REAL-TIME MOBILE APPLICATION MANAGEMENT
First Claim
1. A method of mobile device management, the method comprising:
- installing a client-side engine of an enforcement engine on a mobile device, wherein the enforcement engine further includes a runtime engine;
routing communications between the mobile device and a network/cloud or an enterprise network through the enforcement engine;
from a signature database (“
SigDB”
) that includes signatures pertaining to mobile applications, generating a policy regarding the mobile applications;
enforcing compliance of the mobile device with the policy in real time.
1 Assignment
0 Petitions
Accused Products
Abstract
Some embodiments relate to mobile application management. An example embodiment includes a method of mobile device management. The method includes installing a client-side engine of an enforcement engine on a mobile device. The enforcement engine further includes a runtime engine. The method also includes routing communications between the mobile device and a network/cloud or an enterprise network through the enforcement engine. In addition, the method includes generating a policy regarding the mobile applications from a signature database (“SigDB”). The SigDB includes signatures pertaining to mobile applications. Compliance of the mobile device with the policy is enforced in real time.
193 Citations
20 Claims
-
1. A method of mobile device management, the method comprising:
-
installing a client-side engine of an enforcement engine on a mobile device, wherein the enforcement engine further includes a runtime engine; routing communications between the mobile device and a network/cloud or an enterprise network through the enforcement engine; from a signature database (“
SigDB”
) that includes signatures pertaining to mobile applications, generating a policy regarding the mobile applications;enforcing compliance of the mobile device with the policy in real time. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of mobile application management in a bring your own device (“
- BYOD”
) environment, the method comprising;publishing at least one signature of at least one mobile application in a signature database (“
SigDB”
), wherein the signature includes;information indicating whether the mobile application is a private mobile application or a public mobile application, and information about vulnerabilities introduced to an enterprise by the mobile application, provisioning at least one private mobile application, wherein provisioning includes enabling a first user to use the private mobile application; by default, blocking the mobile applications defined as private mobile applications except the at least one private mobile application that is provisioned; based on the information about vulnerabilities, blocking at least one public mobile application; and by default, allowing use of mobile applications defined as public mobile applications except the at least one public mobile application that is blocked. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
- BYOD”
-
18. A bring-your-own-device (“
- BYOD”
) environment mobile application management system comprising;a computing device including a computer-readable medium having computer-executable instructions stored thereon that are executable by the computing device, the computer-executable instructions including; an enforcement engine including a client-side engine installed on a mobile device and a runtime engine installed on a network/cloud and/or an enterprise network, and a customizable policy; wherein when executed by the computing device; the enforcement engine manages in real time mobile applications on the mobile device and traffic related to mobile applications in the network/cloud, and the customizable policy forms the basis of the enforcement engine management. - View Dependent Claims (19, 20)
- BYOD”
Specification