Controlling device access to enterprise resources in an orchestration framework for connected devices
First Claim
1. A method comprising:
- interconnecting a plurality of client computing devices through an orchestration framework such that functionality associated with a computing activity is assignable to one or more of the client computing devices;
receiving a request to transfer content from a first client computing device of the plurality of client computing devices to a second client computing device of the plurality of client computing devices while the first client computing device and the second client computing device are communicatively connected via the orchestration framework;
identifying a data vault at the first client computing device that stores the content;
determining whether the data vault is encrypted or unencrypted;
instructing the second client computing device to store the content in an encrypted data vault of the second client computing device or in an unencrypted data vault of the second client computing device based on whether the data vault of the first client computing device is encrypted or unencrypted; and
transmitting to the second client computing device an instruction to delete the content wherein receipt of the instruction at the second client computing device causes the second client computing device to delete at least a portion of encrypted content from the encrypted data vault and at least a portion of unencrypted content from the unencrypted data vault.
8 Assignments
0 Petitions
Accused Products
Abstract
Aspects described herein allow multiple devices to function as a coherent whole, allowing each device to take on distinct functions that are complementary to one another. Aspects described herein also allow the devices function as a coherent whole when interconnected devices and their respective applications are configured to operate in various operation modes, when management policies are employed to control the operation of the interconnected devices and their respective applications, when transferring content between the interconnected devices and storing the content at those devices, when obtaining access credentials for the interconnected devices that enable the devices to access enterprise resources, when a policy agent applies management policies to control operation of and interaction between the interconnected devices, and when the interconnected devices are used to access an enterprise application store.
-
Citations
16 Claims
-
1. A method comprising:
-
interconnecting a plurality of client computing devices through an orchestration framework such that functionality associated with a computing activity is assignable to one or more of the client computing devices; receiving a request to transfer content from a first client computing device of the plurality of client computing devices to a second client computing device of the plurality of client computing devices while the first client computing device and the second client computing device are communicatively connected via the orchestration framework; identifying a data vault at the first client computing device that stores the content; determining whether the data vault is encrypted or unencrypted; instructing the second client computing device to store the content in an encrypted data vault of the second client computing device or in an unencrypted data vault of the second client computing device based on whether the data vault of the first client computing device is encrypted or unencrypted; and transmitting to the second client computing device an instruction to delete the content wherein receipt of the instruction at the second client computing device causes the second client computing device to delete at least a portion of encrypted content from the encrypted data vault and at least a portion of unencrypted content from the unencrypted data vault. - View Dependent Claims (2, 3, 4)
-
-
5. An apparatus comprising:
-
at least one processor; and memory storing computer-readable instructions that, when executed by the at least one processor, cause the apparatus to interconnect a plurality of client computing devices through an orchestration framework such that functionality associated with a computing activity is assignable to one or more of the client computing devices, receive a request to transfer content from a first client computing device of the plurality of client computing devices to a second client computing device of the plurality of client computing devices while the first client computing device and the second client computing device are communicatively connected via the orchestration framework, identify a data vault that stores the content at the first client computing device, instruct the second client computing device to store the content in an encrypted data vault of the second client computing device or in an unencrypted data vault of the second client computing device based on whether the data vault of the first client computing device is encrypted or unencrypted, and transmit to the second client computing device an instruction to delete the content; and wherein receipt of the instruction at the second client computing device causes the second client computing device to delete at least a portion of encrypted content from the encrypted data vault and at least a portion of unencrypted content from the unencrypted data vault. - View Dependent Claims (6, 7, 8, 9, 10, 11)
-
-
12. One or more non-transitory computer-readable media having instructions that, when executed, cause a computing device to:
-
connect to one or more client computing devices through an orchestration framework such that functionality associated with a computing activity is assignable to one or more of the client computing devices; receive an indication of selected content to transfer to a selected client computing device of the one or more client computing devices while the computing device and the one or more client computing devices are communicatively connected via the orchestration framework wherein the selected content is stored at a first encrypted data vault of the computing device; display a list of client computing devices available for selection as the selected client computing device wherein the list of client computing devices includes one or more client computing devices that have an encrypted data vault and excludes any client computing devices that do not have an encrypted data vault; receive a selection of one of the client computing devices in the list of client computing devices as the selected client computing device; initiate transfer of the selected content to the selected client computing device via the orchestration framework wherein receipt of the selected content at the selected client computing device causes the selected client computing device to store the selected content at a second encrypted data vault; and initiate transmission of an instruction to the selected computing device to delete the selected content which causes the selected client computing device to delete a portion of encrypted content stored at the second encrypted data vault and at least a portion of unencrypted content stored at an unencrypted data vault of the selected client computing device. - View Dependent Claims (13, 14, 15, 16)
-
Specification