public network 104b. The enterprise network 104a is a network associated with an enterprise. The enterprise may comprise a corporate or business entity, a government body, a non-profit institution, or any other organization connected to the wireless communication device 102. The enterprise may be the owner 104 of the wireless communication device 102. Of course, the enterprise may also lease the wireless communication device 102 or may hire contractors or agents who are responsible for maintaining, configuring, controlling, and/or managing the wireless communication device 102. In the illustrated implementation, the networks 104 facilitate wireless and/or wireline communication with the wireless communication device 102. The networks 104 may communicate, for example, Internet Protocol (IP) packets, Frame Relay frames, Asynchronous Transfer Mode (ATM) cells, voice, video, data, and other suitable information between network addresses. In addition, while the enterprise network 104a and the public network 104b are each illustrated as a single network, each network 102 may comprise a plurality of networks. In short, the enterprise network 104a and the public network 104b are any suitable network that configured to communicate with the device 104.
As previously mentioned, the device 102 may use a bridge to communicate with the cellular network to access the enterprise account.
The processor 220 may include a microprocessor, a central processing unit, a graphic control unit, a network processor, or other processors for carrying out instructions stored in the memory 210. The functions of the processor 220 may include computation, queue management, control processing, graphic acceleration, video decoding, and execution of a sequence of stored instructions from the program kept in the memory 210. In some implementations, the processor 220 may also be responsible for signal processing including sampling, quantizing, encoding/decoding, and/or modulation/demodulation of the signal.
The memory 210 may include any memory or database module and may take the form of volatile or non-volatile memory including, without limitation, magnetic media, optical media, random access memory (RAM), read-only memory (ROM), removable media, or any other suitable local or remote memory component. The memory 210 may store various objects or data, including classes, frameworks, applications, backup data, business objects, jobs, web pages, web page templates, database tables, repositories storing business and/or dynamic information, and any other appropriate information including any parameters, variables, algorithms, instructions, rules, constraints, or references thereto associated with the purposes of the wireless communication device and its personal/enterprise applications. In some implementations, such as the implementation shown in
The wireless transceiver 230 can include both the transmitter circuitry and the receiver circuitry. The wireless transceiver 230 may be responsible for up-converting a baseband signal to a passband signal or vice versa. The components of wireless transceiver 230 may include a digital to analog converter/analog to digital converter, amplifier, frequency filter and oscillator. An antenna 240 generally comprises a transducer which can transmit and/or receive electromagnetic waves. The antenna 240 can convert electromagnetic radiation into electric current, or vice versa. The antenna 240 is generally responsible for the transmission and reception of radio waves, and can serve as the interface between the transceiver 230 and the wireless channel. In some implementations, the wireless communication device may be equipped with multiple antennas to take advantage of the multiple-input-multiple-output (MIMO) technology. The multiple antenna MIMO technology may enable the wireless communication device to set up multiple parallel data streams on the wireless channel, thereby increasing the throughput or reliability of the wireless channel.
The display 245 can be an output unit for presentation of information in visual or tactile form in response to electronic input signals. In some implementations, the display 245 may include a touchscreen, which is an electronic visual display that may detect the presence and location of a touch within the display area. Touchscreen may generally refer to a display that detects a touch with a finger or hand. Touchscreens also may detect other passive objects, such as a stylus. Therefore, a display 245 that includes a touchscreen can also be used as an input unit. In some cases, the wireless communication device may also include a keypad as an input unit.
The GUI 250 may be presented on the display 245. The GUI 250 may be operable to interface with resources included in the personal perimeter and/or the enterprise perimeter. For example, the GUI 250 may generate a visual representation of applications (e.g., a web browser application). The GUI 250 may provide interface for interactions between the wireless communication device and an enterprise service. Generally, through the GUI 250, the user is provided with an efficient and user-friendly presentation of data provided by or communicated within the system. The GUI 250 may be any graphical user interface, including but not limited to, a web browser, touch screen interface, or command line interface (CLI) that processes information and presents the processing results to the user. In general, the GUI 250 may include a plurality of user interface elements, such as interactive fields, pull-down lists, and buttons operable by the user on the wireless communication device. Some example implementations of the GUI in accordance with the present disclosure are described with regard to
The perimeter 306a and the perimeter 306b may include the network connection resource 312a and the network connection resource 312b. The application 308b in the perimeter 306a connects to the enterprise network 304b through the connection 312a. In some implementations, the application 308c in the perimeter 306b crosses perimeters to access the resource or network connection resource 312a in the perimeter 306a to connect to the internet 304c. The application 308d in the perimeter 306b connects to the internet 365 using the network connection resource 312b in the perimeter 306b. All the aforementioned network connection resources 312 may be information for physically connecting through a physical interface 314, which may use wireless, Bluetooth, Universal Serial Bus (USB), Radio Frequency Identification (RFID), Near Field Communication (NFC), or other connection technologies. In some implementations, the perimeter 306a may be an enterprise perimeter, and the perimeter 306b may be a personal perimeter.
In some implementations, the perimeter network policy may include information for accessing an application, an application-perimeter, a network, and other resources. For example, the application field may describe the application to which the policy is assigned. The application field may include values that indicate the perimeter may be applied to all applications regardless of author, id, and/or version. The application field may have an Author-ID value that indicates the perimeter may be applied to any application published by the specified author. The application field may have an Application-ID value that indicates the perimeter may be applied to all versions of the specified application. The application field may have an Application-Version-ID value that indicates the perimeter may be applied to a specific version of the application.
In some implementations, the wireless communication device 302 may further include perimeter encryption policy, which may include fields such as the file system path, encryption, etc. The field for file system path may contain values that describe the area of the file system to which the policy applies. The values in the encryption field may describe whether the file system contents should be encrypted or unencrypted.
The applications 308a-d may execute inside the perimeter 306 that each has been assigned to at startup. For example, the applications 308a and 308b can be executed in the perimeter 306a, and the applications 308c and 308d may be executed inside the perimeter 306b. In some implementations, these assignments cannot be changed in flight or after the system startup while the operating system is running. The perimeter 306 may define the environment available to each application, for example, the file directories, network resources, device capabilities, and others. In some implementations, running an application 308 in a corporate perimeter 306 can point the application 308 to a corporate repository. Applications are then installed and managed in the corporate perimeter 306.
An application may be installed into several perimeters 306 simultaneously (e.g., different versions, different licenses, etc.). In these perimeters 306, each perimeter installation may follow its own lifecycle. The perimeter administrator, such as the administrator 108 as shown in
The wireless communication device 410 may be any wireless communication device 102 described with regard to
The WLAN 440 may be a network defined in the Institute of Electrical and Electronics Engineers (IEEE) wireless communications standards, e.g., IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, or IEEE 802.11ac. The WLAN 440 may be used to provide Wi-Fi and/or WiMAX wireless services. The wireless access point 440 is an electronic device that may allow wireless communication devices to connect to a wired network using WLAN related standards. In some implementations, wireless access point 440 may be connected to a router (via a wired network), and may relay data between the wireless and/or wired devices on the WLAN based on tethering 480.
In some implementations, the wireless communication device 410 (e.g., a BlackBerry Playbook tablet PC) and the enterprise server 430 may directly communicate with each other via the WLAN 440, and/or the cellular network 460. The wireless communication device 410 may include a default perimeter. The default perimeter may be a personal perimeter that includes resources such as the resources described with regard to
The enterprise account may be, for example, an ActiveSync email/calendar/contacts account. The enterprise account may be associated with an enterprise perimeter such that the perimeter may secure applications, data, and security policies for accessing the account. The enterprise server 430 may maintain or enforce resources, settings, and security policies associated with the enterprise perimeter. The wireless communication device may detect a trigger event based on a setting/policy (e.g., a device password protection policy) associated with the enterprise account. The setting/policy may be detected by the wireless communication device 410 as a pattern or a parameter. In some implementations, when the setting/policy is detected, the wireless communication device 410 may automatically/dynamically generate a new enterprise perimeter to securely separate resources associated with the enterprise account, and provide access privileges for the enterprise account to the wireless communication device 410. Automatically generating the new enterprise perimeter may further include retrieving security policies associated with the enterprise perimeter from the enterprise server 430. The new enterprise perimeter may be a private “enterprise” perimeter that can allow the wireless communication device 410 to download and locally access the resources included in the enterprise perimeter. In some other implementations, when the setting/policy is detected, a graphic user interface prompt may be presented using the wireless communication device 410. The user of the wireless communication device 410 may generate the new enterprise perimeter enter a request to generate the new perimeter.
In some implementations, the wireless communication device 410 may access the enterprise server 430 based on tethering via the cellular device 420. For example, when the wireless communication 410 does not have cellular network access functionality, and the enterprise server is not communicably coupled to the WLAN 440, the wireless communication device 410 may not be able to communicate directly with the enterprise server 430. In such case, if the cellular device 420 (e.g., a BlackBerry smart phone) includes tethering functionality and can perform cellular network communications with the enterprise server 430, the cellular device 420 may then be used as a bridge device (or a relay) to enable communication between the wireless communication device 410 and the enterprise server 430. The wireless communication device 410 and the cellular device 420 may be tethered using Bluetooth connection, data cable, or other personal or local area networks. The cellular device 420 may have access to an enterprise account maintained on the enterprise server 430. The cellular device 420 may also have an enterprise perimeter associated with the enterprise account generated locally on the cellular device 420. When tethering, a user may add the enterprise account on the wireless communication device 420. A trigger event may be detected by the wireless communication device 410 for generating the enterprise perimeter, based on a setting/policy associated with the enterprise perimeter stored on the cellular device 420. The wireless communication device 410 may then retrieve settings/policies associated with the enterprise perimeter on the cellular device 420, and automatically generate a new enterprise perimeter based on the retrieved settings/policies.
The event that triggers the creation of a perimeter may result from various applications. Setting up an ActiveSync account or connecting to a bridge device may be two examples. Generally, the trigger events may be associated with password protection policies. In Some cases, the passwords are stored in a password manager. The creation of a new record in the password manager may generate an event that triggers the creation of a new perimeter. Applications that use the password manager can use the service to create, allow or deny access to perimeters. For example, adding a new ActiveSync account may add a new record to the password manager that can trigger the creation of a new perimeter. Connecting to a new bridge device may also create a new password record in the password manager, and correspondingly, a new perimeter on a wireless communication device. A VPN connection may be another password-associated service provided to a wireless communication device that can create a perimeter or allow/deny access to a perimeter.
At 620, the mobile device detects a trigger event for a new perimeter based on the account setting. A few examples of possible trigger events are described with regard to
At 650, the mobile device retrieves an application associated with the server resource account. The application may be retrieved from the resource server. At 660, the mobile device assigns the application to the new perimeter. The new perimeter is configured to prevent resources of the mobile device external to the new perimeter from accessing the application. In other words, the application is associated with the new perimeter, and may be accessed by resources included in the new perimeter. The application may not be accessed by resources outside of the new perimeter.
A few implementations have been described in detail above, and various modifications are possible. The disclosed subject matter, including the functional operations described in this specification, can be implemented in electronic circuitry, computer hardware, firmware, software, or in combinations of them, such as the structural means disclosed in this specification and structural equivalents thereof, including potentially a program operable to cause one or more data processing apparatus to perform the operations described (such as a program encoded in a computer-readable medium, which can be a memory device, a storage device, a machine-readable storage substrate, or other physical, machine-readable medium, or a combination of one or more of them).
While this specification contains many specifics, these should not be construed as limitations on the scope of what may be claimed, but rather as descriptions of features that may be specific to particular implementations. Certain features that are described in this specification in the context of separate implementations can also be implemented in combination in a single implementation. Conversely, various features that are described in the context of a single implementation can also be implemented in multiple implementations separately or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the implementations described above should not be understood as requiring such separation in all implementations.
Other implementations fall within the scope of the following claims.
Number | Name | Date | Kind |
---|---|---|---|
4815128 | Malek | Mar 1989 | A |
4837812 | Takahashi et al. | Jun 1989 | A |
4945556 | Namekawa | Jul 1990 | A |
4972457 | O'Sullivan | Nov 1990 | A |
4991197 | Morris | Feb 1991 | A |
5220604 | Gasser et al. | Jun 1993 | A |
5408520 | Clark et al. | Apr 1995 | A |
5606594 | Register et al. | Feb 1997 | A |
5774551 | Wu et al. | Jun 1998 | A |
5802483 | Morris | Sep 1998 | A |
5826265 | Van Huben et al. | Oct 1998 | A |
5850515 | Lo et al. | Dec 1998 | A |
5864765 | Barvesten | Jan 1999 | A |
5987440 | O'Neil et al. | Nov 1999 | A |
5987611 | Freund | Nov 1999 | A |
6052735 | Ulrich et al. | Apr 2000 | A |
6088693 | Van Huben et al. | Jul 2000 | A |
6105132 | Fritch et al. | Aug 2000 | A |
6131136 | Liebenow et al. | Oct 2000 | A |
6219694 | Lazaridis et al. | Apr 2001 | B1 |
6233446 | Do | May 2001 | B1 |
6243756 | Whitmire et al. | Jun 2001 | B1 |
6253326 | Lincke et al. | Jun 2001 | B1 |
6285889 | Nykanen et al. | Sep 2001 | B1 |
6292798 | Dockter et al. | Sep 2001 | B1 |
6343313 | Salesky et al. | Jan 2002 | B1 |
6351816 | Mueller et al. | Feb 2002 | B1 |
6360322 | Grawrock | Mar 2002 | B1 |
6405202 | Britton et al. | Jun 2002 | B1 |
6408336 | Schneider et al. | Jun 2002 | B1 |
6412070 | Van Dyke et al. | Jun 2002 | B1 |
6490289 | Zhang et al. | Dec 2002 | B1 |
6516421 | Peters | Feb 2003 | B1 |
6546554 | Schmidt et al. | Apr 2003 | B1 |
6629246 | Gadi | Sep 2003 | B1 |
6647388 | Numao et al. | Nov 2003 | B2 |
6668323 | Challener et al. | Dec 2003 | B1 |
6745047 | Karstens et al. | Jun 2004 | B1 |
6748543 | Vilhuber | Jun 2004 | B1 |
6757821 | Akiyama et al. | Jun 2004 | B1 |
6772350 | Belani et al. | Aug 2004 | B1 |
6775536 | Geiger et al. | Aug 2004 | B1 |
6785810 | Lirov et al. | Aug 2004 | B1 |
6795688 | Plasson et al. | Sep 2004 | B1 |
6795967 | Evans et al. | Sep 2004 | B1 |
6799208 | Sankaranarayan | Sep 2004 | B1 |
6832256 | Toga | Dec 2004 | B1 |
6886038 | Tabbara et al. | Apr 2005 | B1 |
6895502 | Fraser et al. | May 2005 | B1 |
6901429 | Dowling | May 2005 | B2 |
6957330 | Hughes | Oct 2005 | B1 |
6976241 | Cruz et al. | Dec 2005 | B2 |
6978385 | Cheston et al. | Dec 2005 | B1 |
6999562 | Winick | Feb 2006 | B2 |
7042988 | Juitt et al. | May 2006 | B2 |
7076239 | Kirkup et al. | Jul 2006 | B2 |
7076797 | Loveland | Jul 2006 | B2 |
7146638 | Malcolm | Dec 2006 | B2 |
7185192 | Kahn | Feb 2007 | B1 |
7187678 | Cunetto et al. | Mar 2007 | B2 |
7246374 | Simon et al. | Jul 2007 | B1 |
7315750 | Chou et al. | Jan 2008 | B2 |
7330712 | Kirkup et al. | Feb 2008 | B2 |
7331058 | Gladney | Feb 2008 | B1 |
7400878 | Hassan et al. | Jul 2008 | B2 |
7469417 | Fearnley et al. | Dec 2008 | B2 |
7496954 | Himawan | Feb 2009 | B1 |
7526800 | Wright et al. | Apr 2009 | B2 |
7574200 | Hassan et al. | Aug 2009 | B2 |
7603466 | Kilian-Kehr et al. | Oct 2009 | B2 |
7689653 | Cohen | Mar 2010 | B2 |
7721087 | DiPasquo et al. | May 2010 | B1 |
7734284 | Adams et al. | Jun 2010 | B2 |
7751331 | Blair et al. | Jul 2010 | B1 |
7765185 | Rangadass | Jul 2010 | B2 |
7793355 | Little et al. | Sep 2010 | B2 |
7869789 | Hassan et al. | Jan 2011 | B2 |
7886053 | Newstadt et al. | Feb 2011 | B1 |
7890627 | Thomas | Feb 2011 | B1 |
7917963 | Goyal et al. | Mar 2011 | B2 |
7921452 | Ridlon et al. | Apr 2011 | B2 |
8005469 | Adams et al. | Aug 2011 | B2 |
8074078 | Brown et al. | Dec 2011 | B2 |
8208900 | Adler et al. | Jun 2012 | B2 |
8344135 | Hirose | Jan 2013 | B2 |
8495700 | Shahbazi | Jul 2013 | B2 |
8495731 | Mar | Jul 2013 | B1 |
8503340 | Xu | Aug 2013 | B1 |
8588749 | Sadhvani | Nov 2013 | B1 |
8656016 | Bender et al. | Feb 2014 | B1 |
8799227 | Ferguson | Aug 2014 | B2 |
8869235 | Qureshi | Oct 2014 | B2 |
8909915 | Ferren | Dec 2014 | B2 |
8931042 | Weiss | Jan 2015 | B1 |
20010047485 | Brown et al. | Nov 2001 | A1 |
20010056549 | Pinault et al. | Dec 2001 | A1 |
20020013815 | Obradovich et al. | Jan 2002 | A1 |
20020019944 | Kou | Feb 2002 | A1 |
20020029280 | Holden et al. | Mar 2002 | A1 |
20020031230 | Sweet et al. | Mar 2002 | A1 |
20020087880 | Rhoades | Jul 2002 | A1 |
20020095414 | Barnett et al. | Jul 2002 | A1 |
20020095497 | Satagopan et al. | Jul 2002 | A1 |
20020095571 | Bradee | Jul 2002 | A1 |
20020112155 | Martherus et al. | Aug 2002 | A1 |
20020184398 | Orenshteyn | Dec 2002 | A1 |
20030005317 | Audebert et al. | Jan 2003 | A1 |
20030014521 | Elson et al. | Jan 2003 | A1 |
20030026220 | Uhlik et al. | Feb 2003 | A1 |
20030031184 | Cunetto et al. | Feb 2003 | A1 |
20030035397 | Haller et al. | Feb 2003 | A1 |
20030054860 | Chen | Mar 2003 | A1 |
20030061087 | Srimuang | Mar 2003 | A1 |
20030065676 | Gbadegesin et al. | Apr 2003 | A1 |
20030070091 | Loveland | Apr 2003 | A1 |
20030087629 | Juitt et al. | May 2003 | A1 |
20030093698 | Challener et al. | May 2003 | A1 |
20030120948 | Schmidt et al. | Jun 2003 | A1 |
20030126437 | Wheelere et al. | Jul 2003 | A1 |
20030163685 | Paatero | Aug 2003 | A1 |
20030167405 | Freund et al. | Sep 2003 | A1 |
20030177389 | Albert et al. | Sep 2003 | A1 |
20030226015 | Neufled et al. | Dec 2003 | A1 |
20030236983 | Mihm, Jr. et al. | Dec 2003 | A1 |
20040001101 | Trajkovic et al. | Jan 2004 | A1 |
20040083382 | Markham et al. | Apr 2004 | A1 |
20040097217 | McClain | May 2004 | A1 |
20040100983 | Suzuki | May 2004 | A1 |
20040121802 | Kim et al. | Jun 2004 | A1 |
20040177073 | Snyder et al. | Sep 2004 | A1 |
20040205342 | Roegner | Oct 2004 | A1 |
20040209608 | Kouznetsov et al. | Oct 2004 | A1 |
20040215702 | Hamasaki et al. | Oct 2004 | A1 |
20040268151 | Matsuda et al. | Dec 2004 | A1 |
20050022023 | Chincheck et al. | Jan 2005 | A1 |
20050154935 | Jin | Jul 2005 | A1 |
20050164687 | DiFazio | Jul 2005 | A1 |
20050192008 | Desai et al. | Sep 2005 | A1 |
20050210270 | Rohatgi et al. | Sep 2005 | A1 |
20050213763 | Owen et al. | Sep 2005 | A1 |
20050245272 | Spaur et al. | Nov 2005 | A1 |
20060015621 | Quinn | Jan 2006 | A1 |
20060059556 | Royer | Mar 2006 | A1 |
20060070114 | Wood et al. | Mar 2006 | A1 |
20060090136 | Miller et al. | Apr 2006 | A1 |
20060120526 | Boucher et al. | Jun 2006 | A1 |
20060123485 | Williams | Jun 2006 | A1 |
20060129848 | Paksoy et al. | Jun 2006 | A1 |
20060129948 | Hamzy et al. | Jun 2006 | A1 |
20060149846 | Schuba | Jul 2006 | A1 |
20060156026 | Utin | Jul 2006 | A1 |
20060168259 | Spilotro et al. | Jul 2006 | A1 |
20060168395 | Deng et al. | Jul 2006 | A1 |
20060206931 | Dillaway et al. | Sep 2006 | A1 |
20060212589 | Hayer et al. | Sep 2006 | A1 |
20060242685 | Heard et al. | Oct 2006 | A1 |
20060274750 | Babbar et al. | Dec 2006 | A1 |
20070019643 | Shaheen | Jan 2007 | A1 |
20070050854 | Cooperstein et al. | Mar 2007 | A1 |
20070073694 | Picault et al. | Mar 2007 | A1 |
20070150730 | Conti | Jun 2007 | A1 |
20070156766 | Hoang et al. | Jul 2007 | A1 |
20070204153 | Tome et al. | Aug 2007 | A1 |
20070204166 | Tome et al. | Aug 2007 | A1 |
20070254631 | Spooner | Nov 2007 | A1 |
20070277127 | Carlson et al. | Nov 2007 | A1 |
20080002726 | Haung et al. | Jan 2008 | A1 |
20080028442 | Kaza et al. | Jan 2008 | A1 |
20080081609 | Burgan et al. | Apr 2008 | A1 |
20080098237 | Dung et al. | Apr 2008 | A1 |
20080125146 | Bainbridge | May 2008 | A1 |
20080130524 | Volach et al. | Jun 2008 | A1 |
20080132202 | Kirkup et al. | Jun 2008 | A1 |
20080134347 | Goyal et al. | Jun 2008 | A1 |
20080137593 | Laudermilch et al. | Jun 2008 | A1 |
20080141136 | Ozzie | Jun 2008 | A1 |
20080184336 | Sarukkai et al. | Jul 2008 | A1 |
20080222694 | Nakae | Sep 2008 | A1 |
20080222711 | Michaelis | Sep 2008 | A1 |
20080235041 | Cashdollar et al. | Sep 2008 | A1 |
20080313648 | Wang | Dec 2008 | A1 |
20080318616 | Chipalkatti et al. | Dec 2008 | A1 |
20090068996 | Bakker et al. | Mar 2009 | A1 |
20090070181 | Loeffen | Mar 2009 | A1 |
20090094668 | Corbin et al. | Apr 2009 | A1 |
20090178107 | Karjoth et al. | Jul 2009 | A1 |
20090181662 | Fleischman et al. | Jul 2009 | A1 |
20090254753 | De Atley et al. | Oct 2009 | A1 |
20090260052 | Bathula et al. | Oct 2009 | A1 |
20090300707 | Garimella et al. | Dec 2009 | A1 |
20100024016 | Violleau et al. | Jan 2010 | A1 |
20100024020 | Baugher et al. | Jan 2010 | A1 |
20100081417 | Hickie | Apr 2010 | A1 |
20100088753 | Ayres et al. | Apr 2010 | A1 |
20100100825 | Sharoni | Apr 2010 | A1 |
20100107215 | Bechtel et al. | Apr 2010 | A1 |
20100153969 | Dyba et al. | Jun 2010 | A1 |
20100184440 | Mao et al. | Jul 2010 | A1 |
20100222097 | Gisby et al. | Sep 2010 | A1 |
20100242086 | Adams et al. | Sep 2010 | A1 |
20100274910 | Ghanaie-Sichanie et al. | Oct 2010 | A1 |
20100278162 | Groux et al. | Nov 2010 | A1 |
20100281487 | Schneider et al. | Nov 2010 | A1 |
20100299152 | Batchu | Nov 2010 | A1 |
20100299376 | Batchu et al. | Nov 2010 | A1 |
20100299394 | Jania et al. | Nov 2010 | A1 |
20100299719 | Burks et al. | Nov 2010 | A1 |
20100319053 | Gharabally | Dec 2010 | A1 |
20100325221 | Cohen et al. | Dec 2010 | A1 |
20100325430 | Denninghoff | Dec 2010 | A1 |
20110010699 | Cooper et al. | Jan 2011 | A1 |
20110030045 | Beauregard | Feb 2011 | A1 |
20110082808 | Beykpour et al. | Apr 2011 | A1 |
20110099605 | Cha et al. | Apr 2011 | A1 |
20110126214 | O'Farrell et al. | May 2011 | A1 |
20110145833 | De Los Reyes et al. | Jun 2011 | A1 |
20110179083 | Galloway et al. | Jul 2011 | A1 |
20110195698 | Pearce | Aug 2011 | A1 |
20110210171 | Brown et al. | Sep 2011 | A1 |
20110246753 | Thomas | Oct 2011 | A1 |
20110252234 | De Atley | Oct 2011 | A1 |
20110252240 | Freedman et al. | Oct 2011 | A1 |
20110307946 | Hilerio | Dec 2011 | A1 |
20110314467 | Pearson | Dec 2011 | A1 |
20120005477 | Wei et al. | Jan 2012 | A1 |
20120005723 | Chaturvedi et al. | Jan 2012 | A1 |
20120005745 | Wei et al. | Jan 2012 | A1 |
20120023573 | Shi | Jan 2012 | A1 |
20120054853 | Gupta et al. | Mar 2012 | A1 |
20120066691 | Branton | Mar 2012 | A1 |
20120079110 | Brown et al. | Mar 2012 | A1 |
20120079586 | Brown | Mar 2012 | A1 |
20120079609 | Bender | Mar 2012 | A1 |
20120084184 | Raleigh et al. | Apr 2012 | A1 |
20120109826 | Kobres | May 2012 | A1 |
20120131685 | Broch et al. | May 2012 | A1 |
20120144196 | Owen et al. | Jun 2012 | A1 |
20120157165 | Kim et al. | Jun 2012 | A1 |
20120157166 | Kim et al. | Jun 2012 | A1 |
20120202527 | Obradovich et al. | Aug 2012 | A1 |
20120210443 | Blaisdell et al. | Aug 2012 | A1 |
20120214442 | Crawford et al. | Aug 2012 | A1 |
20120214503 | Liu et al. | Aug 2012 | A1 |
20120278863 | Wallace et al. | Nov 2012 | A1 |
20120278904 | Perez et al. | Nov 2012 | A1 |
20120291140 | Robert et al. | Nov 2012 | A1 |
20120304280 | Hayashida | Nov 2012 | A1 |
20120309344 | Ferrazzini et al. | Dec 2012 | A1 |
20130074142 | Brennan et al. | Mar 2013 | A1 |
20130097316 | Bender et al. | Apr 2013 | A1 |
20130097657 | Cardamore et al. | Apr 2013 | A1 |
20130124583 | Ferguson et al. | May 2013 | A1 |
20130174222 | Ogle | Jul 2013 | A1 |
20130219465 | Tse et al. | Aug 2013 | A1 |
20130346606 | Ryerson et al. | Dec 2013 | A1 |
20140330990 | Lang | Nov 2014 | A1 |
Number | Date | Country |
---|---|---|
2505343 | Jun 2010 | CA |
101004776 | Jul 2007 | CN |
101253487 | Aug 2008 | CN |
101523878 | Sep 2009 | CN |
332558 | Sep 1989 | EP |
605106 | Jul 1994 | EP |
973350 | Jan 2000 | EP |
1168141 | Jan 2002 | EP |
1471691 | Oct 2004 | EP |
1596410 | Nov 2005 | EP |
1624428 | Feb 2006 | EP |
1806674 | Jul 2007 | EP |
1563663 | Oct 2008 | EP |
2337300 | Jun 2011 | EP |
2378780 | Feb 2003 | GB |
2408179 | May 2005 | GB |
2440015 | Jan 2008 | GB |
2000-253241 | Sep 2000 | JP |
2001-077811 | Mar 2001 | JP |
2001-203761 | Jul 2001 | JP |
2002-288087 | Oct 2002 | JP |
9625828 | Aug 1996 | WO |
9905814 | Feb 1999 | WO |
0059225 | Oct 2000 | WO |
0060434 | Oct 2000 | WO |
2004017592 | Feb 2004 | WO |
2004043031 | May 2004 | WO |
2005045550 | May 2005 | WO |
WO2005062279 | Jul 2005 | WO |
2006130807 | Dec 2006 | WO |
2007048251 | May 2007 | WO |
2009012329 | Jan 2009 | WO |
2009014975 | Jan 2009 | WO |
2012109497 | Jan 2009 | WO |
2009021200 | Feb 2009 | WO |
2012037656 | Mar 2012 | WO |
2012037657 | Mar 2012 | WO |
2012037658 | Mar 2012 | WO |
Entry |
---|
Research in Motion, “BlackBerry Bridge App 2.1 and Blackberry PlayBook Tablet 2.1, Security Technical Overview”; Version: 2.1; Jul. 17, 2012; 43 pages. |
Research in Motion, “BlackBerry Device Service 6.1 and BlackBerry PlayBook Tablet 2.1, Security Technical Overview” ; Version: 6.1; Sep. 17, 2012; 90 pages. |
Office Action issued in U.S. Appl. No. 10/524,353 on Sep. 21, 2012; 16 pages. |
Office Action issued in U.S. Appl. No. 13/098,456 on Sep. 13, 2012; 20 pages. |
International Search Report and Written Opinion issued in International Application No. PCT/CA2011/001058 on Dec. 21, 2011; 9 pages. |
XP002167366, Chen, Zhigun; “Java Card Technology for Smart Cards: Architecture and Programmer's Guide”; “Applet Firewall and Object Sharing,” Internet citation; Jun. 2, 2000; <http://developer.java.sun.com/developer/Books/consumerproducts/javacard/ch09.pdf>. |
Ferguson et al., U.S. Appl. No. 13/293,743, “Managing Cross Perimeter Access,” filed Nov. 10, 2011. |
Office Action issued in U.S. Appl. No. 13/398,676 on Sep. 5, 2012; 21 pages. |
Extended European Search Report issued in European Application No. 11186796.6 on Jan. 18, 2012; 8 pages. |
Extended European Search Report issued in European Application No. 11188696.6 on Apr. 12, 2012; 7 pages. |
Extended European Search Report issued in European Application No. 11186802.2 on Jan. 18, 2012; 7 pages. |
Microsoft Office: Microsoft Outlook 2010 Product Guide; Microsoft Corp. published in 2010; 65 pages. |
Windows 7 Product Guide; Microsoft Corp. published in 2009; 140 pages. |
Extended European Search Report issued in European Application No. 12173030.3 on Nov. 22, 2012; 6 pages. |
Office Action issued in U.S. Appl. No. 13/25,097 on Feb. 28, 2013; 18 pages. |
Extended European Search Report issued in European Application No. 12189773.0 on Mar. 7, 2013; 8 pages. |
International Search Report and Written Opinion of the International Searching Authority issued in International Application No. PCT/CA2012/050796 on Feb. 21, 2013; 13 pages. |
Google Inc.; Android 2.3.4 User's Guide; May 20, 2011; 384 pages. |
Microsoft Corp.; Microsoft Outlook 2010; Released Jul. 15, 2010; 27 pages. |
Office Action issued in U.S. Appl. No. 13/293,743 on Feb. 14, 2013; 15 pages. |
International Search Report and Written Opinion issued in International Application No. PCT/CA2012/050797 on Feb. 5, 2013; 8 pages. |
View messages with restricted permission sent by using IRM; Support/Outlook/Outlook 2007 Help and How-to. http://office.mircosoft.com/en-us/outlook-help/view-messages-with-restricted-permission-sent-by-using-irm-HA010246115.as . . . , pp. 1-2, retrieved on Feb. 12, 2010. |
Send an e-mail message with restricted permission by using IRM; Support/Outlook/Outlook 2007 Help and How to. http://office.mircosoft.com/en-us/outlook-help/send-an-e-mail-message-with-restricted-permission-by-using-irm-HA01024780 . . . , pp. 1-4, retrieved on Feb. 12, 2010. |
Introduction to using IRM for e-mail messages; Support/Outlook/Outlook 2007 Help and How-to. http://office.microsoft.com/en-us/outlook-help/introduction-to-using-irm-for-e-mail-message-HA010100366.aspx?CTT=5&or . . ., pp. 1-6, retrieved on Feb. 12, 2010. |
EP Application No. 12155659.1, Extended European Search Report dated Jan. 8, 2012. |
Smartphone Security Beyond Lock and Wipe (Jun. 10, 2010): http://www.enterprisemobiletoday.com/article. php/3887006. |
Basic Access Authentication (Jan. 23, 2010): http://en.wikipedia.org/wiki/Basic—access—authentication. |
Digital Access Authentication (Dec. 23, 2009): http://en.wikipedia.org/wiki/Digest—access—authentication. |
Cross-site request forgery (Nov. 30, 2008): http://en.wikipedia.org/wiki/Cross-site—request—forgery. |
Extended European Search Report mailed Jul. 13, 2012, in corresponding European patent application No. 12153439.0. |
“Customizing User Interaction in Smart Phones”, Pervasive Computing, IEEE CS (2006) pp. 81-90 (URL: http://www.idi. ntnu.no/grupperlsu/bibliography/pdf/2006/Korpipaa2006pc.pdf). |
“Supporting Mobile Privacy and Security through Sensor-Based Context Detection”“, Julian Seifert, Second International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, May 17, 2010, Finland (U RL: http://www.medien.ifi.lmu.de/iwssi201 0/papers/iwssi-spmu201 O-seifert.pdf)”. |
EagleVision: A Pervasive Mobile Device Protection System, Ka Yang, Nalin Subramanian, Daji Qiao, and Wen sheng Zhang, Iowa State Unviersity (URL: http://www.cs.iastate.edu/-wzhang/papers/eagleVision.pdf). |
“Using context-profiling to aid access control decisions in mobile devices”“, Gupta et al., Nokia Research Center (URL: http://www.cerias.purdue.edu/assets/symposium/2011-posters1372-C48.pdf) Please refer to the I-page file named 372-C48.pdf”. |
Owen, Russell N., U.S. Appl. No. 10/524,353, filed Feb 14, 2005; Title: System and Method for Secure Control of Resources of Wireless Mobile Communication Device. |
International Application No. PCT/CA 03101245, International Search Report dated Dec. 23, 2003. |
International Application No. PCT/CA 03101245, PCT Written Opinion, dated Apr. 23, 2004. |
International Application No. PCT/CA 03101245, PCT Written Opinion, dated Sep. 20, 2004. |
International Application No. PCT/CA 03101245, PCT International Preliminary Examination Report, dated Nov. 29, 2004. |
Owen, Russell N., U.S. Appl. No. 13/371,093, filed Feb. 10, 2012; Title: System and Method for Secure Control of Resources of Wireless Mobile Communication Devices Secure Control of Resources of Wireless Mobile Communication Device. |
Int'l Search Report and the Written Opinion of the Int'l Searching Authority, or the Declaration of Appln. Serial No. PCT/CA2004/000250 of 02120/2004—12 pgs. |
Int'l Search Report or the Declaration of Appln. Serial No. PCT/CA03/01679 of 10131/2003—6 pgs. |
Red Hat: “Red Hat Linux 7.2—The Official Red Had Linux Reference Guide” Red Hat Linux Manuals, Online!, Oct. 22, 2001, XP002276029, pp. 145-155. |
Sygate: “Sygate Personal Firewall Pro User Guide” Sygate Personal Firewall Pro User Guide version 2.02001, pp. 1-77, XP002248366. |
Bender, Christopher Lyle; U.S. Appl. No. 13/074,136, filed Mar. 29, 2011; Title: Data Source Based Application Sandboxing. |
“A Technical Overview of the Lucent VPN Firewall” White Paper Lucent Technologies, XX, XX, Aug. 2002, pp. 1-35, XP002271173, Chapter 1. |
European Search Report of Appln. No. 04256690.1-2412, date of mailing Apr. 6, 2005—9 pgs. |
Fourth Office Action. Chinese Application No. 200380105435.2. Dated: Aug. 3, 2011. |
Patent Certificate. Indian Patent Application No. 1956/DELNP/2005. Dated: Oct. 31, 2003. |
Certificate of Grant of Patent. Singapore Patent No. 112419. Dated: Apr. 30, 2007. |
Certificate of Grant of Patent. Hong Kong Patent No. 1080315. Dated: Apr. 24, 2009. |
Notice of Allowance. Canadian Application No. 2,505,343. Dated: Sep. 15, 2009. |
Extended European Search Report issued in European Application No. 12189805.0 on Apr. 16, 2013; 6 pages. |
Office Action issued in U.S. Appl. No. 11/118,791 on Sep. 25, 2006; 11 pages. |
Office Action issued in U.S. Appl. No. 11/118,791 on Nov. 28, 2007; 12 pages. |
Office Action issued in U.S. Appl. No. 11/118,791 on Mar. 30, 2007; 12 pages. |
Office Action issued in U.S. Appl. No. 11/118,791 on May 20, 2008; 13 pages. |
Office Action issued in U.S. Appl. No. 11/118,791 on Jan. 27, 2009; 16 pages. |
Office Action issued in U.S. Appl. No. 11/118,791 on Apr. 8, 2009; 14 pages. |
Advisory Action issued in U.S. Appl. No. 11/118,791 on Jun. 26, 2009; 8 pages. |
Notice of Allowance issued in U.S. Appl. No. 11/118,791 on Jan. 20, 2010; 4 pages. |
Office Action issued in U.S. Appl. No. 12/795,252 on Aug. 6, 2010; 6 pages. |
Notice of Allowance issued in U.S. Appl. No. 12/795,252 on Dec. 17, 2010; 4 pages. |
Notice of Allowance issued in U.S. Appl. No. 12/795,252 on Apr. 14, 2011; 4 pages. |
Examiner's First Report issued in Australian Application No. 2005239005 on Oct. 15, 2007; 2 pages. |
Examiner's Report No. 2 issued in Australian Application No. 2005239005 on Jul. 15, 2009; 2 pages. |
Examiner's First Report issued in Australian Application No. 2009202857 on Nov. 5, 2010; 3 pages. |
Office Action issued in Canadian Application No. 2,564,914 on May 3, 2010; 4 pages. |
Office Action issued in Canadian Application No. 2,564,914 on Apr. 4, 2011; 2 pages. |
First Office Action issued in Chinese Application No. 200580013730.4 on Mar. 27, 2009; 9 pages. |
Second Office Action issued in Chinese Application No. 200580013730.4 on Dec. 12, 2010; 10 pages. |
Third Office Action issued in Chinese Application No. 200580013730.4 on Mar. 8, 2011; 10 pages. |
Notice of Allowance issued in Chinese Application No. 200580013730.4 on Jul. 28, 2011; 4 pages. |
European Supplementary Search Report issued in European Application No. 05738877.9 on Sep. 13, 2007; 3 pages. |
Communication Pursuant to Article 94(3) EPC issued in European Application No. 05738877.9 on Jan. 15, 2008; 4 pages. |
Communication Pursuant to Article 94(3) EPC issued in European Application No. 05738877.9 on Jul. 15, 2009; 4 pages. |
Communication under Rule 71(3) EPC issued in European Application No. 05738877.9 on Sep. 17, 2010; 41 pages. |
First Examination Report issued in Indian Application No. 6068/DELNP/2006 on Jun. 3, 2010; 2 pages. |
Notice of Reasons for Rejection issued in Japanese Application No. 2007-509840 on Jun. 15, 2009; 5 pages. |
Notice of Allowance issued in Japanese Application No. 2007-509840 on Jan. 25, 2010; 3 pages. |
Notice Requesting Submission of Opinion issued in Korean Application No. 10-2006-7025081 on Nov. 16, 2007; 10 pages. |
Notice of Decision of Final Rejection issued Korean Application No. 10-2006-7025081 on Jun. 18, 2008. |
Trial Decision issued in Korean Application No. 10-2006-7025081 on Jul. 27, 2009; 10 pages. |
Notice of Decision for Patent issued in Korean Application No. 10-2006-7025081 on Aug. 7, 2009; 3 pages. |
International Search Report issued in International Application No. PCT/CA2005/000652 on Aug. 17, 2005; 9 pages. |
International Preliminary Report on Patentability under Chapter I issued in International Application No. PCT/CA2005/000652 on Nov. 9, 2006; 6 pages. |
Office Action issued in U.S. Appl. No. 13/659,527 on May 23, 2013; 8 pages. |
Office Action issued in U.S. Appl. No. 13/722,213 on May 22, 2013; 8 pages. |
Office Action issued in Canadian Application No. 2,769,646 on Jun. 5, 2012; 3 pages. |
Office Action issued in Canadian Application No. 2,769,646 on Oct. 22, 2012; 2 pages. |
International Search Report and Written Opinion of the International Searching Authority issued in International Application No. PCT/CA2011/050707 on Jan. 18, 2012; 7 pages. |
International Preliminary Report on Patentability issued in International Application No. PCT/CA2011/050707 on May 30, 2013; 4 pages. |
Office Action issued in U.S. Appl. No. 13/293,743 on Sep. 20, 2013; 19 pages. |
Office Action issued in U.S. Appl. No. 13/274,913 on Jul. 16, 2013. |
Office Action issued in U.S. Appl. No. 13/25,097 on Sep. 10, 2013; 21 pages. |
Office Action issued in U.S. Appl. No. 13/098,456 on Apr. 17, 2013; 31 pages. |
Office Action issued in U.S. Appl. No. 13/098,456 on Sep. 27, 2013; 28 pages. |
Communication Pursuant to Article 94(3) EPC issued in European Application No. 11188696.6 on Jul. 9, 2013; 4 pages. |
Office Action issued in U.S. Appl. No. 10/524,353 on Sep. 21, 2012. |
Owen, Russell N., U.S. Appl. No. 10/524,353, filed Aug. 19, 2003; Title: System and Method for Secure Control of Resources of Wireless Mobile Communication Devices. |
Notice of Allowance issued in U.S. Appl. No. 13/398,676 on Sep. 5, 2012; 22 pages. |
Notice of Allowance issued in U.S. Appl. No. 13/659,527 on Oct. 7, 2013; 15 pages. |
Notice of Allowance issued in U.S. Appl. No. 13/490,956 on Dec. 4, 2013; 8 pages. |
Office Action issued in U.S. Appl. No. 13/296,963 on Nov. 18, 2013; 23 pages. |
Office Action issued in Canadian Application No. 2,564,914 on Dec. 3, 2013; 2 pages. |
Office Action issued in Chinese Application No. 201110308441.4 on Oct. 25, 2013; 9 pages. |
International Preliminary Report on Patentability under Chapter II issued in International Application No. PCT/CA2012/050797 on Feb. 12, 2014; 13 pages. |
IETF RFC 3530; “Network File System (NFS) Version 4 Protocol”; Apr. 2003. |
“Secure Inter-Process Communication”; Apr. 4, 2004. Retrieved from internet on Jan. 20, 2014 https://web.archive.org/web/20040404015137/http://cr.yp.to/docs/secureipc.html. |
Notice of Allowance issued in Canadian Application No. 2,769,646 on Feb. 15, 2013; 1 page. |
Examiner's First Report issued in Australian Application No. 2012203391 on Jan. 22, 2014; 4 pages. |
Advisory Action issued in U.S. Appl. No. 13/293,743 on Nov. 26, 2013; 3 pages. |
Advisory Action issued in U.S. Appl. No. 13/275,097 on Dec. 6, 2013; 4 pages. |
Office Action issued in U.S. Appl. No. 13/722,213 on Dec. 4, 2013; 6 pages. |
Notice of Allowance issued in U.S. Appl. No. 13/722,213 on Jan. 29, 2014; 7 pages. |
Office Action issued in U.S. Appl. No. 13/529,509 on Mar. 25, 2014. |
International Preliminary Report on Patentability under Ch. II issued in International Application No. PCT/CA2012/050796 on Mar. 10, 2014; 18 pages. |
Communication Pursuant to Article 94(3) EPC issued in European Application No. 11186796.6 on Aug. 29, 2014; 5 pages. |
Office Action issued in Canadian Application No. 2,792,772 on Sep. 5, 2014; 3 pages. |
Office Action issued in Canadian Application No. 2,792,707 on Sep. 8, 2014; 3 pages. |
Office Action issued in U.S. Appl. No. 13/296,963 on Oct. 3, 2014. |
Notice of Acceptance issued in Australian Application No. 2012203391 on Jul. 25, 2014; 2 pages. |
Communication pursuant to Article 94(3) issued in EP Application No. 11186802.2 on Aug. 25, 2014. |
United States Office Action in U.S. Appl. No. 13/25,097, dated Feb. 24, 2015, 22 pages. |
United States Office Action in U.S. Appl. No. 13/801,437, dated Mar. 2, 2015, 53 pages. |
United States Office Action in U.S. Appl. No. 14/163,416, dated Feb. 17, 2015, 12 pages. |
European Communication Pursuant to Article 94(3) EPC in European Application No. 12189773.0, dated Feb. 5, 2015, 6 pages. |
Chinese Office Action in Chinese Application No. 201110308441.4, dated Jan. 20, 2015, 5 pages. |
Office Action issued in Canadian Application No. 2,820,687 on Nov. 3, 2014; 3 pages. |
Office Action issued in U.S. Appl. No. 13/659,561 on Dec. 10, 2014. |
Saha Saurabh, “Auto-Open Certain Websites in Google Chrome Incognito Private Mode”, Dec. 31, 2012, <http://web.archive.org/web/20121231021254/http://www.techgyd.com/auto-open-sites-in-google-incognito/360>, 5 pages. |
Extended European Search Report issued in European Application No. 13165229.9 on Nov. 10, 2015. |
Boyce, “Microsoft Outlook 2010 Inside Out,” XP055196121, Microsoft Press, Aug. 15, 2010, 152 pages. |
Extended European Search Report in European Application No. 12847536.5, dated Jun. 29, 2015, 8 pages. |
Communication Pursuant to Article 94(3) EPC issued in related European Application No. 11186802.2 on Mar. 14, 2016. |
Communication Pursuant to Article 94(3) EPC issued in related European Application No. 12847536.5 on Mar. 16, 2016. |
United States Office Action in U.S. Appl. No. 13/293,743, dated Apr. 8, 2015, 15 pages. |
United States Office Action in U.S. Appl. No. 13/529,509, dated Apr. 8, 2015, 13 pages. |
Office Action issued in Chinese Application No. 201180065344.5 on Jun. 3, 2016. |
Number | Date | Country | |
---|---|---|---|
20130097657 A1 | Apr 2013 | US |