Patents by Inventor Erich Stuntebeck

Erich Stuntebeck has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140189119
    Abstract: Control of access to resources on a network may be provided. A request to access enterprise resource(s), the request comprising a set of user access credentials and a device identifier, may be generated. The request to access the at least one enterprise resource and an updated device profile may be provided to an authorization service. A set of enterprise access credentials may be received from the authorization service and used to generate a second request to access the enterprise resource(s).
    Type: Application
    Filed: March 5, 2014
    Publication date: July 3, 2014
    Applicant: SkySocket, LLC
    Inventor: Erich Stuntebeck
  • Publication number: 20140164759
    Abstract: Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more email attachments from the email resources, and encoding the stripped email attachments based at least in part on one or more cryptographic keys.
    Type: Application
    Filed: December 6, 2012
    Publication date: June 12, 2014
    Applicant: AIRWATCH, LLC
    Inventors: Alan Dabbiere, Erich Stuntebeck, Jonathon Blake Brannon
  • Publication number: 20140165148
    Abstract: Embodiments of the disclosure relate to identifying email resources associated with client devices, identifying resource rules, determining whether the email resources satisfy the resource rules, and modifying the email resources based on the resource rules if the resource rules are not satisfied by the email resources.
    Type: Application
    Filed: December 6, 2012
    Publication date: June 12, 2014
    Applicant: AIRWATCH, LLC
    Inventors: Alan Dabbiere, Erich Stuntebeck, Jonathon Blake Brannon
  • Publication number: 20140165213
    Abstract: Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, determining whether the email resources are accessible to the client devices via at least one unauthorized application on the client devices, and modifying the email resources to be inaccessible via the unauthorized applications on the client devices in response to a determination that the email resources are accessible via the unauthorized applications on the client devices.
    Type: Application
    Filed: January 25, 2013
    Publication date: June 12, 2014
    Applicant: AIRWATCH, LLC
    Inventor: Erich Stuntebeck
  • Publication number: 20140165132
    Abstract: Embodiments of the disclosure relate to proxying at least one email resource from at least one email service to at least one client device, identifying at least one resource rule associated with the email resources, and adding at least one URL to the email resources in accordance with the resource rules.
    Type: Application
    Filed: January 14, 2013
    Publication date: June 12, 2014
    Applicant: AirWatch, LLC
    Inventors: Erich Stuntebeck, David Dabbiere
  • Publication number: 20140165153
    Abstract: Embodiments of the disclosure relate to proxying at least one email resource in transit to at least one client device from at least one email service, removing at least one URL from the email resources, and adding at least one modified URL to the email resources.
    Type: Application
    Filed: December 21, 2012
    Publication date: June 12, 2014
    Applicant: AIRWATCH, LLC
    Inventors: Alan Dabbiere, Erich Stuntebeck, Jonathon Blake Brannon
  • Publication number: 20140156472
    Abstract: Logistics and supply chain tracking and management via mobile devices may be provided. Data about a plurality of inventory items may be collected via a networked device. Upon receiving an order for at least one of the plurality of inventory items, an instruction associated with fulfillment of the order may be created and performed.
    Type: Application
    Filed: June 4, 2013
    Publication date: June 5, 2014
    Inventors: Erich Stuntebeck, Christian Blake Sorensen, Kar-Fai Tse, John DiRico
  • Publication number: 20140157354
    Abstract: Secure access to resources on a network may be provided. Upon receiving a request for at least one resource, a determination may be made as to whether the at least one resource comprises a secure resource. In response to determining that the at least one resource comprises a secure resource, the at least one resource may be retrieved; and at least one security policy may be applied to the at least one resource.
    Type: Application
    Filed: June 20, 2013
    Publication date: June 5, 2014
    Applicant: SKYSOCKET, LLC
    Inventors: John Marshall, Erich Stuntebeck
  • Patent number: 8713646
    Abstract: Disclosed are various embodiments for controlling access to data on a network. In one embodiment, a proxy service receives a request from a user on a client device to access a quantity of enterprise resources served up by an enterprise device. In response, the proxy service determines whether the user on the client device has been authenticated to access the enterprise resources. The proxy service also determines whether the client device from which the user requested the access is authorized to access the enterprise resources. Responsive to the determination that the user is authentic and that the client device is authorized, the proxy service associates a set of approved enterprise access credentials with the request and facilitates the transmission of the requested enterprise resources to the client device.
    Type: Grant
    Filed: December 9, 2011
    Date of Patent: April 29, 2014
    Inventor: Erich Stuntebeck
  • Publication number: 20140115668
    Abstract: Disclosed are various embodiments for systems and methods for controlling access of networks. In one embodiment, an access control service receives requests to access network beacons from client devices. In response, the access control service determines whether the client devices satisfy authorization rules associated with the network beacons. If the access control service determines that the client devices satisfy the authorization rules associated with the network beacons, the access control service authorizes the client devices to access the network beacons. Subsequently, if the client devices cease to satisfy the authorization rules associated with the network beacons, the access control service terminates the authorization of the client devices to access the network beacons.
    Type: Application
    Filed: October 19, 2012
    Publication date: April 24, 2014
    Applicant: AirWatch, LLC
    Inventors: Erich Stuntebeck, Michelle Burnett
  • Publication number: 20140040982
    Abstract: A method, system and non-transitory computer-readable medium product are provided for functionality watermarking and management. In the context of a method, a method is provided that includes identifying a request to establish an association between a watermark template and a function of at least one user device and determining whether the request to establish the association between the watermark template and the function of the at least one user device is authorized. The method further includes authorizing the request to establish the association between the watermark template and the function of the at least one user device in response to a determination that the request to establish the association between the watermark template and the function of the at least one user device is authorized.
    Type: Application
    Filed: August 6, 2013
    Publication date: February 6, 2014
    Applicant: Sky Socket, LLC
    Inventors: John Marshall, Erich Stuntebeck
  • Publication number: 20140024339
    Abstract: Telecommunications data usage management may be provided. A network state associated with a communication network may be identified. Upon determining that the network state is not in compliance with a data usage policy, access to the communication network may be restricted for at least one application.
    Type: Application
    Filed: September 25, 2013
    Publication date: January 23, 2014
    Inventors: Alan Dabbiere, Erich Stuntebeck
  • Publication number: 20140004832
    Abstract: Methods, systems, apparatuses, and/or computer-readable media for providing device management via application modification may be provided. In some embodiments, upon identifying an available wireless network, a determination may be made as to whether the available wireless network comprises an authorized wireless network. In response to determining that the available wireless network comprises the authorized wireless network, a connection may be established with the available wireless network and at least one data communication may be performed via the available wireless network instead of a second network.
    Type: Application
    Filed: September 6, 2013
    Publication date: January 2, 2014
    Inventors: Alan Dabbiere, Erich Stuntebeck
  • Publication number: 20130340060
    Abstract: A method, system, apparatus, and computer program product are provided for facilitating individual-specific content management. For example, a method is provided that includes receiving information regarding at least one prerequisite condition relating to at least one individual, receiving information regarding the at least one individual, determining whether the at least one prerequisite condition is satisfied, and causing individual-specific content associated with the at least one individual to be transmitted. At least a portion of the individual-specific content comprises protected content configured to be unviewable and/or unmodifiable. The method further includes receiving at least one access credential and causing at least a portion of the protected content to be viewable and/or modifiable.
    Type: Application
    Filed: August 20, 2013
    Publication date: December 19, 2013
    Applicant: Sky Socket, LLC
    Inventors: John DiRico, Erich Stuntebeck
  • Publication number: 20130332989
    Abstract: A method, system and non-transitory computer-readable medium product are provided for watermarking detection and management. In the context of a method, a method is provided that includes identifying at least one resource accessible to a user device and determining whether a watermark template is applied to the at least one resource accessible to the user device. The method further includes identifying at least one compliance rule and determining whether the at least one compliance rule is satisfied in response to a determination that the watermark template is applied to the at least one resource accessible to the user device. The method yet further includes performing at least one remedial action in response to a determination that the at least one compliance rule is not satisfied.
    Type: Application
    Filed: August 15, 2013
    Publication date: December 12, 2013
    Applicant: Sky Socket, LLC
    Inventors: Alan Dabbiere, Erich Stuntebeck
  • Publication number: 20130312057
    Abstract: Methods, systems, apparatuses, and/or computer-readable media for providing device management via application modification may be provided. In some embodiments, a request to perform an action may be received. Upon determining that the action is associated with a metered resource, a further determination may be made as to whether the request complies with at least one management policy. In response to determining that the request complies with the at least one management policy, the requested action may be authorized and/or caused to be performed.
    Type: Application
    Filed: July 25, 2013
    Publication date: November 21, 2013
    Inventors: Alan Dabbiere, Erich Stuntebeck
  • Publication number: 20130311660
    Abstract: Methods, systems, apparatuses, and/or computer-readable media for providing device management via application modification may be provided. In some embodiments, upon receiving a request to perform an action associated with an application, a determination as to whether performing the action will utilize a metered resource may be made. If so, a further determination may be made as to whether the request complies with at least one cost compliance policy and, in response to determining that the request complies with the at least one cost compliance policy, the action may be caused and/or authorize to be performed.
    Type: Application
    Filed: July 29, 2013
    Publication date: November 21, 2013
    Applicant: SkySocket, LLC
    Inventors: Alan Dabbiere, Erich Stuntebeck
  • Publication number: 20130254889
    Abstract: Server-side restricted software compliance may be provided. An application installed on a user device may be identified and analyzed to determine whether the application comprises a security threat by comparing the application to a copy of the application. In response to determining that the application comprises a security threat, a user of the user device may be notified that the application comprises a security threat.
    Type: Application
    Filed: May 23, 2013
    Publication date: September 26, 2013
    Applicant: Sky Socket, LLC
    Inventor: Erich Stuntebeck
  • Publication number: 20130254401
    Abstract: Disclosed are various embodiments for controlling distribution of resources on a network. In one embodiment, a distribution service receives a request from a client device to access resources hosted by a distribution service. In response, the distribution service determines whether the client device is authorized to access the distribution service. The distribution service identifies which of the resources hosted by the distribution service are accessible to the client device based on the resource grouping identifiers associated with the client device. The distribution service determines which distribution rules are associated with the identified resources, the distribution rules including location rules and time rules.
    Type: Application
    Filed: September 20, 2012
    Publication date: September 26, 2013
    Applicant: AirWatch, LLC
    Inventors: John Marshall, Erich Stuntebeck, Gopinath Jayaprakash, John Joseph Manton, Jonathan Blake Brannon
  • Publication number: 20130247144
    Abstract: Disclosed are various embodiments for controlling access to data on a network. Upon receiving a request comprising a device identifier and at least one user credential to access a remote resource, the request may be authenticated according to at least one compliance policy. If the request is authenticated, a resource credential associated with the remote resource may be provided.
    Type: Application
    Filed: May 10, 2013
    Publication date: September 19, 2013
    Applicant: Sky Socket, LLC
    Inventors: John Marshall, Erich Stuntebeck