End-to-end secure cloud computing
First Claim
Patent Images
1. A system, comprising:
- a memory that stores instructions;
a processor that executes the instructions to perform operations, the operations comprising;
identifying an enterprise policy for an enterprise, wherein the enterprise policy includes a security and access policy for the enterprise;
enforcing the enterprise policy to manage a communication between a device of the enterprise and an enterprise application hosted by a cloud computing network on behalf of the enterprise; and
configuring a thin client device of the device to prevent storage of data associated with the enterprise application beyond a period of interaction between the thin client device and the enterprise application.
4 Assignments
0 Petitions
Accused Products
Abstract
A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, and managing communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy. The method also includes managing communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy.
-
Citations
20 Claims
-
1. A system, comprising:
-
a memory that stores instructions; a processor that executes the instructions to perform operations, the operations comprising; identifying an enterprise policy for an enterprise, wherein the enterprise policy includes a security and access policy for the enterprise; enforcing the enterprise policy to manage a communication between a device of the enterprise and an enterprise application hosted by a cloud computing network on behalf of the enterprise; and configuring a thin client device of the device to prevent storage of data associated with the enterprise application beyond a period of interaction between the thin client device and the enterprise application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, comprising:
-
identifying an enterprise policy for an enterprise, wherein the enterprise policy includes a security and access policy for the enterprise; enforcing the enterprise policy to manage a communication between a device of the enterprise and an enterprise application hosted by a cloud computing network on behalf of the enterprise; and configuring, by utilizing instructions from memory that are executed by a processor, a thin client device of the device to prevent storage of data associated with the enterprise application beyond a period of interaction between the thin client device and the enterprise application. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer-readable device comprising instructions, which, when loaded and executed by a processor, cause the processor to perform operations, the operations comprising:
-
identifying an enterprise policy for an enterprise, wherein the enterprise policy includes a security and access policy for the enterprise; enforcing the enterprise policy to manage a communication between a device of the enterprise and an enterprise application hosted by a cloud computing network on behalf of the enterprise; and configuring a thin client device of the device to prevent storage of data associated with the enterprise application beyond a period of interaction between the thin client device and the enterprise application. - View Dependent Claims (19, 20)
-
Specification