MOBILE DEVICE POLICY ENFORCEMENT
First Claim
Patent Images
1. A non-transitory computer-readable medium comprising instructions, the instructions when executed causing one or more processors to:
- attempt to load on a device software code with an invalid signature, the invalid signature sufficient to prevent loading of the software code if the device meets a specified security policy;
upon unsuccessful loading of the software code with the invalid signature, wait a predetermined time interval or for a designated event and then repeat the attempt; and
in response to successful loading of the software code with the invalid signature on the device, take an action to remediate the device.
4 Assignments
0 Petitions
Accused Products
Abstract
In general, in one aspect, a method includes receiving software code with an invalid characteristic, repeatedly attempting to execute the software code with the invalid characteristic on a device, and in response to successful execution of the software code with the invalid characteristic, taking an action. The action may include an action to remediate the device.
-
Citations
20 Claims
-
1. A non-transitory computer-readable medium comprising instructions, the instructions when executed causing one or more processors to:
-
attempt to load on a device software code with an invalid signature, the invalid signature sufficient to prevent loading of the software code if the device meets a specified security policy; upon unsuccessful loading of the software code with the invalid signature, wait a predetermined time interval or for a designated event and then repeat the attempt; and in response to successful loading of the software code with the invalid signature on the device, take an action to remediate the device. - View Dependent Claims (2, 3)
-
-
4. A method, comprising:
-
repeatedly attempting to perform a first action with software code with an invalid characteristic on a device until the attempt is successful, the invalid characteristic sufficient to prevent the first action if the device meets a specified security policy; and in response to successfully performing the first action with the software code with the invalid characteristic, taking a consequential action by the device. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system, comprising:
-
one or more processors; a non-transitory computer-readable medium comprising instructions, the instructions when executed causing one or more processors to perform operations, comprising; receive software code with an invalid characteristic; repeatedly attempt a first action with the software code with the invalid characteristic on a device until the attempt is successful wherein the invalid characteristic should cause the device to prevent the first action if the device meets a specified security policy; and in response to successful completion of the first action with the software code with the invalid characteristic, transmit an alert or remediate the device. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification