Mobile information management methods and systems
First Claim
1. An application information management security system comprising:
- a governance console configured to store one or more security policies, wherein each security policy;
corresponds to one or more applications intended for one or more computing devices, andindicates one or more potential use cases and one or more corresponding security actions;
a security console configured to;
receive, by a computer, compiled applications;
automatically wrap each of the received compiled applications with one or more security policies using a code injection script, wherein the code injection script comprises computer readable program code that causes the security console to inject one or more skeleton code snippets into at least one of a native file and a manifest file of the one or more received applications.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are disclosed for mobile information management using a code injection approach. The method for information management of applications includes the steps of: receiving, by a computer, one or more compiled applications, and receiving, by a computer, one or more security policies, wherein each security policy indicates one or more use cases and one or more security actions associated with each use case. The method also includes the step of associating the received applications with the one or more received security policies. Additionally, the method includes the step of automatically wrapping the received applications with the associated security policy using a code injection script.
23 Citations
18 Claims
-
1. An application information management security system comprising:
-
a governance console configured to store one or more security policies, wherein each security policy; corresponds to one or more applications intended for one or more computing devices, and indicates one or more potential use cases and one or more corresponding security actions; a security console configured to; receive, by a computer, compiled applications; automatically wrap each of the received compiled applications with one or more security policies using a code injection script, wherein the code injection script comprises computer readable program code that causes the security console to inject one or more skeleton code snippets into at least one of a native file and a manifest file of the one or more received applications. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for information management of applications, the method comprising:
-
receiving, by a computer, one or more compiled applications; receiving, by a computer, one or more security policies, wherein each security policy indicates one or more use cases and one or more security actions associated with each use case; associating the received applications with the one or more received security policies; and
,automatically wrapping the received applications with the associated security policy using a code injection script, wherein the automatically wrapping step further comprises injecting one or more skeleton code snippets into at least one of a native file and a manifest file of the one or more received applications. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification