Real-time mobile application management
First Claim
1. A method of mobile device management, the method comprising:
- installing a client-side engine of an enforcement engine on a mobile device, wherein the enforcement engine further includes a runtime engine;
routing communications between the mobile device and a network/cloud or an enterprise network through the enforcement engine;
from a signature database (“
SigDB”
) that includes signatures pertaining to mobile applications, generating a policy regarding the mobile applications, wherein the mobile applications include private mobile applications and public mobile applications;
enforcing compliance of the mobile device with the policy in real time, wherein the policy includes a default rule allowing public mobile applications and blocking private mobile applications;
a whitelist of one or more private mobile applications that are allowed; and
a blacklist of one or more public mobile applications that are blocked.
1 Assignment
0 Petitions
Accused Products
Abstract
Some embodiments relate to mobile application management. An example embodiment includes a method of mobile device management. The method includes installing a client-side engine of an enforcement engine on a mobile device. The enforcement engine further includes a runtime engine. The method also includes routing communications between the mobile device and a network/cloud or an enterprise network through the enforcement engine. In addition, the method includes generating a policy regarding the mobile applications from a signature database (“SigDB”). The SigDB includes signatures pertaining to mobile applications. Compliance of the mobile device with the policy is enforced in real time.
105 Citations
20 Claims
-
1. A method of mobile device management, the method comprising:
-
installing a client-side engine of an enforcement engine on a mobile device, wherein the enforcement engine further includes a runtime engine; routing communications between the mobile device and a network/cloud or an enterprise network through the enforcement engine; from a signature database (“
SigDB”
) that includes signatures pertaining to mobile applications, generating a policy regarding the mobile applications, wherein the mobile applications include private mobile applications and public mobile applications;enforcing compliance of the mobile device with the policy in real time, wherein the policy includes a default rule allowing public mobile applications and blocking private mobile applications;
a whitelist of one or more private mobile applications that are allowed; and
a blacklist of one or more public mobile applications that are blocked. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of mobile application management in a bring your own device (“
- BYOD”
) environment, the method comprising;publishing at least one signature of at least one mobile application in a signature database (“
SigDB”
), wherein the signature includes;information indicating whether the mobile application is a private mobile application or a public mobile application, and information about vulnerabilities introduced to an enterprise by the mobile application, provisioning at least one private mobile application, wherein provisioning includes enabling a first user to use the private mobile application; by default, blocking the mobile applications defined as private mobile applications except the at least one private mobile application that is provisioned; based on the information about vulnerabilities, blocking at least one public mobile application; and by default, allowing use of mobile applications defined as public mobile applications except the at least one public mobile application that is blocked. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15)
- BYOD”
-
16. A bring-your-own-device (“
- BYOD”
) environment mobile application management system comprising;a computing device including a computer-readable medium having computer-executable instructions stored thereon that are executable by the computing device, the computer-executable instructions including; an enforcement engine including a client-side engine installed on a mobile device and a runtime engine installed on a network/cloud and/or an enterprise network, and a customizable policy; wherein when executed by the computing device; the enforcement engine manages in real time mobile applications on the mobile device and traffic related to mobile applications in the network/cloud, wherein the management in real time of mobile applications includes allowing public mobile applications except public mobile applications specifically blocked and blocking private mobile applications expect private mobile applications that are specifically allowed, and the customizable policy forms the basis of the enforcement engine management. - View Dependent Claims (17, 18, 19, 20)
- BYOD”
Specification