×

Client application based access control in cloud security systems for mobile devices

  • US 10,728,252 B2
  • Filed: 07/07/2018
  • Issued: 07/28/2020
  • Est. Priority Date: 01/29/2016
  • Status: Active Grant
First Claim
Patent Images

1. A cloud-based security system for controlling access to network resources, the cloud-based security system comprising:

  • a plurality of processing nodes communicatively coupled to the Internet and an enterprise network; and

    one or more authority nodes communicatively coupled to the plurality of processing nodes, the one or more authority nodes configured to store policy data regarding security policies of the enterprise network, the one or more authority nodes further configured to distribute the policy data to each of the plurality of processing nodes;

    wherein a first processing node of the plurality of processing nodes is communicatively coupled to a user device and is configured to control communication between the user device and the enterprise network,wherein the first processing node is configured to authenticate the user and provide the user device of the authenticated user access to the enterprise network;

    wherein the first processing node is further configured to receive an access request performed by an application on the user device of the authenticated user for accessing a selection of network resources on the enterprise network,wherein the first processing node is further configured to evaluate the access request to identify the application that performed the access request, the application residing on the user device of the authenticated user,wherein the first processing node is further configured to control access to the network resources on the enterprise network based on the policy data identifying access permissions of applications for accessing the network resources, an access permission of the application that performed the access request, and the selection of network resources requested, andwherein the access permission of the application is to a subset of the network resources and the first processing node is configured to control the access by;

    in response to the subset of the network resources including the selection of network resources, allowing the access request,in response to the subset of network resources not including the selection of network resources and the application is legitimate, redirecting the access request to an authorized application on the user device, andin response to the subset of network resources not including the selection of network resources and the application is not legitimate, denying the request thereby blocking the access request for accessing the selection of network resources.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×