Secure mobile browser for protecting enterprise data
First Claim
1. A mobile device comprising a user interface, a memory, and at least one processor configured to run applications stored on the memory, the mobile device comprising:
- a web browser installed on the memory of the mobile device, the web browser configured to regulate operation of at least one application in accordance with one or more enterprise policies, the web browser further comprising a secure cache configured to store data received from one or more enterprise resources, and the web browser further configured to;
determine that a connection speed of a network connection of the mobile device is below a threshold;
in response to determining that the connection speed is below the threshold;
prevent the application from detecting that the connection speed is below the threshold; and
store, in the secure cache, data requested to be transmitted over the network connection;
after storing data in the secure cache;
receive, from a computing device, an instruction to remove access to data stored in the secure cache; and
remove, in response to receiving the instruction, access to the data stored in the secure cache; and
an application installed on the memory of the mobile device, the application configured to;
launch the web browser in response to receiving a command to initiate execution; and
after launching the web browser, continue execution within an execution environment provided by the web browser.
9 Assignments
0 Petitions
Accused Products
Abstract
A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly implement a BYOD (bring your own device) policy in which users can run both personal applications and secure enterprise applications on their mobile devices. The system may, for example, implement policies for controlling mobile device accesses to enterprise resources based on device attributes (e.g., what mobile applications are installed), user attributes (e.g., the user'"'"'s position or department), behavioral attributes, and other criteria. Client-side code installed on the mobile devices may further enhance security by, for example, creating a secure container for locally storing enterprise data, creating a secure execution environment for running enterprise applications, and/or creating secure application tunnels for communicating with the enterprise system.
-
Citations
57 Claims
-
1. A mobile device comprising a user interface, a memory, and at least one processor configured to run applications stored on the memory, the mobile device comprising:
-
a web browser installed on the memory of the mobile device, the web browser configured to regulate operation of at least one application in accordance with one or more enterprise policies, the web browser further comprising a secure cache configured to store data received from one or more enterprise resources, and the web browser further configured to; determine that a connection speed of a network connection of the mobile device is below a threshold; in response to determining that the connection speed is below the threshold; prevent the application from detecting that the connection speed is below the threshold; and store, in the secure cache, data requested to be transmitted over the network connection; after storing data in the secure cache; receive, from a computing device, an instruction to remove access to data stored in the secure cache; and remove, in response to receiving the instruction, access to the data stored in the secure cache; and an application installed on the memory of the mobile device, the application configured to; launch the web browser in response to receiving a command to initiate execution; and after launching the web browser, continue execution within an execution environment provided by the web browser. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method comprising:
-
determining, by a web browser installed on a memory of a mobile device, that a connection speed of a network connection of the mobile device is below a threshold, wherein the mobile device comprises a user interface, the memory, and at least one processor configured to run applications stored on the memory, and wherein the web browser is configured to regulate operation of at least one application in accordance with one or more enterprise policies, the web browser comprising a secure cache configured to store data received from one or more enterprise resources; in response to determining that the connection speed is below the threshold; preventing, by the web browser, the application from detecting that the connection speed is below the threshold; and storing, by the web browser, in the secure cache, data requested to be transmitted over the network connection; and after storing data in the secure cache; receiving, by the web browser, from a computing device, an instruction to remove access to data stored in the secure cache; and removing, by the web browser, in response to receiving the instruction, access to the data stored in the secure cache, wherein an application is installed on the memory of the mobile device, and the application is configured to; launch the web browser in response to receiving a command to initiate execution; and after launching the web browser, continue execution within an execution environment provided by the web browser. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. One or more non-transitory computer-readable media having instructions stored thereon that, when executed, cause a mobile device to:
-
determine, by a web browser installed on the non-transitory computer-readable media, that a connection speed of a network connection of the mobile device is below a threshold, wherein the mobile device comprises a user interface and at least one processor configured to run applications stored on the non-transitory computer-readable media, and wherein the web browser is configured to regulate operation of at least one application in accordance with one or more enterprise policies, the web browser comprising a secure cache configured to store data received from one or more enterprise resources; in response to determining that the connection speed is below the threshold; prevent, by the web browser, the application from detecting that the connection speed is below the threshold; and store, by the web browser, in the secure cache, data requested to be transmitted over the network connection; and after storing data in the secure cache; receive, by the web browser, from a computing device, an instruction to remove access to data stored in the secure cache; and remove, by the web browser, in response to receiving the instruction, access to the data stored in the secure cache, wherein an application is installed on the non-transitory computer-readable media, and the application is configured to; launch the web browser in response to receiving a command to initiate execution; and after launching the web browser, continue execution within an execution environment provided by the web browser. - View Dependent Claims (40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57)
-
Specification