On-demand security policy activation
First Claim
Patent Images
1. A method comprising:
- receiving, using a first application at a mobile computing device, a user selection of a resource locator, wherein the resource locator comprises a reference to a resource;
determining, using the mobile computing device, whether the selected resource locator is associated with a security policy; and
in response to determining that the resource locator is associated with the security policy;
activating, in the mobile computing device, a profile identified by the security policy, wherein the profile allows access to the resource, referred to by the resource locator and selected using the first application, if the mobile computing device is connected to a Virtual Private Network (VPN) connection;
launching, at the mobile computing device, the VPN connection; and
accessing the resource referred to by the resource locator using the VPN connection.
0 Assignments
0 Petitions
Accused Products
Abstract
On-demand activation of a security policy may be provided. Upon receiving a selection of a link, a profile identified by a security policy associated with the link may be activated and the link may be opened according to the security policy. In some embodiments, opening the link according to the security policy may comprise redirecting the opening of the link from a first application to a second application.
241 Citations
20 Claims
-
1. A method comprising:
-
receiving, using a first application at a mobile computing device, a user selection of a resource locator, wherein the resource locator comprises a reference to a resource; determining, using the mobile computing device, whether the selected resource locator is associated with a security policy; and in response to determining that the resource locator is associated with the security policy; activating, in the mobile computing device, a profile identified by the security policy, wherein the profile allows access to the resource, referred to by the resource locator and selected using the first application, if the mobile computing device is connected to a Virtual Private Network (VPN) connection; launching, at the mobile computing device, the VPN connection; and accessing the resource referred to by the resource locator using the VPN connection. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory, computer-readable medium comprising instructions that, when executed by a processor of a mobile computing device, performs a method comprising:
-
receiving, at a first application of a mobile computing device, a user selection of a resource locator, wherein the resource locator comprises a reference to a resource; determining, using the mobile computing device, whether the selected resource locator is associated with a security policy; and in response to determining that the resource locator is associated with the security policy; activating, in the mobile computing device, a profile identified by the security policy, wherein the profile allows access to the resource, referred to by the resource locator and selected using the first application, if the mobile computing device is connected to a Virtual Private Network (VPN) connection; launching, at the mobile computing device, the VPN connection; and accessing the resource referred to by the resource locator using the VPN connection. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
a memory storage storing program code; and a processor coupled to the memory storage, wherein, upon execution, the program code causes the processor to perform stages including; rendering a resource locator for display in a user interface of a mobile computing device; receiving a user selection of the resource locator, wherein the resource locator comprises a reference to a resource; determining whether the selected resource locator is associated with a security policy; and in response to determining that the resource locator is associated with the security policy; activating a profile identified by the security policy, wherein the profile allows access to the resource, referred to by the resource locator and selected by a user, if the mobile computing device is connected to a Virtual Private Network (VPN) connection; launching the VPN connection; and accessing the resource referred to by the resource locator using the VPN connection. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification