Out of band end user notification systems and methods for security events related to non-browser mobile applications
First Claim
Patent Images
1. A cloud based security method, comprising:
- authenticating a mobile device through a cloud based security system via a secure agent on the mobile device;
associating the mobile device with a user of the cloud based security system based on the authenticating;
monitoring user requests from the mobile device by the cloud based security system, wherein the user requests are for non-browser mobile applications executed on the mobile device;
detecting security threats in the non-browser mobile applications based on the monitoring; and
sending an out of band end user notification to the mobile device responsive to detecting a security threat, wherein the out of band end user notification comprises information for the user related to the security threat, wherein the out of band end user notification is sent to the mobile device separate from the non-browser mobile application to notify the user of the security threats through steps of;
sending a notification to a delegate server from the cloud based security system with associated data for a push notification to the mobile device;
determining the user for the push notification from a first mapping of the user to the cloud based security system and determining the mobile device from a second mapping of the user to the mobile device using the secure agent;
instructing a mobile Operation System platform associated with the mobile device to send the push notification to the mobile device based on the notification and the second mapping, wherein the push notification is sent to the mobile device by the mobile Operation System platform based on the instructing and the push notification is out-of-band from the cloud based security system.
1 Assignment
0 Petitions
Accused Products
Abstract
A cloud based security method includes authenticating a mobile device through a cloud based security system; associating the mobile device with a user of the cloud based security system based on the authenticating; monitoring user requests from the mobile device by the cloud based security system; detecting security threats based on the monitoring; and sending an out of band end user notification to the mobile device responsive to detecting a security threat, wherein the out of band end user notification comprises information for the user related to the security threat.
-
Citations
12 Claims
-
1. A cloud based security method, comprising:
-
authenticating a mobile device through a cloud based security system via a secure agent on the mobile device; associating the mobile device with a user of the cloud based security system based on the authenticating; monitoring user requests from the mobile device by the cloud based security system, wherein the user requests are for non-browser mobile applications executed on the mobile device; detecting security threats in the non-browser mobile applications based on the monitoring; and sending an out of band end user notification to the mobile device responsive to detecting a security threat, wherein the out of band end user notification comprises information for the user related to the security threat, wherein the out of band end user notification is sent to the mobile device separate from the non-browser mobile application to notify the user of the security threats through steps of; sending a notification to a delegate server from the cloud based security system with associated data for a push notification to the mobile device; determining the user for the push notification from a first mapping of the user to the cloud based security system and determining the mobile device from a second mapping of the user to the mobile device using the secure agent; instructing a mobile Operation System platform associated with the mobile device to send the push notification to the mobile device based on the notification and the second mapping, wherein the push notification is sent to the mobile device by the mobile Operation System platform based on the instructing and the push notification is out-of-band from the cloud based security system. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A cloud based security system, comprising:
-
a central authority (CA) server, a cloud node (CN), and a delegate server communicatively coupled to a mobile operating system notification system, wherein each of the one or more CA servers, the one or more cloud nodes, and the delegate server are communicatively coupled to one another and each comprise at least one computer processor and memory; wherein the cloud node, using software executed by the at least one computer processor, is configured to; authenticate a mobile device, wherein the CA server is configured to associate a user of the mobile device based on authentication for a first mapping of the user to the cloud node and a second mapping of the user to the mobile device; monitor user requests from the mobile device, the user requests are for non-browser mobile applications executed on the mobile device, and upon detection of a security threat, provide a request to the delegate server; wherein the delegate server is configured to; receive the request from the cloud node with associated data for a push notification to the mobile device, determine the user for the push notification from the first mapping and the mobile device from the second mapping; instruct a mobile Operation System platform associated with the mobile device to send the push notification to the mobile device based on the notification and the second mapping, wherein the push notification is sent to the mobile device by the mobile Operation System platform based thereon and the push notification is out-of-band from the cloud based security system, wherein the push notification is sent to the mobile device separate from the non-browser mobile application to notify the user of the security threats, wherein the cloud node utilizes the secure agent to authenticate the mobile device and the CA server uses the secure agent to map information associated with the mobile device and user. - View Dependent Claims (8, 9, 10)
-
-
11. A mobile device, comprising:
-
a network interface communicatively coupled to a user and an external network; a computer processor; and memory storing computer executable instructions, and in response to execution by the processor, the computer executable instructions cause the computer processor to perform steps of; operate a secure agent associated with a cloud based security system; operate a non-browser mobile device application unable to display Hypertext Transfer Protocol (HTTP) responses for an end user notification; authenticate with the cloud based security system via the secure agent, wherein the cloud based security system performs a first mapping of the user to the cloud based security system and a second mapping of the user to the mobile device using the secure agent; receive the end user notification out of band from a mobile operating system notification system responsive to the cloud based security system detecting a security threat with the non-browser mobile device application, wherein the out of band end user notification is sent to the mobile device separate from the non-browser mobile applications as a push notification to notify the user of the security threats; and display the end user notification separate from the non-browser mobile device application, wherein the cloud based security system sends the end user notification to a delegate server which uses the first mapping and the second mapping to instruct a mobile Operation System platform to send the push notification based on the notification and the push notification is out-of-band from the cloud based security system. - View Dependent Claims (12)
-
Specification