SECURE MOBILE BROWSER FOR PROTECTING ENTERPRISE DATA
First Claim
1. A mobile device comprising a user interface, a memory, and at least one processor configured to run applications stored on the memory, said mobile device comprising:
- a web browser installed on the memory of the mobile device; and
an enterprise application installed on the memory of the mobile device, the enterprise application configured to respond to being run by launching the web browser and running within the web browser;
wherein the web browser is configured to regulate operation of the enterprise application in accordance with one or more enterprise policies.
8 Assignments
0 Petitions
Accused Products
Abstract
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly implement a BYOD (bring your own device) policy in which users can run both personal applications and secure enterprise applications on their mobile devices. The system may, for example, implement policies for controlling mobile device accesses to enterprise resources based on device attributes (e.g., what mobile applications are installed), user attributes (e.g., the user'"'"'s position or department), behavioral attributes, and other criteria. Client-side code installed on the mobile devices may further enhance security by, for example, creating a secure container for locally storing enterprise data, creating a secure execution environment for running enterprise applications, and/or creating secure application tunnels for communicating with the enterprise system.
127 Citations
28 Claims
-
1. A mobile device comprising a user interface, a memory, and at least one processor configured to run applications stored on the memory, said mobile device comprising:
-
a web browser installed on the memory of the mobile device; and an enterprise application installed on the memory of the mobile device, the enterprise application configured to respond to being run by launching the web browser and running within the web browser; wherein the web browser is configured to regulate operation of the enterprise application in accordance with one or more enterprise policies. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer-readable medium having computer-readable instructions stored thereon that, when executed, cause a mobile device to perform operations comprising:
-
responding to a request, received via a user interface of the mobile device, to run a software application installed on the mobile device by invoking a web browser and running the software application within the web browser, said web browser being configured to access an information resource via a network; and controlling operation of the software application, via the web browser, in accordance with one or more enterprise policies to protect enterprise data. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A non-transitory computer-readable medium comprising executable instructions stored thereon that are configured to implement a secure browser, said secure browser configured to at least:
-
run on a mobile device of an enterprise user; and control execution of at least one enterprise application configured to run within the secure browser so as to enforce at least one enterprise security policy to protect enterprise data, wherein the at least one enterprise application is stored on the mobile device. - View Dependent Claims (23)
-
-
26. A mobile device comprising:
-
non-transitory storage configured to store a first application and a second application, the first application comprising executable instructions to automatically cause the mobile device to launch the second application in response to the first application being executed, the second application comprising executable instructions to run the first application within the second application, and the second application further comprising executable instructions to implement one or more enterprise access policies to regulate access to at least one enterprise resource; and at least one processor in communication with the non-transitory storage, the at least one processor configured to run the first application and the second application. - View Dependent Claims (24, 25, 27, 28)
-
Specification