Access control system for a mobile device
First Claim
1. A computer-implemented method performed by a mobile device having a processor and memory, the method comprising:
- receiving a Proxy Auto Config (PAC) file in response to a PAC request, wherein the PAC request identifies parameters of the mobile device, wherein the PAC file correlates to the parameters of the mobile device, wherein the PAC file comprises a function configured to select a proxy to a request based on a Uniform Resource Locator (URL) of the request, wherein the function is configured to apply a portion of selection rules, wherein the portion of the selection rules is selected automatically from a set of security related selection rules based on the PAC request;
selecting a proxy to handle a request to a remote server, the request is issued by a program being executed by the mobile device, wherein the proxy is configured to perform a predetermined action in response to the request, wherein in response to said request, activating the function of the PAC file to perform said selecting; and
sending the request to the proxy.
4 Assignments
0 Petitions
Accused Products
Abstract
A method, apparatus and product that provide a access control system for mobile devices. The mobile device performing: selecting a proxy to handle a request to a remote server, the request is issued by a program being executed by the mobile device, wherein the proxy is configured to perform a security action in response to the request; and sending the request to the proxy; whereby selectively performing the predetermined security action on a portion of the requests issued by the mobile device. Additionally or alternatively, a computer performing: receiving from a mobile device, an instruction to provide a Proxy Auto Config (PAC) file; and generating a PAC file that comprises a function which is configured to receive a URL and return a proxy to handle a request to the URL, wherein the proxy is configured to perform a security action in response to receiving a request.
-
Citations
20 Claims
-
1. A computer-implemented method performed by a mobile device having a processor and memory, the method comprising:
-
receiving a Proxy Auto Config (PAC) file in response to a PAC request, wherein the PAC request identifies parameters of the mobile device, wherein the PAC file correlates to the parameters of the mobile device, wherein the PAC file comprises a function configured to select a proxy to a request based on a Uniform Resource Locator (URL) of the request, wherein the function is configured to apply a portion of selection rules, wherein the portion of the selection rules is selected automatically from a set of security related selection rules based on the PAC request; selecting a proxy to handle a request to a remote server, the request is issued by a program being executed by the mobile device, wherein the proxy is configured to perform a predetermined action in response to the request, wherein in response to said request, activating the function of the PAC file to perform said selecting; and sending the request to the proxy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method performed by a computer having a processor and memory, the method comprising:
-
receiving from a mobile device, an instruction to provide the mobile device with a Proxy Auto Config (PAC) file;
wherein the PAC file is to be used by a program of the mobile device when the mobile device is connected to a network; anddynamically generating a PAC file for the mobile device, wherein the PAC file comprises a function, wherein the function is configured to receive a Uniform Resource Locator (URL) and return a proxy to handle a request to the URL, wherein the function is configured to make a determination based on an identity of the network to which the mobile device is connected, wherein the network is a Wi-Fi network, a Wireless LAN network, a wired LAN network, or a cellular data network, wherein the proxy is configured to perform a predetermined action in response to receiving a request; whereby requests by the mobile device are selectively routed to the proxy without having a second program in the mobile device to monitor requests issued in the mobile device. - View Dependent Claims (12, 13)
-
-
14. A mobile device having a processor, the processor being adapted to perform the steps of:
-
receiving a Proxy Auto Config (PAC) file in response to a PAC request, wherein the PAC request identifies parameters of the mobile device, wherein the PAC file correlates to the parameters of the mobile device, wherein the PAC file comprises a function configured to select a proxy to a request based on a Uniform Resource Locator (URL) of the request, wherein the function is configured to apply a portion of selection rules, wherein the portion of the selection rules is selected automatically from a set of security related selection rules based on the PAC request; selecting a proxy to handle a request to a remote server, the request is issued by a program being executed by the mobile device, wherein the proxy is configured to perform a predetermined action in response to the request, wherein in response to said request, activating the function of the PAC file to perform said selecting; and sending the request to the proxy. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification