Validating the Identity of a Mobile Application for Mobile Application Management
First Claim
1. A method of managing access to enterprise resources comprising:
- operating an access manager at a mobile computing device;
validating a mobile application installed at the mobile computing device using the access manager;
preventing the mobile application from accessing computing resource upon unsuccessful validation of the mobile application by the access manager;
identifying the mobile application as a trusted mobile application upon successful validation of the mobile application by the access manager; and
permitting the trusted mobile application to access the computing resource.
7 Assignments
0 Petitions
Accused Products
Abstract
A method of managing access to enterprise resources is provided. An access manager may operate at a mobile device to validate a mobile application installed at that mobile device. If the access manager does not successfully validate the mobile application, the access manager may prevent the mobile application from accessing computing resource. If the access manager does successfully validate the mobile application, then the access manager may identify the mobile application as a trusted mobile application. The access manager may thus permit the trusted mobile application to access the computing resource.
121 Citations
20 Claims
-
1. A method of managing access to enterprise resources comprising:
-
operating an access manager at a mobile computing device; validating a mobile application installed at the mobile computing device using the access manager; preventing the mobile application from accessing computing resource upon unsuccessful validation of the mobile application by the access manager; identifying the mobile application as a trusted mobile application upon successful validation of the mobile application by the access manager; and permitting the trusted mobile application to access the computing resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A mobile computing device comprising:
-
a mobile application configured to access computing resource; stored identification information associated with the mobile application; an access manager configured to validate the mobile application based on the stored identification information; and wherein the access manager is further configured to prevent the mobile application from accessing the computing resource upon unsuccessful validation of the mobile application, identify the mobile application as a trusted mobile application upon successful validation of the mobile application, and permit the trusted mobile application to access the computing resource. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An access manager configured to operate at a mobile computing device and configured to:
-
validate a mobile application installed at the mobile computing device based on identification information stored at the mobile computing device and associated with the mobile application; prevent the mobile application from accessing computing resource upon unsuccessful validation of the mobile application; identify the mobile application as a trusted mobile application upon successful validation of the mobile application; permit the trusted mobile application to access the computing resource; and control operation of the trusted mobile application based on an application policy stored at the mobile computing device.
-
Specification