Validating the identity of a mobile application for mobile application management
First Claim
Patent Images
1. A method of managing access to enterprise resources comprising:
- operating an access manager at a mobile computing device;
storing, at the mobile computing device, identification information corresponding to an identification token embedded in a mobile application installed at the mobile computing device;
validating, using the access manager, the mobile application based, at least in part, on the identification token and the identification information stored wherein validating the mobile application compriseschallenging the mobile application to provide a response that is based, at least in part, on the identification token,generating an expected response based, at least in part, on the identification information stored,comparing the expected response to the response provided by the mobile application, anddetermining that the mobile application is either valid or invalid based on whether the expected response matches the response provided by the mobile application;
preventing the mobile application from accessing a computing resource upon unsuccessful validation of the mobile application by the access manager;
identifying the mobile application as a trusted mobile application upon successful validation of the mobile application by the access manager; and
permitting the trusted mobile application to access the computing resource.
7 Assignments
0 Petitions
Accused Products
Abstract
A method of managing access to enterprise resources is provided. An access manager may operate at a mobile device to validate a mobile application installed at that mobile device. If the access manager does not successfully validate the mobile application, the access manager may prevent the mobile application from accessing computing resource. If the access manager does successfully validate the mobile application, then the access manager may identify the mobile application as a trusted mobile application. The access manager may thus permit the trusted mobile application to access the computing resource.
34 Citations
16 Claims
-
1. A method of managing access to enterprise resources comprising:
-
operating an access manager at a mobile computing device; storing, at the mobile computing device, identification information corresponding to an identification token embedded in a mobile application installed at the mobile computing device; validating, using the access manager, the mobile application based, at least in part, on the identification token and the identification information stored wherein validating the mobile application comprises challenging the mobile application to provide a response that is based, at least in part, on the identification token, generating an expected response based, at least in part, on the identification information stored, comparing the expected response to the response provided by the mobile application, and determining that the mobile application is either valid or invalid based on whether the expected response matches the response provided by the mobile application; preventing the mobile application from accessing a computing resource upon unsuccessful validation of the mobile application by the access manager; identifying the mobile application as a trusted mobile application upon successful validation of the mobile application by the access manager; and permitting the trusted mobile application to access the computing resource. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A mobile computing device comprising:
-
a mobile application configured to access a computing resource; a data store storing identification information corresponding to an identification token embedded in the mobile application; an access manager configured to validate the mobile application based on the stored identification information by challenging the mobile application to provide a response that is based, at least in part, on the identification token, generating an expected response based, at least in part, on the identification information stored, comparing the expected response to the response provided by the mobile application, and determining that the mobile application is either valid or invalid based on whether the expected response matches the response provided by the mobile application; and wherein the access manager is further configured to prevent the mobile application from accessing the computing resource upon unsuccessful validation of the mobile application, identify the mobile application as a trusted mobile application upon successful validation of the mobile application, and permit the trusted mobile application to access the computing resource. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable storage medium having instructions stored thereon that, when executed at a mobile computing device, cause the mobile computing device to:
-
validate a mobile application installed at the mobile computing device based on identification information stored at the mobile computing device wherein the identification information stored corresponds to an identification token embedded in the mobile application and wherein validating the mobile application comprises challenging the mobile application to provide a response that is based, at least in part, on the identification token, generating an expected response based, at least in part, on the identification information stored, comparing the expected response to the response provided by the mobile application, and determining that the mobile application is either valid or invalid based on whether the expected response matches the response provided by the mobile application; and prevent the mobile application from accessing a computing resource upon unsuccessful validation of the mobile application; identify the mobile application as a trusted mobile application upon successful validation of the mobile application and permit the trusted mobile application to access the computing resource. - View Dependent Claims (14, 15, 16)
-
Specification