METHOD AND APPARATUS FOR PROTECTING ACCESS TO CORPORATE APPLICATIONS FROM A MOBILE DEVICE
First Claim
1. A computer-implemented method performed by a computerized device, comprising:
- receiving a security policy associated with usage of an application by a user using a mobile device, the security policy comprising at least one vulnerability indication;
receiving at least partial code of the application;
identifying at least one JavaScript instruction in the code, the at least one JavaScript instruction associated with the security vulnerability; and
adding additional JavaScript instructions to the code for handling the security vulnerability.
17 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method, apparatus and computer program product for providing secure consumption of applications from mobile devices, The method comprises receiving a security policy associated with usage of an application by a user using a mobile device, the security policy comprising at least one vulnerability indication; receiving at least partial code of the application; identifying at least one JavaScript instruction in the code, the at least one JavaScript instruction associated with the security vulnerability; and adding additional JavaScript instructions to the code for handling the security vulnerability.
-
Citations
19 Claims
-
1. A computer-implemented method performed by a computerized device, comprising:
-
receiving a security policy associated with usage of an application by a user using a mobile device, the security policy comprising at least one vulnerability indication; receiving at least partial code of the application; identifying at least one JavaScript instruction in the code, the at least one JavaScript instruction associated with the security vulnerability; and adding additional JavaScript instructions to the code for handling the security vulnerability. - View Dependent Claims (2, 3, 4, 5, 7, 8, 9)
-
-
6. The computer-implemented method of claim further comprising:
-
identifying a second security vulnerability associated with attempt to download a file to the mobile device; and protecting the file by presenting the file to a user using a secure application or a web browser without downloading the file to the mobile device, in accordance with the security policy.
-
-
10. A computerized apparatus having a processor, the processor being adapted to perform the steps of:
-
receiving a security policy associated with usage of an application by a user using a mobile device, the security policy comprising at least one vulnerability indication; receiving at least partial code of the application; identifying at least one JavaScript instruction in the code, the at least one JavaScript instruction associated with the security vulnerability; and adding additional JavaScript instructions to the code for handling the security vulnerability. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product comprising:
-
a non-transitory computer readable medium; a first program instruction for receiving a security policy associated with usage of an application by a user using a mobile device, the security policy comprising at least one vulnerability indication; a second program instruction for receiving at least partial code of the application; a third program instruction for identifying at least one JavaScript instruction in the code, the at least one JavaScript instruction associated with the security vulnerability; and a fourth program instruction for adding additional JavaScript instructions to the code for handling the security vulnerability, wherein said first, second, third and fourth program instructions are stored on said non-transitory computer readable medium.
-
Specification