End-To-End Secure Cloud Computing
First Claim
Patent Images
1. A system, comprising:
- a memory that stores instructions; and
hardware that executes the instructions to perform operations, the operations comprising;
enforcing an enterprise policy of an enterprise so as to manage a communication between a thin client device of the enterprise and an enterprise application hosted by a network on behalf of the enterprise; and
configuring the thin client device to prevent storage of data associated with the enterprise application beyond a period of interaction between the thin client device and the enterprise application.
4 Assignments
0 Petitions
Accused Products
Abstract
A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, and managing communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy. The method also includes managing communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy.
9 Citations
20 Claims
-
1. A system, comprising:
-
a memory that stores instructions; and hardware that executes the instructions to perform operations, the operations comprising; enforcing an enterprise policy of an enterprise so as to manage a communication between a thin client device of the enterprise and an enterprise application hosted by a network on behalf of the enterprise; and configuring the thin client device to prevent storage of data associated with the enterprise application beyond a period of interaction between the thin client device and the enterprise application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method, comprising:
-
managing, by enforcing an enterprise policy of an enterprise, a communication between a thin client device of the enterprise and an enterprise application hosted by a network on behalf of the enterprise; and configuring, by utilizing instructions from a memory that are executed by a processor, the thin client device to prevent storage of data associated with the enterprise application beyond a period of interaction between the thin client device and the enterprise application. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable device comprising instructions, which, when loaded and executed by a processor, cause the processor to perform operations, the operations comprising:
-
generating an enterprise policy of an enterprise for managing a communication between a thin client device of the enterprise and an enterprise application hosted by a network on behalf of the enterprise; and configuring the thin client device to prevent storage of data associated with the enterprise application beyond a period of interaction between the thin client device and the enterprise application.
-
Specification