End-to-end secure cloud computing
First Claim
Patent Images
1. A system, comprising:
- a memory that stores instructions; and
a processor that executes the instructions to perform operations, the operations comprising;
managing, by enforcing a policy of an enterprise, a communication between a thin client device of the enterprise and an application; and
configuring the thin client device to directly prevent storage of data beyond a period of interaction between the thin client device and the application, wherein the configuring of the thin client device prevents loss of the data from the enterprise via the thin client device.
4 Assignments
0 Petitions
Accused Products
Abstract
A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, and managing communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy. The method also includes managing communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy.
-
Citations
20 Claims
-
1. A system, comprising:
-
a memory that stores instructions; and a processor that executes the instructions to perform operations, the operations comprising; managing, by enforcing a policy of an enterprise, a communication between a thin client device of the enterprise and an application; and configuring the thin client device to directly prevent storage of data beyond a period of interaction between the thin client device and the application, wherein the configuring of the thin client device prevents loss of the data from the enterprise via the thin client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method, comprising:
-
enforcing a policy of an enterprise so as to manage a communication between a client device of the enterprise and an application; and configuring, by utilizing instructions from a memory that are executed by a processor, the client device to directly prevent storage of data beyond a period of interaction between the client device and the application, wherein the configuring of the thin client device prevents loss of the data from the enterprise via the thin client device. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable device comprising instructions, which, when loaded and executed by a processor, cause the processor to perform operations, the operations comprising:
-
generating a policy of an enterprise for managing a communication between a client device of the enterprise and an application; and configuring the client device to directly prevent storage of data beyond a period of interaction between the client device and the application, wherein the configuring of the thin client device prevents loss of the data from the enterprise via the thin client device.
-
Specification