Automatically configuring mobile devices and applying policy based on device state
First Claim
Patent Images
1. A system for automatically configuring mobile devices and applying policies based on a Host Information Profile (HIP) report, comprising:
- a processor configured to;
receive a list of known malware and application characteristics from an external service;
receive the HIP report for a mobile device, wherein the HIP report includes applications installed on the mobile device, device state information, and device configuration information, wherein the device state information and the device configuration information both comprise one or more features;
perform a policy match based on the HIP report for the mobile device, comprising to;
determine whether the HIP report indicates that one or more features are missing or one or more features are disabled causing the mobile device to fail the policy match;
determine whether an application installed on the mobile device is found on the list of known malware and application characteristics; and
in response to a determination that the application installed on the mobile device is found on the list of known malware and application characteristics;
determine whether the application is found on an exclude list, the exclude list being locally generated by an administrator;
in response to a determination that the application is found on the exclude list, determine that the policy match has not failed; and
in response to a determination that the application is not found on the exclude list, determine that the policy match has failed; and
perform an action based on the policy match based on the HIP report for the mobile device, comprising to;
in response to a determination that the HIP report matches a first HIP policy, grant access to a network;
in response to a determination that the HIP report matches a second HIP policy;
perform one or more of the following;
automatically install the one or more missing features or enable the one or more features on the mobile device in response to a determination that the policy match has failed when the HIP report indicates that the one or more features are missing or the one or more features are disabled;
or
automatically uninstall the application installed on the mobile device in response to a determination that the policy match has failed when the application is found on the list of known malware and application characteristics; and
grant access to a network, the first HIP policy being different from the second HIP policy; and
in response to a determination that the HIP report does not match the first HIP policy or the second HIP policy, refuse access to the network; and
a memory coupled to the processor and configured to provide the processor with instructions.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for network-based security for mobile devices based on device state are disclosed. In some embodiments, automatically configuring mobile devices and applying policies based on a Host Information Profile (HIP) report includes receiving a Host Information Profile (HIP) report for a mobile device; performing a policy match based on the HIP report for the mobile device; and performing an action based on the policy match based on the HIP report for the mobile device.
-
Citations
17 Claims
-
1. A system for automatically configuring mobile devices and applying policies based on a Host Information Profile (HIP) report, comprising:
-
a processor configured to; receive a list of known malware and application characteristics from an external service; receive the HIP report for a mobile device, wherein the HIP report includes applications installed on the mobile device, device state information, and device configuration information, wherein the device state information and the device configuration information both comprise one or more features; perform a policy match based on the HIP report for the mobile device, comprising to; determine whether the HIP report indicates that one or more features are missing or one or more features are disabled causing the mobile device to fail the policy match; determine whether an application installed on the mobile device is found on the list of known malware and application characteristics; and in response to a determination that the application installed on the mobile device is found on the list of known malware and application characteristics; determine whether the application is found on an exclude list, the exclude list being locally generated by an administrator; in response to a determination that the application is found on the exclude list, determine that the policy match has not failed; and in response to a determination that the application is not found on the exclude list, determine that the policy match has failed; and perform an action based on the policy match based on the HIP report for the mobile device, comprising to; in response to a determination that the HIP report matches a first HIP policy, grant access to a network; in response to a determination that the HIP report matches a second HIP policy; perform one or more of the following;
automatically install the one or more missing features or enable the one or more features on the mobile device in response to a determination that the policy match has failed when the HIP report indicates that the one or more features are missing or the one or more features are disabled;
or
automatically uninstall the application installed on the mobile device in response to a determination that the policy match has failed when the application is found on the list of known malware and application characteristics; andgrant access to a network, the first HIP policy being different from the second HIP policy; and in response to a determination that the HIP report does not match the first HIP policy or the second HIP policy, refuse access to the network; and a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for automatically configuring mobile device settings based on a Host Information Profile (HIP) report, comprising:
-
receiving a list of known malware and application characteristics from an external service; receiving the HIP report for a mobile device, wherein the HIP report includes applications installed on the mobile device, device state information, and device configuration information, wherein the device state information and the device configuration information both comprise one or more features; performing a policy match based on the HIP report for the mobile device, comprising; determining whether the HIP report indicates that one or more features are missing or one or more features are disabled causing the mobile device to fail the policy match; determining whether an application installed on the mobile device is found on the list of known malware and application characteristics; and in response to a determination that the application installed on the mobile device is found on the list of known malware and application characteristics; determining whether the application is found on an exclude list, the exclude list being locally generated by an administrator; in response to a determination that the application is found on the exclude list, determining that the policy match has not failed; and in response to a determination that the application is not found on the exclude list, determining that the policy match has failed; and performing an action based on the policy match based on the HIP report for the mobile device, comprising; in response to a determination that the HIP report matches a first HIP policy, granting access to a network; in response to a determination that the HIP report matches a second HIP policy; performing one or more of the following; automatically installing the one or more missing features or enabling the one or more features on the mobile device in response to a determination that the policy match has failed when the HIP report indicates that the one or more features are missing or the one or more features are disabled;
orautomatically uninstalling the application installed on the mobile device in response to a determination that the policy match has failed when the application is found on the list of known malware and application characteristics; and granting access to a network, the first HIP policy being different from the second HIP policy; and in response to a determination that the HIP report does not match the first HIP policy or the second HIP policy, refusing access to the network. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A computer program product for automatically configuring mobile devices based on a Host Information Profile (HIP) report, the computer program product being embodied in a tangible non-transitory computer readable storage medium and comprising computer instructions for:
-
receiving a list of known malware and application characteristics from an external service; receiving the HIP report for a mobile device, wherein the HIP report includes applications installed on the mobile device, device state information, and device configuration information, wherein the device state information and the device configuration information both comprise one or more features; performing a policy match based on the HIP report for the mobile device, comprising; determining whether the HIP report indicates that one or more features are missing or one or more features are disabled causing the mobile device to fail the policy match; determining whether an application installed on the mobile device is found on the list of known malware and application characteristics; and in response to a determination that the application installed on the mobile device is found on the list of known malware and application characteristics; determining whether the application is found on an exclude list, the exclude list being locally generated by an administrator; in response to a determination that the application is found on the exclude list, determining that the policy match has not failed; and in response to a determination that the application is not found on the exclude list, determining that the policy match has failed; and performing an action based on the policy match based on the HIP report for the mobile device, comprising; in response to a determination that the HIP report matches a first HIP policy, granting access to a network; in response to a determination that the HIP report matches a second HIP policy; performing one or more of the following; automatically installing the one or more missing features or enabling the one or more features on the mobile device in response to a determination that the policy match has failed when the HIP report indicates that the one or more features are missing or the one or more features are disabled;
orautomatically uninstalling the app installed on the mobile device in response to a determination that the policy match has failed when the application is found on the list of known malware and application characteristics; and granting access to a network, the first HIP policy being different from the second HIP policy; and in response to a determination that the HIP report does not match the first HIP policy or the second HIP policy, refusing access to the network. - View Dependent Claims (15, 16, 17)
-
Specification