Application security framework
First Claim
1. A method for providing secure access to a software application on a computing device, the method comprising:
- executing the software application, including a security framework having a set of predetermined security requirements, on the computing device, wherein the security framework and the set of predetermined security requirements are generated using at least one of i) a preapproved security framework template or ii) a preapproved security framework template and a set of security modules installed on the computing device from a security framework library;
verifying, by the security framework, installation of a device security configuration profile on the computing device prior to enabling access to the software application by a user, wherein the device security configuration profile includes a certification that the software application includes the set of predetermined security requirements, wherein the device security configuration profile is installed by a certification authority, wherein the device security configuration profile provides a set of predetermined security restrictions corresponding to the set of predetermined security requirements, and wherein the verifying of the installation further includes verifying that the device security configuration profile is stored at an appropriate secure location of the computing device;
providing access to the software application on the computing device for a specified period; and
continuously monitoring the set of predetermined security restrictions included within the device security configuration profile until the set of predetermined security restrictions is altered or disabled, and disabling access to the software application on the computing device when any one of the set of predetermined security restrictions included within the device security configuration profile is altered or disabled.
1 Assignment
0 Petitions
Accused Products
Abstract
In accordance with the teaching described herein, systems and methods are provided for providing secure access to a software application on a computing device. The software application may include a security framework having a set of predetermined security requirements. Prior to enabling access to the software application by a user, the computing device may, (i) verify installation of a device security configuration profile on the computing device, wherein the device security configuration profile certifies that the software application includes the set of predetermined security requirements, (ii) receive identifying information from the user via a user interface, (iii) verify the identifying information with an authentication server, and (iv) based on a successful verification of the identifying information, receive and store a security token. Access to the software application on the computing device may be provided for a specified period identified by the security token.
-
Citations
24 Claims
-
1. A method for providing secure access to a software application on a computing device, the method comprising:
-
executing the software application, including a security framework having a set of predetermined security requirements, on the computing device, wherein the security framework and the set of predetermined security requirements are generated using at least one of i) a preapproved security framework template or ii) a preapproved security framework template and a set of security modules installed on the computing device from a security framework library; verifying, by the security framework, installation of a device security configuration profile on the computing device prior to enabling access to the software application by a user, wherein the device security configuration profile includes a certification that the software application includes the set of predetermined security requirements, wherein the device security configuration profile is installed by a certification authority, wherein the device security configuration profile provides a set of predetermined security restrictions corresponding to the set of predetermined security requirements, and wherein the verifying of the installation further includes verifying that the device security configuration profile is stored at an appropriate secure location of the computing device; providing access to the software application on the computing device for a specified period; and continuously monitoring the set of predetermined security restrictions included within the device security configuration profile until the set of predetermined security restrictions is altered or disabled, and disabling access to the software application on the computing device when any one of the set of predetermined security restrictions included within the device security configuration profile is altered or disabled. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An application security system for a computing device, comprising;
-
one or more processors; a non-transitory computer readable medium; and a software application stored in the computer readable medium and executable by the one or more processor, the software application including a security framework having a set of predetermined security requirements, wherein the security framework and the set of predetermined security requirements are generated using at least one of i) a preapproved security framework template or ii) a preapproved security framework template and a set of security modules installed on the computing device from a security framework library, wherein the security framework is configured to; verify installation of a device security configuration profile on the computing device prior to enabling access to the software application by a user, wherein the device security configuration profile includes a certification that the software application includes the set of predetermined security requirements, wherein the device security configuration profile is installed by a certification authority, wherein the device security configuration profile provides a set of predetermined security restrictions corresponding to the set of predetermined security requirements, and wherein the verifying of the installation further includes verifying that the device security configuration profile is stored at an appropriate secure location of the computing device; provide access to the software application on the computing device for a specified period; and continuously monitor the set of predetermined security restrictions included within the device security configuration profile until the set of predetermined security restrictions is altered or disabled, and disable access to the software application when any one of the set of predetermined security restrictions included within the device security configuration profile is altered or disabled. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification