Mobile Posture-based Policy, Remediation and Access Control for Enterprise Resources
First Claim
Patent Images
1. A method, comprising:
- responsive to detection of installation of an application on a mobile device at a remote management device, applying by the remote management device one or more policies to determine whether the application is authorized to be installed on the mobile device; and
if the application is not authorized, adjusting the state of one or more mobile device posture data objects operative to cause one or more network applications services to deny access to the mobile device.
6 Assignments
0 Petitions
Accused Products
Abstract
A mobile device management system that monitors the security state of one or more mobile devices and sets indicators related to such security state. Enterprise network applications, such as an email application, can access the security state information when making access control decisions with respect to a given mobile device.
269 Citations
18 Claims
-
1. A method, comprising:
-
responsive to detection of installation of an application on a mobile device at a remote management device, applying by the remote management device one or more policies to determine whether the application is authorized to be installed on the mobile device; and if the application is not authorized, adjusting the state of one or more mobile device posture data objects operative to cause one or more network applications services to deny access to the mobile device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus, comprising:
-
a memory; a network interface; one or more processors; and computer program code stored on a computer-readable medium comprising instructions operative, when executed, to cause the one or more processors to; responsive to detection of installation of an application on a mobile device at a remote management device, apply one or more policies to determine whether the application is authorized to be installed on the mobile device; and if the application is not authorized, adjusting the state of one or more mobile device posture data objects operative to cause one or more network applications services to deny access to the mobile device. - View Dependent Claims (8, 9, 10, 11)
-
-
12. An apparatus, comprising:
-
a memory; a network interface; one or more processors; and computer program code stored on a computer-readable medium comprising instructions operative, when executed, to cause the one or more processors to; interact with control clients installed on managed mobile devices to monitor the security state of the managed mobile devices; and maintain a mobile device security posture data structure indicating the security state of the one or more managed mobile devices, wherein the mobile device security posture data structure is accessible to one or more network application services. - View Dependent Claims (13, 14, 15)
-
-
16. A system, comprising:
-
a mobile device management system operative to; monitor security state of one or more managed mobile devices; and maintain a mobile device security posture data structure indicating the security state of the one or more managed mobile devices, wherein the mobile device security posture data structure is accessible to one or more network application services; one or more network application services, each operative to; host an enterprise network application; receive a request from a managed mobile device; access the data structure to determine the security state of the managed mobile device; permit or deny the managed mobile device access to the enterprise network application based on the determined security state. - View Dependent Claims (17, 18)
-
Specification