×

Automatically configuring mobile devices and applying policy based on device state

  • US 10,104,128 B2
  • Filed: 09/27/2017
  • Issued: 10/16/2018
  • Est. Priority Date: 07/12/2013
  • Status: Active Grant
First Claim
Patent Images

1. A system for automatically configuring mobile devices and applying policies based on a Host Information Profile (HIP) report, comprising:

  • a processor configured to;

    receive a list of known malware and application characteristics from an external service;

    receive the Host Information Profile (HIP) report for a mobile device, wherein the HIP report includes applications installed on the mobile device, device state information, and device configuration information, wherein the device state information and the device configuration information both comprise one or more features;

    perform a policy match based on the HIP report for the mobile device, comprising to;

    determine whether the HIP report indicates that one or more features are missing or one or more features are disabled causing the mobile device to fail the policy match;

    determine whether an application installed on the mobile device is found on the list of known malware and application characteristics;

    determine whether the HIP report from the mobile device matches with a first host information profile or a second host information profile;

    determine a security policy based on a host information profile that matches the HIP report, the security policy being associated with a first security policy or a second security policy, the first host information profile being different from the second host information profile, the first security policy including granting access to a first enterprise resource, the second security policy including granting access to a second enterprise resource; and

    in response to a determination that the security policy does not match the first host information profile or the second host information profile, determine that the security policy includes denying access to enterprise resources; and

    perform an action based on the policy match based on the HIP report for the mobile device, comprising to;

    in response to a determination that the HIP report matches a first security policy, grant access to a first enterprise resource; and

    in response to a determination that the HIP report matches a second security policy;

    perform one or more of the following;



    automatically install the one or more missing features or enable the one or more features on the mobile device in response to a determination that the policy match has failed when the HIP report indicates that the one or more features are missing or the one or more features are disabled;

    or 

    automatically uninstall the application installed on the mobile device in response to a determination that the policy match has failed when the application is found on the list of known malware and application characteristics; and

    grant access to a second enterprise resource, the first security policy being different from the second security policy; and

    a memory coupled to the processor and configured to provide the processor with instructions.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×