The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 12, 2017

Filed:

Jun. 01, 2015
Applicant:

Citrix Systems, Inc., Fort Lauderdale, FL (US);

Inventor:

Simon Frost, Harpenden, GB;

Assignee:

Citrix Systems, Inc., Fort Lauderdale, FL (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/00 (2013.01); G06F 21/62 (2013.01); G06F 21/55 (2013.01); G06F 21/88 (2013.01); H04N 1/44 (2006.01); H04W 12/12 (2009.01); G06F 21/60 (2013.01); G06K 9/00 (2006.01); H04N 1/00 (2006.01); H04W 12/02 (2009.01); H04W 88/02 (2009.01);
U.S. Cl.
CPC ...
G06F 21/6209 (2013.01); G06F 21/554 (2013.01); G06F 21/604 (2013.01); G06F 21/62 (2013.01); G06F 21/88 (2013.01); G06K 9/00456 (2013.01); G06K 9/00469 (2013.01); H04N 1/00846 (2013.01); H04N 1/00859 (2013.01); H04N 1/00875 (2013.01); H04N 1/444 (2013.01); H04W 12/02 (2013.01); H04W 12/12 (2013.01); H04W 88/02 (2013.01);
Abstract

Systems, methods and apparatuses are described herein that allow an enterprise to analyze and manage work product images that are stored on a mobile device. Employees of an enterprise may use a mobile device to store both work product images (e.g., images of sensitive or proprietary information) and non-work product images (e.g., personal images). An enterprise may desire to enforce security protocols on the work product images, but the employee may not want the security protocols applied to the non-work product images. In some embodiments, by installing and executing an image manager that is able to analyze and manage images, the enterprise can enforce security protocols on only the work product images. Such security protocols may include the prevention of unauthorized viewing of the work product image (e.g., by encrypting the work product image) or deleting any work product image from the mobile device when the employee's employment has ended.


Find Patent Forward Citations

Loading…