Method and apparatus for protecting access to corporate applications from a mobile device
First Claim
Patent Images
1. A computer-implemented method performed by a computerized device, comprising:
- receiving a security policy associated with usage of an application by a user using a mobile device, the security policy comprising at least one vulnerability indication, wherein the security policy is determined based upon the application and an identity of a user of the mobile device;
receiving at least partial code of the application;
identifying at least one JavaScript instruction in the code, the at least one JavaScript instruction associated with the security vulnerability; and
adding additional JavaScript instructions to the code for handling the security vulnerability, wherein adding the additional JavaScript instructions to the code is performed for the application prior to downloading the application to the mobile device.
17 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method, apparatus and computer program product for providing secure consumption of applications from mobile devices, The method comprises receiving a security policy associated with usage of an application by a user using a mobile device, the security policy comprising at least one vulnerability indication; receiving at least partial code of the application; identifying at least one JavaScript instruction in the code, the at least one JavaScript instruction associated with the security vulnerability; and adding additional JavaScript instructions to the code for handling the security vulnerability.
5 Citations
15 Claims
-
1. A computer-implemented method performed by a computerized device, comprising:
-
receiving a security policy associated with usage of an application by a user using a mobile device, the security policy comprising at least one vulnerability indication, wherein the security policy is determined based upon the application and an identity of a user of the mobile device; receiving at least partial code of the application; identifying at least one JavaScript instruction in the code, the at least one JavaScript instruction associated with the security vulnerability; and adding additional JavaScript instructions to the code for handling the security vulnerability, wherein adding the additional JavaScript instructions to the code is performed for the application prior to downloading the application to the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computerized apparatus comprising:
- a hardware processor, the hardware processor being adapted to perform the steps of;
receiving a security policy associated with usage of an application by a user using a mobile device, the security policy comprising at least one vulnerability indication, wherein the security policy is determined based upon the application and an identity of a user of the mobile device; receiving at least partial code of the application; identifying at least one JavaScript instruction in the code, the at least one JavaScript instruction associated with the security vulnerability; and adding additional JavaScript instructions to the code for handling the security vulnerability, wherein adding the additional JavaScript instructions to the code is performed for the application prior to downloading the application to the mobile device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
- a hardware processor, the hardware processor being adapted to perform the steps of;
-
15. A non-transitory computer readable medium comprising:
-
instructions that when executed cause a computer to perform a process; a first program instruction for receiving a security policy associated with usage of an application by a user using a mobile device, the security policy comprising at least one vulnerability indication, wherein the security policy is determined based upon the application and an identity of a user of the mobile device; a second program instruction for receiving at least partial code of the application; a third program instruction for identifying at least one JavaScript instruction in the code, the at least one JavaScript instruction associated with the security vulnerability; and a fourth program instruction for adding additional JavaScript instructions to the code for handling the security vulnerability, wherein adding the additional JavaScript instructions to the code is performed for the application prior to downloading the application to the mobile device, wherein said first, second, third and fourth program instructions are stored on said non-transitory computer readable medium.
-
Specification