APPLICATION SECURITY FRAMEWORK
1 Assignment
0 Petitions
Accused Products
Abstract
In accordance with the teaching described herein, systems and methods are provided for prodding secure access to a software application on a computing device. The software application may include a security framework having a set of predetermined security requirements. Prior to enabling access to the software application by a user, the computing device may, (i) verify installation of a device security configuration profile on the computing device, wherein the device security configuration profile certifies that the software application includes the set of predetermined security requirements, (ii) receive identifying information from the user via a user interface, (iii) verify the identifying information with an authentication server, and (iv) based on a successful verification of the identifying information, receive and store a security token. Access to the software application on the computing device may be provided for a specified period identified by the security token.
-
Citations
56 Claims
-
1-27. -27. (canceled)
-
28. A method for providing secure access to a software application on a computing device, the software application including a security framework having a set of predetermined security requirements, the method comprising:
-
executing the software application on the computing device; verifying installation of a device security configuration profile on the computing device prior to enabling access to the software application by a user, wherein the device security configuration profile certifies that the software application includes the set of predetermined security requirements; providing access to the software application on the computing device for a specified period; and continuously monitoring the set of predetermined security requirements included within the device security configuration profile, and disabling access to the software application on the computing device if any one of the set of predetermined security requirements included within the device security configuration profile is altered or disabled. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 53, 54, 55, 56)
-
-
39. An application security system for a computing device, comprising;
-
one or more processors; a non-transitory computer readable medium; and a software application stored in the computer readable medium and executable by the one or more processor, the software application including a security framework having a set of predetermined security requirements, wherein the security framework is configured to; verify installation of a device security configuration profile on the computing device prior to enabling access to the software application by a user, wherein the device security configuration profile certifies that the software application includes the set of predetermined security requirements; provide access to the software application on the computing device for a specified period; and continuously monitor the set of predetermined security requirements included within the device security configuration profile, and disable access to the software application if any one of the set of predetermined security requirements included within the device security configuration profile is altered or disabled. - View Dependent Claims (40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
-
Specification