Patents Assigned to Sky Socket, LLC
-
Publication number: 20140109194Abstract: A computer-readable medium encoded with software for execution. When executed, the software may be operable to send to a remote server, from an agent application, a request for a first access credential. The software may also be operable to receive from the remote server, the first access credential. The software may further be operable to determine, by the agent application monitoring a managed application, that the managed application requires a second access credential. The software may additionally be operable to, in response to the determination that the managed application requires the second access credential, sending to the managed application, from the agent application, the second access credential.Type: ApplicationFiled: December 5, 2013Publication date: April 17, 2014Applicant: Sky Socket, LLCInventor: John Joseph Manton
-
Publication number: 20140108809Abstract: A method, system and non-transitory computer-readable medium product are provided for functionality watermarking and management. In the context of a method, a method is provided that includes identifying a request to perform at least one function of a user device and identifying at least one watermark template. The method further includes applying the at least one watermark template to at least one function of the user device and authorizing the request to perform the at least one function of the user device.Type: ApplicationFiled: December 27, 2013Publication date: April 17, 2014Applicant: Sky Socket, LLCInventor: John Marshall
-
Publication number: 20140096210Abstract: A method, system, apparatus, and computer program product are provided for facilitating advanced authentication techniques. For example, a method is provided that includes receiving at least one request to access at least one resource and receiving at least one composite authentication credential, the composite authentication credential comprising a first credential component and a second credential component. The method further includes determining whether the first credential component is valid, determining whether the second credential component is valid and, in an instance in which it is determined that the first and second credential components are valid, causing access to the at least one resource to be permitted.Type: ApplicationFiled: December 2, 2013Publication date: April 3, 2014Applicant: Sky Socket, LLCInventor: Alan Dabbiere
-
Publication number: 20140053238Abstract: Methods, systems, apparatuses, and computer program products are provided for remediating suspected attempted security breaches. For example, a method is provided that includes receiving information regarding at least one authentication attempt and determining, based at least in part on the information regarding the at least one authentication attempt, whether the at least one authentication attempt comprises a suspected attempted security breach. The method further includes causing, in an instance in which it is determined that the at least one authentication attempt comprises a suspected attempted security breach, at least one recording to be captured via at least one recording device communicatively coupled to the at least one processor and causing at least a portion of the at least one recording to be compared against at least one database.Type: ApplicationFiled: October 29, 2013Publication date: February 20, 2014Applicant: Sky Socket, LLCInventor: Jonathan Blake Brannon
-
Publication number: 20140040982Abstract: A method, system and non-transitory computer-readable medium product are provided for functionality watermarking and management. In the context of a method, a method is provided that includes identifying a request to establish an association between a watermark template and a function of at least one user device and determining whether the request to establish the association between the watermark template and the function of the at least one user device is authorized. The method further includes authorizing the request to establish the association between the watermark template and the function of the at least one user device in response to a determination that the request to establish the association between the watermark template and the function of the at least one user device is authorized.Type: ApplicationFiled: August 6, 2013Publication date: February 6, 2014Applicant: Sky Socket, LLCInventors: John Marshall, Erich Stuntebeck
-
Publication number: 20140026195Abstract: A method, system and non-transitory computer-readable medium product are provided for enterprise-specific functionality watermarking and management. In the context of a method, a method is provided that includes identifying a request to perform at least one function of a user device associated with an enterprise and identifying at least one watermark template associated with an enterprise. The method further includes applying the at least one watermark template associated with the enterprise to at least one function of the user device associated with the enterprise and authorizing the request to perform the at least one function of the user device associated with the enterprise.Type: ApplicationFiled: July 3, 2013Publication date: January 23, 2014Applicant: Sky Socket, LLCInventor: John Marshall
-
Publication number: 20130340060Abstract: A method, system, apparatus, and computer program product are provided for facilitating individual-specific content management. For example, a method is provided that includes receiving information regarding at least one prerequisite condition relating to at least one individual, receiving information regarding the at least one individual, determining whether the at least one prerequisite condition is satisfied, and causing individual-specific content associated with the at least one individual to be transmitted. At least a portion of the individual-specific content comprises protected content configured to be unviewable and/or unmodifiable. The method further includes receiving at least one access credential and causing at least a portion of the protected content to be viewable and/or modifiable.Type: ApplicationFiled: August 20, 2013Publication date: December 19, 2013Applicant: Sky Socket, LLCInventors: John DiRico, Erich Stuntebeck
-
Publication number: 20130332989Abstract: A method, system and non-transitory computer-readable medium product are provided for watermarking detection and management. In the context of a method, a method is provided that includes identifying at least one resource accessible to a user device and determining whether a watermark template is applied to the at least one resource accessible to the user device. The method further includes identifying at least one compliance rule and determining whether the at least one compliance rule is satisfied in response to a determination that the watermark template is applied to the at least one resource accessible to the user device. The method yet further includes performing at least one remedial action in response to a determination that the at least one compliance rule is not satisfied.Type: ApplicationFiled: August 15, 2013Publication date: December 12, 2013Applicant: Sky Socket, LLCInventors: Alan Dabbiere, Erich Stuntebeck
-
Publication number: 20130311684Abstract: A method, system, apparatus, and computer program product are provided for providing peripheral device management. For example, a method is provided that includes receiving, from a user device, a request to access at least one peripheral device, the request comprising information regarding the user device. The method may further include determining, based at least in part on at least one compliance rule and the information regarding the user device, whether to grant the request, and, in an instance in which it is determined to grant the request, causing access to the at least one peripheral device by the user device to be facilitated.Type: ApplicationFiled: June 25, 2013Publication date: November 21, 2013Applicant: Sky Socket, LLCInventor: David Dabbiere
-
Publication number: 20130254837Abstract: Rights management services (RMS) integration with mobile device management (MDM) may be provided. A functionality associated with a document may be restricted according to a document management policy. After the document has been transmitted to a receiving device, a request to un-restrict the at least one functionality associated with the document may be received. If it is determined that the receiving device complies with the document management policy, the functionality associated with the document may be un-restricted.Type: ApplicationFiled: May 16, 2013Publication date: September 26, 2013Applicant: Sky Socket, LLCInventors: Jonathan Blake Brannon, Christian Blake Sorensen
-
Publication number: 20130254889Abstract: Server-side restricted software compliance may be provided. An application installed on a user device may be identified and analyzed to determine whether the application comprises a security threat by comparing the application to a copy of the application. In response to determining that the application comprises a security threat, a user of the user device may be notified that the application comprises a security threat.Type: ApplicationFiled: May 23, 2013Publication date: September 26, 2013Applicant: Sky Socket, LLCInventor: Erich Stuntebeck
-
Publication number: 20130247144Abstract: Disclosed are various embodiments for controlling access to data on a network. Upon receiving a request comprising a device identifier and at least one user credential to access a remote resource, the request may be authenticated according to at least one compliance policy. If the request is authenticated, a resource credential associated with the remote resource may be provided.Type: ApplicationFiled: May 10, 2013Publication date: September 19, 2013Applicant: Sky Socket, LLCInventors: John Marshall, Erich Stuntebeck
-
Publication number: 20130212278Abstract: Disclosed are various embodiments for controlling distribution of data on a network. In one embodiment, a distribution service receives a request from a user on a client device to access the distribution service. In response, the distribution service determines whether the user and the client device are authorized to access the distribution service. The distribution service identifies which of the resources are accessible to the user and the client device pairing based on a plurality of resource grouping identifiers. The distribution service then determines whether the client device complies with a plurality of distribution rules associated with the identified resources. Upon determining that the client device is compliant, the distribution service transmits the resources related to the compliance.Type: ApplicationFiled: February 14, 2012Publication date: August 15, 2013Applicant: Sky Socket, LLCInventors: John Marshall, Adam Rykowski, Erich Stuntebeck, Jyothiprakash Halebeed
-
Publication number: 20130212650Abstract: A method of receiving a request to access a plurality of resources and determining whether a first resource of the plurality of resources is associated with a different authorization requirement than at least one second resource of the plurality of resources. In response to determining that the first resource of the plurality of resources is associated with a different authorization requirement than the at least one second resource of the plurality of resources, determining whether the request includes the authorization requirement for the first resource and the authorization requirement for the second resource. In response to determining that the request includes the authorization requirement for the first resource and the authorization requirement for the second resource, providing access to the first resource and the at least one second resource.Type: ApplicationFiled: March 14, 2013Publication date: August 15, 2013Applicant: SKY SOCKET, LLCInventor: SKY SOCKET, LLC