CLIENT APPLICATION BASED ACCESS CONTROL IN CLOUD SECURITY SYSTEMS FOR MOBILE DEVICES
First Claim
1. A cloud-based security system enforcing application-based control of network resources comprising:
- a plurality of nodes communicatively coupled to the Internet; and
one or more authority nodes communicatively coupled to the plurality of nodes;
wherein a node of the plurality of nodes is communicatively coupled to a user device via the Internet, andwherein the node is configured to receive a request from a user device for network resources on the Internet or in an external network, to evaluate the request to determine an application on the user device associated with the request, and to provide application-based control of the request based on the determined application and the network resources.
1 Assignment
0 Petitions
Accused Products
Abstract
A cloud-based security system enforcing application-based control of network resources includes a plurality of nodes communicatively coupled to the Internet; and one or more authority nodes communicatively coupled to the plurality of nodes; wherein a node of the plurality of nodes is communicatively coupled to a user device via the Internet, and wherein the node is configured to receive a request from a user device for network resources on the Internet or in an external network, to evaluate the request to determine an application on the user device associated with the request, and to provide application-based control of the request based on the determined application and the network resources.
-
Citations
20 Claims
-
1. A cloud-based security system enforcing application-based control of network resources comprising:
-
a plurality of nodes communicatively coupled to the Internet; and one or more authority nodes communicatively coupled to the plurality of nodes; wherein a node of the plurality of nodes is communicatively coupled to a user device via the Internet, and wherein the node is configured to receive a request from a user device for network resources on the Internet or in an external network, to evaluate the request to determine an application on the user device associated with the request, and to provide application-based control of the request based on the determined application and the network resources. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A user device comprising:
-
a network interface configured to connect to the Internet via a cloud-based security system; a processor communicatively coupled to the network interface; and memory storing computer-readable instructions configured to cause the processor to execute an application, wherein the application is configured to request network resources via the cloud-based security system which determines a type of the application by evaluation of the request and which provides application-based control of the request based on the determined application and the network resources. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
in a cloud-based security system comprising a plurality of nodes communicatively coupled to the Internet, receiving a request for network resources from a user device; evaluating the request to determine an application on the user device associated with the request; and responsive to pre-defined policies, providing application-based control of the request based on the determined application and the network resources which limits which applications on the user device are able to access the network resources. - View Dependent Claims (17, 18, 19, 20)
-
Specification