MODIFYING PRE-EXISTING MOBILE APPLICATIONS TO IMPLEMENT ENTERPRISE SECURITY POLICIES
First Claim
1. Non-transitory computer storage which stores an application modification utility that enables preexisting mobile applications to be configured for use by members of an enterprise to securely accesses enterprise data on mobile devices, the utility comprising executable code that directs a computer system to implement a process that comprises:
- disassembling executable code of the mobile application;
analyzing the disassembled code;
modifying the disassembled code to add functionality for implementing at least one enterprise security policy, said modifying comprising replacing one or more API (Application Program Interface) calls associated with one or more behaviors to be modified; and
rebuilding the mobile application using the modified disassembled code.
8 Assignments
0 Petitions
Accused Products
Abstract
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly implement a BYOD (bring your own device) policy in which users can run both personal applications and secure enterprise applications on their mobile devices. The system may, for example, implement policies for controlling mobile device accesses to enterprise resources based on device attributes (e.g., what mobile applications are installed), user attributes (e.g., the user'"'"'s position or department), behavioral attributes, and other criteria. Client-side code installed on the mobile devices may further enhance security by, for example, creating a secure container for locally storing enterprise data, creating a secure execution environment for running enterprise applications, and/or creating secure application tunnels for communicating with the enterprise system.
110 Citations
20 Claims
-
1. Non-transitory computer storage which stores an application modification utility that enables preexisting mobile applications to be configured for use by members of an enterprise to securely accesses enterprise data on mobile devices, the utility comprising executable code that directs a computer system to implement a process that comprises:
-
disassembling executable code of the mobile application; analyzing the disassembled code; modifying the disassembled code to add functionality for implementing at least one enterprise security policy, said modifying comprising replacing one or more API (Application Program Interface) calls associated with one or more behaviors to be modified; and rebuilding the mobile application using the modified disassembled code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method of configuring a preexisting mobile application for use by members of an enterprise to securely accesses enterprise resources using mobile devices, the method comprising:
-
disassembling executable code of the mobile application; analyzing the disassembled code; modifying the disassembled code to add functionality for implementing at least one enterprise security policy, said modifying comprising replacing one or more API calls associated with one or more behaviors to be modified; and rebuilding the mobile application using the modified disassembled code; said method performed by a computer system under the control of executable instructions. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification