System and method for creating secure applications
First Claim
1. A method of operating an enterprise application, comprising:
- receiving a request to activate the enterprise application through an input device of a computing device;
in response to the receipt of the request, forcing a management directive on the enterprise application on an individual basis during its operation, wherein forcing the management directive on the enterprise application occurs with no modifications to source code of the enterprise application;
wherein forcing the management directive on the enterprise application on an individual basis during its operation comprises;
imposing a virtual private network (VPN) connection on the enterprise application; and
enabling a tracking and recording of an amount of incoming or outgoing data used by the enterprise application.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for generating a secure application is described herein. The method can include the steps of obtaining a target application and decomposing the target application into original files that contain predictable instructions. One or more predictable instructions in the original files may be identified. In addition, the target application may be modified to create the secure application by binding one or more intercepts to the target application. These intercepts can enable the modification of the predictable instructions in accordance with one or more policies such that the behavior of the secure application is different from the original behavior of the target application. Modification of the target application may be conducted without access to the source code of the target application.
-
Citations
23 Claims
-
1. A method of operating an enterprise application, comprising:
-
receiving a request to activate the enterprise application through an input device of a computing device; in response to the receipt of the request, forcing a management directive on the enterprise application on an individual basis during its operation, wherein forcing the management directive on the enterprise application occurs with no modifications to source code of the enterprise application; wherein forcing the management directive on the enterprise application on an individual basis during its operation comprises; imposing a virtual private network (VPN) connection on the enterprise application; and enabling a tracking and recording of an amount of incoming or outgoing data used by the enterprise application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computing device for managing an enterprise application installed on the computing device, wherein a management application is also installed on the computing device, comprising:
-
an input device that is configured to receive a request to operate the enterprise application; and a processing unit that is communicatively coupled to the input device, wherein the processing unit to configured to; via the management application, force an override of the enterprise application by imposing a management directive individually on the enterprise application during operation of the enterprise application; wherein the processing unit is further configured to, via the management application, force the override of the enterprise application by imposing the management directive individually on the enterprise application during operation of the enterprise application by; causing a virtual private network (VPN) connection to be used as a network connection of the enterprise application; and causing a tracking and recording of an amount of data used by the enterprise application process to be enabled. - View Dependent Claims (10, 11, 12)
-
-
13. A computing device that has at least one enterprise application and personal application installed thereon and provides a number of system application programming interfaces (API) for interaction with applications, comprising:
-
an input device that is configured to receive a request to operate the enterprise application; and a processing unit that is communicatively coupled to the input device, wherein the processing unit to configured to; cause an imposition of a management configuration individually on the enterprise application during operation of the enterprise application while still permitting the enterprise application to call the system APIs; wherein the processing unit is further configured to cause the imposition of the management configuration individually on the enterprise application during operation of the enterprise application by causing a monitoring of an amount of data used by the enterprise application process to be enabled. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method of managing an enterprise application installed on a computing device, wherein personal applications are also installed on the computing device, comprising:
-
receiving a remote command at the computing device, wherein the remote command is configured to set a management configuration for enforcement against the enterprise application without impacting the personal applications; receiving a request to activate the enterprise application through an input device of the computing device; and in response to the receipt of the request, imposing the management configuration on the enterprise application by forcing a virtual private network (VPN) connection on the enterprise application on an individual basis. - View Dependent Claims (20, 21, 22, 23)
-
Specification