18313104. QUERYLESS DEVICE CONFIGURATION DETERMINATION-BASED TECHNIQUES FOR MOBILE DEVICE MANAGEMENT simplified abstract (Microsoft Technology Licensing, LLC)

From WikiPatents
Jump to navigation Jump to search

QUERYLESS DEVICE CONFIGURATION DETERMINATION-BASED TECHNIQUES FOR MOBILE DEVICE MANAGEMENT

Organization Name

Microsoft Technology Licensing, LLC

Inventor(s)

Shayak Lahiri of Redmond WA (US)

Richard I. June of Seattle WA (US)

Peter J. Kaufman of Sammamish WA (US)

Yuhang Zhu of Bellevue WA (US)

QUERYLESS DEVICE CONFIGURATION DETERMINATION-BASED TECHNIQUES FOR MOBILE DEVICE MANAGEMENT - A simplified explanation of the abstract

This abstract first appeared for US patent application 18313104 titled 'QUERYLESS DEVICE CONFIGURATION DETERMINATION-BASED TECHNIQUES FOR MOBILE DEVICE MANAGEMENT

Simplified Explanation

The patent application describes a system for managing device compliance in an enterprise network. Here are the key points:

  • The system is designed to ensure that devices connected to an enterprise network comply with the organization's data and security policies.
  • A mobile device manager provides configuration settings to a computing device, which implements these settings to achieve compliance.
  • The mobile device manager maintains a local reference of each device's configuration settings, eliminating the need to query the device for its settings every time compliance is checked.
  • This approach can be extended to determine compliance for security baselines, IoT devices, and devices used by business partners on the enterprise network.

Potential applications of this technology:

  • Enterprise network management: The system can be used to efficiently manage and enforce compliance across a large number of devices connected to an enterprise network.
  • Security and data protection: By ensuring compliance with data and security policies, the system helps protect sensitive information and prevent unauthorized access.
  • IoT device management: The system can be used to monitor and enforce compliance for IoT devices connected to an enterprise network, ensuring they meet security and data requirements.

Problems solved by this technology:

  • Manual configuration management: The system automates the process of configuring devices to comply with enterprise policies, reducing the need for manual intervention.
  • Compliance monitoring: By maintaining a local reference of device settings, the system simplifies the process of checking compliance, saving time and effort.
  • Scalability: The system can handle a large number of devices connected to the enterprise network, making it suitable for organizations of all sizes.

Benefits of this technology:

  • Improved efficiency: The system streamlines the process of managing device compliance, reducing administrative overhead and freeing up resources.
  • Enhanced security: By ensuring compliance with data and security policies, the system helps protect the enterprise network from potential threats and vulnerabilities.
  • Simplified compliance monitoring: The system eliminates the need to query devices for their settings, making compliance checks faster and more reliable.


Original Abstract Submitted

Embodiments described herein are directed to managing device compliance for devices that are connected to an enterprise network. For example, a mobile device manager may provide configuration settings to a computing device, which implements the settings in order to be compliant with an enterprise's data and/or security policy. The mobile device manager also maintains a local reference of each device's configuration settings implemented thereby. When the mobile device manager subsequently performs a determination as to whether the computing device is still in compliance, the mobile device manager simply needs to refer to the local reference to determine the computing device's settings instead of explicitly querying the computing device for its settings. The foregoing techniques may be extended for security baseline compliance determinations, IoT device compliance determinations and compliance determinations for other types of devices, such as devices utilized by business partners of the enterprise that utilize the enterprise's network.