Secure data synchronization

Techniques for secure data synchronization are described. In one or more implementations, a determination is made as to whether enterprise data is stored locally on a first device corresponding to an enterprise device. Based on a determination that the second device is a non-enterprise device, a det...

Full description

Saved in:
Bibliographic Details
Main Authors Ovechkin, Ruslan, Ide, Nathan J, Tamayo-Rios, Matthew Z, Macaulay, Christopher R, Sinha, Saurav, Bharadwaj, Vijay G, Kannan, Gopinathan, Liu, Kun, Fleischman, Eric
Format Patent
LanguageEnglish
Published 06.11.2018
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Techniques for secure data synchronization are described. In one or more implementations, a determination is made as to whether enterprise data is stored locally on a first device corresponding to an enterprise device. Based on a determination that the second device is a non-enterprise device, a determination is made as to whether a permission associated with the first device indicates that the first device is permitted to propagate the enterprise data to non-enterprise devices. If the first device lacks permission to propagate the enterprise data to non-enterprise devices, the enterprise data is prevented from being propagated to the second device.
Bibliography:Application Number: US201615210112