TECHNIQUES FOR PROTECTING MOBILE APPLICATIONS
First Claim
1. A method programmed within memory or a non-transitory machine-readable storage medium and processed by one or more processors of a mobile device that is configured to perform the method, comprising:
- registering, via the mobile device, a mobile application agent over a network to interact with remote enterprise services that are accessed over the network from the mobile device using a remote mobile application that interacts with the mobile application agent;
establishing, via the mobile device, a secure connection with the remote mobile application; and
using, via the mobile device, the secure connection to access features of the remote mobile application via user interaction with the mobile application agent.
8 Assignments
0 Petitions
Accused Products
Abstract
Techniques for protecting mobile applications are presented. A user'"'"'s mobile device is provisioned and proxied over a cloud environment with enterprise policy enforced in that cloud environment. Enterprise applications run on the mobile device within the cloud environment. Administrative reporting and control occurs within the cloud environment and the enterprise applications establish connections to, authenticate to, and communicate with remote enterprise services via the provisioned cloud environment.
101 Citations
20 Claims
-
1. A method programmed within memory or a non-transitory machine-readable storage medium and processed by one or more processors of a mobile device that is configured to perform the method, comprising:
-
registering, via the mobile device, a mobile application agent over a network to interact with remote enterprise services that are accessed over the network from the mobile device using a remote mobile application that interacts with the mobile application agent; establishing, via the mobile device, a secure connection with the remote mobile application; and using, via the mobile device, the secure connection to access features of the remote mobile application via user interaction with the mobile application agent. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 19, 20)
-
-
12. A method programmed within memory or a non-transitory machine-readable storage medium and processed by one or more processors of a server machine that is configured to perform the method, comprising:
-
receiving, at the server machine, a connection request to a mobile application from a mobile agent of a mobile device; authenticating, at the server machine, a user of the mobile agent and the mobile device for access to the mobile application; provisioning, at the server machine, features and resources for use by the mobile agent; configuring, at the server machine, policies in response to the authenticated user and the mobile device; and proxying, from the server machine, the mobile application for the mobile device while enforcing the policies based on interactions driven from the mobile agent of the mobile device. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A system, comprising:
-
a first machine having memory programmed with a cloud-based application that executes on one or more processors of the first machine; and a second machine having memory programmed with a mobile device-based agent that executes on one or more processors of the second machine; wherein the cloud-based application is configured to be proxied from the first machine on behalf of a user of the second machine based on direction supplied via the mobile device-based agent.
-
Specification