IN-LINE FILTERING OF INSECURE OR UNWANTED MOBILE DEVICE SOFTWARE COMPONENTS OR COMMUNICATIONS
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques for in-line filtering of insecure or unwanted mobile components or communications (e.g., insecure or unwanted behaviors associated with applications for mobile devices (“apps”), updates for apps, communications to/from apps, operating system components/updates for mobile devices, etc.) for mobile devices are disclosed. In some embodiments, in-line filtering of apps for mobile devices includes intercepting a request for downloading an application to a mobile device; and modifying a response to the request for downloading the application to the mobile device. In some embodiments, the response includes a notification that the application cannot be downloaded due to an application risk policy violation.
27 Citations
20 Claims
-
1. (canceled)
-
2. A system, comprising:
-
a hardware processor of an inline filtering device for in-line filtering of applications for mobile devices, the hardware processor configured to; intercept a request for downloading an application to a mobile device; cache or quarantine the application at the inline filtering device pending determination of a result of a risk analysis of the application based on an application risk policy, wherein the application is blocked from completing a transfer to the mobile device while it is cached or quarantined at the inline filtering device; and modify a response to the request for downloading the application to the mobile device based on the result of the risk analysis of the application based on the application risk policy; and a memory coupled to the hardware processor and configured to provide the hardware processor with instructions. - View Dependent Claims (3, 4, 5, 6)
-
-
7. A system, comprising:
-
a hardware processor of an inline filtering device for in-line filtering of applications for mobile devices, the hardware processor configured to; perform in-line filtering of traffic from a mobile device to the Internet; identify an application request from the in-line filtering of traffic from the mobile device to the Internet, wherein the application request includes a request to download an application to the mobile device; cache or quarantine the application at the inline filtering device pending determination of a result of a risk analysis of the application based on an application risk policy, wherein the application is blocked from completing a transfer to the mobile device while it is cached or quarantined at the inline filtering device; and modify a response to the application request that is communicated to the mobile device based on the result of the risk analysis of the application based on the application risk policy; and a memory coupled to the hardware processor and configured to provide the hardware processor with instructions. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method, comprising:
-
performing in-line filtering of traffic from a mobile device to the Internet using a hardware processor of an inline filtering device for in-line filtering of applications for mobile devices; identifying an application request from the in-line filtering of traffic from the mobile device to the Internet, wherein the application request includes a request to download an application to the mobile device; caching or quarantining the application at the inline filtering device pending determination of a result of a risk analysis of the application based on an application risk policy, wherein the application is blocked from completing a transfer to the mobile device while it is cached or quarantined at the inline filtering device; and modifying a response to the application request that is communicated to the mobile device based on the result of the risk analysis of the application based on the application risk policy. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A system, comprising:
-
a hardware processor of an inline filtering device for in-line filtering of insecure or unwanted mobile device communications for mobile devices, the hardware processor configured to; intercept a communication from a mobile device at the in-line filtering device; determine whether the communication from the mobile device includes an application search request from the mobile device to a public application market or a private application market; throttle the communication at the inline filtering device pending determination of a result of a risk analysis based on an application risk policy for mobile device communications associated with the mobile device, wherein the application risk policy for mobile device communications associated with the mobile device includes at least one rule that is associated with or matches at least in part information included in the application search request, and wherein the communication is blocked from completing a transfer of a response to the communication to the mobile device while it is throttled at the inline filtering device; and modify a response to the application search request to filter one or more applications listed in the response based on the application risk policy, wherein the modified response includes a notification that the one or more applications responsive to the application search request were removed from the response; and a memory coupled to the hardware processor and configured to provide the hardware processor with instructions. - View Dependent Claims (18, 19, 20)
-
Specification