SYSTEMS AND METHODS FOR MOBILE APPLICATION SECURITY CLASSIFICATION AND ENFORCEMENT
First Claim
1. A method, comprising:
- configuring a mobile device such that the mobile device communicates data to an external network via a cloud-based security system;
receiving data from the mobile device;
enforcing policy on the data from the mobile device; and
based on the policy, forwarding the data to the external network.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure provides systems and methods for mobile application security classification and enforcement. In particular, the present invention includes a method, a mobile device, and a distributed security system (e.g., a “cloud”) that is utilized to enforce security on mobile devices communicatively coupled to external networks (i.e., the Internet). Advantageously, the present invention is platform independent allowing it to operate with any current or emerging mobile device. Specifically, preventing malicious applications from running on an end user'"'"'s mobile device is challenging with potentially millions of applications and billions of user devices; the only effective way to enforce application security is through the network that applications use to communicate.
304 Citations
20 Claims
-
1. A method, comprising:
-
configuring a mobile device such that the mobile device communicates data to an external network via a cloud-based security system; receiving data from the mobile device; enforcing policy on the data from the mobile device; and based on the policy, forwarding the data to the external network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A network security system, comprising:
-
a processing node communicatively coupled to a mobile device and to an external network, wherein the processing node comprises a data store storing security policy data for the mobile device, data inspection engines configured to perform threat detection classification on content to the mobile device from the external network, and a manager communicatively coupled to the data store and the data inspection engines; wherein the processing node is configured to enforce policy between the mobile device and the external network and inspect content from the external network to the mobile device. - View Dependent Claims (16, 17, 18)
-
-
19. A mobile device, comprising:
-
a data store; a network interface communicatively coupled to a network; a processor, wherein the data store, the network interface, and the processor are communicatively coupled there between and configured to; transmit data to a cloud-based security system configured to enforce policy on the data from the mobile device; and receive data from the cloud-based security system configured to inspect content on the data to the mobile device for malicious content. - View Dependent Claims (20)
-
Specification