SYSTEMS AND METHODS FOR APPLYING POLICY WRAPPERS TO COMPUTER APPLICATIONS
First Claim
1. A non-transitory computer readable medium having executable instructions operable to cause a client device to:
- receive an application programming interface (API) call to communicate information from a computer application to an enterprise over a communication network;
determine whether the computer application has associated with it a policy wrapper comprising a policy that specifies how to handle the API call from the computer application; and
when the computer application has associated with it the policy wrapper;
retrieve the policy for the policy wrapper associated with the computer application, andimplement the API call by securely communicating the information from the computer application to the enterprise over the communication network based on the policy.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided that allow an enterprise to apply a policy wrapper to any computer application. The use of a policy wrapper allows for any enterprise user to securely communicate with an enterprise, or generally communicate over a communication network, at a computer application level. A policy wrapper includes policies that can specify how to handle different types of API calls associated with a computer application, such as the re-routing, modification, or recording of IP packets, the storage of data, the displaying of data, the printing of data, or any other suitable data and/or actions. The policies can treat the different types of data and/or actions the same or differently. The policies can further distinguish between a user'"'"'s enterprise-related information and the user'"'"'s personal information, and specify the locations to which the information should be directed.
-
Citations
20 Claims
-
1. A non-transitory computer readable medium having executable instructions operable to cause a client device to:
-
receive an application programming interface (API) call to communicate information from a computer application to an enterprise over a communication network; determine whether the computer application has associated with it a policy wrapper comprising a policy that specifies how to handle the API call from the computer application; and when the computer application has associated with it the policy wrapper; retrieve the policy for the policy wrapper associated with the computer application, and implement the API call by securely communicating the information from the computer application to the enterprise over the communication network based on the policy. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus comprising:
-
one or more interfaces configured to provide communication with an enterprise via a communication network; and a processor, in communication with the one or more interfaces, and configured to run a module stored in memory that is configured; to receive an application programming interface (API) call to communicate information from a computer application to the enterprise over the communication network, to determine whether the computer application has associated with it a policy wrapper comprising a policy that specifies how to handle the API call from the computer application, and when the computer application has associated with it the policy wrapper; retrieve the policy for the policy wrapper associated with the computer application, and implement the API call by securely communicating the information from the computer application to the enterprise over the communication network based on the policy. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
receiving an application programming interface (API) call to communicate information from a computer application to an enterprise over a communication network; determining whether the computer application has associated with it a policy wrapper comprising a policy that specifies how to handle the API call from the computer application; and when the computer application has associated with it the policy wrapper; retrieving the policy for the policy wrapper associated with the computer application, and implementing the API call by securely communicating the information from the computer application to the enterprise over the communication network based on the policy. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification