Secure Mobile Framework With Operating System Integrity Checking
First Claim
1. A method comprising:
- receiving, at a remote device, a request to access to a secure container within a memory of the remote device, wherein the secure container is encrypted using information about an operating system of the remote device in an unaltered state;
determining a current state of the operating system of the remote device;
generating, using a processor, a decryption key based on the current state of the operating system of the remote device; and
allowing the secure container to be accessed when the decryption key successfully decrypts the secure container.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for a secure mobile framework to securely connect applications running on mobile devices to services within an enterprise are provided. Various embodiments provide mechanisms of securitizing data and communication between mobile devices and end point services accessed from a gateway of responsible authorization, authentication, anomaly detection, fraud detection, and policy management. Some embodiments provide for the integration of server and client-side security mechanisms, and for the binding of a user/application/device to an endpoint service along with multiple encryption mechanisms. For example, the secure mobile framework provides a secure container on the mobile device, secure files, a virtual file system partition, a multiple level authentication approach (e.g., to access a secure container on the mobile device and to access enterprise services), and a server side fraud detection system. In some embodiments, the multiple level authentication approach can include an operating system integrity check as part of the secure mobile framework.
-
Citations
27 Claims
-
1. A method comprising:
-
receiving, at a remote device, a request to access to a secure container within a memory of the remote device, wherein the secure container is encrypted using information about an operating system of the remote device in an unaltered state; determining a current state of the operating system of the remote device; generating, using a processor, a decryption key based on the current state of the operating system of the remote device; and allowing the secure container to be accessed when the decryption key successfully decrypts the secure container. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
receiving, at a remote device, a request to access a secure container within a memory of the remote device, wherein the secure container is accessible using an access key; generating a key to access the secure container by performing a multi-stage key generation sequence based, at least in part, on current configurations of the remote device; determining if the key generated by the multi-stage key generate sequence matches the access key; and allowing access to the secure container within the memory of the remote device when the access key matches the key generated by the multi-stage key generations sequence. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A remote device comprising:
-
a processor; a memory having stored thereon an operating system to manage resources of the remote device; a secure container stored within the memory of the remote device, wherein the secure container is accessible using an access key; a validator to test operating system integrity at multiple points; a key generator configured to generate a key to access the secure container by performing a multi-stage key generation sequence based on the operating system integrity determined by the validator; an access module to determine if the key generated by the multi-stage key generate sequence matches the access key and allow access to the secure container within the memory of the remote device when the access key matches the key generated by the multi-stage key generations sequence. - View Dependent Claims (22)
-
-
23. A method comprising:
-
performing multi-point operating system integrity check on a remote device; generating an authentication token based on the multi-point operating system integrity check; initiating a service connection request to establish a secure connection between the remote device and a gateway based on the authentication token; and creating the secure connection between an enterprise service and the remote device upon successful validation of the service connection request. - View Dependent Claims (24, 25, 26, 27)
-
Specification