Securing and managing apps on a device using policy gates
First Claim
1. A method of securing an app for execution on a device using an app security program, the method comprising:
- generating Java class files for the app security program, said generating dictated by a plurality of app security policies separate from the app security program and located in a plurality of policy gates, each policy gate including at least one app security policy, the plurality of policy gates managed by a policy gate manager, wherein said policy gate manager informs each policy gate of each checkpoint that occurs during an execution lifecycle of the security-wrapped app and wherein each policy gate calls a function in response to the checkpoint;
replacing Java class files for the app with the Java class files for the app security program, wherein the Java class files for the app that are being replaced function as a proxy between the app and a device operating system;
creating a security-wrapped app upon completion of said replacing of Java class files for the app;
preparing the security-wrapped app for execution on the device; and
re-signing the security-wrapped app with a new key.
3 Assignments
0 Petitions
Accused Products
Abstract
A method of securing an app for execution on a device using an app security program with policy gates is described. First, Java class files are generated for the app security program, where the generating is dictated by a plurality of app security policies located in a plurality of policy gates. The plurality of policy gates are managed by a policy gate manager. Next, Java class files are replaced for the app with the Java class files for the app security program. Third, a security-wrapped app is created upon completion of replacing the Java class files for the app. Further, the security-wrapped app is prepared for execution on the device. Last, the security-wrapped app is re-signed with a new key.
12 Citations
15 Claims
-
1. A method of securing an app for execution on a device using an app security program, the method comprising:
-
generating Java class files for the app security program, said generating dictated by a plurality of app security policies separate from the app security program and located in a plurality of policy gates, each policy gate including at least one app security policy, the plurality of policy gates managed by a policy gate manager, wherein said policy gate manager informs each policy gate of each checkpoint that occurs during an execution lifecycle of the security-wrapped app and wherein each policy gate calls a function in response to the checkpoint; replacing Java class files for the app with the Java class files for the app security program, wherein the Java class files for the app that are being replaced function as a proxy between the app and a device operating system; creating a security-wrapped app upon completion of said replacing of Java class files for the app; preparing the security-wrapped app for execution on the device; and re-signing the security-wrapped app with a new key. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for securing an app for execution on a device using an app security program, the system comprising:
-
memory storing the app security program; and
a processor configured to;generate Java class files for the app security program, said generating dictated by a plurality of app security policies separate from the app security program and located in a plurality of policy gates, each policy gate including at least one app security policy, the plurality of policy gates managed by a policy gate manager, wherein said policy gate manager informs each policy gate of each checkpoint that occurs during an execution lifecycle of the security-wrapped app and wherein each policy gate calls a function in response to the checkpoint; replace Java class files for the app with the Java class files for the app security program, wherein the Java class files for the app that are being replaced function as a proxy between the app and a device operating system; create a security-wrapped app upon completion of said replacing of Java class files for the app; prepare the security-wrapped app for execution on the device; and re-sign the security-wrapped app with a new key. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer readable medium including instructions for:
-
generating Java class files for the app security program, said generating dictated by a plurality of app security policies separate from the app security program and located in a plurality of policy gates, each policy gate including at least one app security policy, the plurality of policy gates managed by a policy gate manager, wherein said policy gate manager informs each policy gate of each checkpoint that occurs during an execution lifecycle of the security-wrapped app and wherein each policy gate calls a function in response to the checkpoint; replacing Java class files for the app with the Java class files for the app security program, wherein the Java class files for the app that are being replaced function as a proxy between the app and a device operating system; creating a security-wrapped app upon completion of said replacing of Java class files for the app; preparing the security-wrapped app for execution on the device; and re-signing the security-wrapped app with a new key. - View Dependent Claims (12, 13, 14, 15)
-
Specification