Enabling user entropy encryption in non-compliant mobile applications

    公开(公告)号:US10367814B2

    公开(公告)日:2019-07-30

    申请号:US14735318

    申请日:2015-06-10

    Inventor: James Walker

    Abstract: Methods and systems for preventing unsecured mobile applications from accessing encrypted resources are presented. In some embodiments, a mobile device may determine that a background process associated with a mobile application is requesting to access an encrypted resource. The mobile device may further determine whether the mobile application has been secured with authentication information. In response to determining that the mobile application has not been secured, the mobile device may suspend the background process until the mobile application has been secured and transmit a request to a mobile application management agent to secure the mobile application using authentication information.

    WRAPPING AN APPLICATION WITH FIELD-PROGRAMMABLE BUSINESS LOGIC
    4.
    发明申请
    WRAPPING AN APPLICATION WITH FIELD-PROGRAMMABLE BUSINESS LOGIC 有权
    用现场可编程业务逻辑封装应用程序

    公开(公告)号:US20160283198A1

    公开(公告)日:2016-09-29

    申请号:US14671351

    申请日:2015-03-27

    Inventor: James Walker

    CPC classification number: G06F8/30 G06F8/65 G06F9/44505 G06F9/44521 G06Q10/10

    Abstract: Systems, methods, and computer-readable media for wrapping an application with field-programmable business logic are presented. In some embodiments, a computing device may load application code of a mobile application. Subsequently, the computing device may modify the application code to wrap the application with an application wrapper that is configured to manage execution of the application based on one or more policy files and configured to intercept one or more functions of the application code, where the one or more policy files each define one or more access controls that are enforced by a device management system on one or more user devices. Subsequently, the computing device may create a library file comprising field-programmable business logic defining implementation code linked to one or more of the functions intercepted by the wrapper. The computing device may then provide the wrapped application and the library file to at least one user device.

    Abstract translation: 介绍了使用现场可编程业务逻辑封装应用程序的系统,方法和计算机可读介质。 在一些实施例中,计算设备可以加载移动应用的应用代码。 随后,计算设备可以修改应用代码以用应用程序包装器来包装应用程序,应用程序包装器被配置为基于一个或多个策略文件来管理应用程序的执行,并被配置为拦截应用程序代码的一个或多个功能, 或更多策略文件各自定义由一个或多个用户设备上的设备管理系统实施的一个或多个访问控制。 随后,计算设备可以创建包括现场可编程业务逻辑的库文件,其定义与由包装器截取的一个或多个功能链接的实现代码。 然后,计算设备可以将包裹的应用和库文件提供给至少一个用户设备。

    Wrapping unmanaged applications on a mobile device

    公开(公告)号:US10545748B2

    公开(公告)日:2020-01-28

    申请号:US15957642

    申请日:2018-04-19

    Abstract: Methods and systems are disclosed for providing approaches to generating managed applications from unmanaged applications on a mobile device. The methods and systems may include storing, by a mobile device in a memory of the mobile device, one or more unmanaged applications each comprising a corresponding application bundle and decoding, by the mobile device, the retrieved application bundle corresponding to the first unmanaged application. The methods and systems may also include modifying, by the mobile device, the decoded application bundle corresponding to the first unmanaged application by adding a set of one or more policy-based control instructions, compiling, by the mobile device, the modified application bundle to generate a first managed application, the first managed application being configured to operate in accordance with the set of one or more policy-based control instructions, and providing, by the mobile device, the first managed application.

    Wrapping an application with field-programmable business logic

    公开(公告)号:US09606774B2

    公开(公告)日:2017-03-28

    申请号:US14671351

    申请日:2015-03-27

    Inventor: James Walker

    CPC classification number: G06F8/30 G06F8/65 G06F9/44505 G06F9/44521 G06Q10/10

    Abstract: Systems, methods, and computer-readable media for wrapping an application with field-programmable business logic are presented. In some embodiments, a computing device may load application code of a mobile application. Subsequently, the computing device may modify the application code to wrap the application with an application wrapper that is configured to manage execution of the application based on one or more policy files and configured to intercept one or more functions of the application code, where the one or more policy files each define one or more access controls that are enforced by a device management system on one or more user devices. Subsequently, the computing device may create a library file comprising field-programmable business logic defining implementation code linked to one or more of the functions intercepted by the wrapper. The computing device may then provide the wrapped application and the library file to at least one user device.

    WRAPPING UNMANAGED APPLICATIONS ON A MOBILE DEVICE
    9.
    发明申请
    WRAPPING UNMANAGED APPLICATIONS ON A MOBILE DEVICE 有权
    包装移动设备上的无缝应用

    公开(公告)号:US20160378451A1

    公开(公告)日:2016-12-29

    申请号:US14752132

    申请日:2015-06-26

    Inventor: James Walker

    Abstract: Methods and systems are disclosed for providing approaches to generating managed applications from unmanaged applications on a mobile device. The methods and systems may include storing, by a mobile device in a memory of the mobile device, one or more unmanaged applications each comprising a corresponding application bundle and decoding, by the mobile device, the retrieved application bundle corresponding to the first unmanaged application. The methods and systems may also include modifying, by the mobile device, the decoded application bundle corresponding to the first unmanaged application by adding a set of one or more policy-based control instructions, compiling, by the mobile device, the modified application bundle to generate a first managed application, the first managed application being configured to operate in accordance with the set of one or more policy-based control instructions, and providing, by the mobile device, the first managed application.

    Abstract translation: 公开了用于提供从移动设备上的非管理应用产生被管理应用的方法的方法和系统。 方法和系统可以包括通过移动设备在移动设备的存储器中存储一个或多个非管理应用,每个应用包括相应的应用束,并且由移动设备解码与第一非管理应用相对应的检索到的应用束。 所述方法和系统还可以包括:通过添加一组一个或多个基于策略的控制指令,由移动设备修改对应于第一非管理应用的解码的应用包,由移动设备将修改的应用包编译成 生成第一被管理应用,所述第一被管理应用被配置为根据所述一组或多个基于策略的控制指令进行操作,并且由所述移动设备提供所述第一被管理应用。

    Enabling User Entropy Encryption in Non-Compliant Mobile Applications
    10.
    发明申请
    Enabling User Entropy Encryption in Non-Compliant Mobile Applications 审中-公开
    在非合规移动应用程序中启用用户熵加密

    公开(公告)号:US20150373023A1

    公开(公告)日:2015-12-24

    申请号:US14735318

    申请日:2015-06-10

    Inventor: James Walker

    Abstract: Methods and systems for preventing unsecured mobile applications from accessing encrypted resources are presented. In some embodiments, a mobile device may determine that a background process associated with a mobile application is requesting to access an encrypted resource. The mobile device may further determine whether the mobile application has been secured with authentication information. In response to determining that the mobile application has not been secured, the mobile device may suspend the background process until the mobile application has been secured and transmit a request to a mobile application management agent to secure the mobile application using authentication information.

    Abstract translation: 提出了防止不安全移动应用访问加密资源的方法和系统。 在一些实施例中,移动设备可以确定与移动应用相关联的后台进程正在请求访问加密的资源。 移动设备还可以确定移动应用是否已经被认证信息保护。 响应于确定移动应用尚未被保护,移动设备可以暂停后台进程直到移动应用已被保护,并且向移动应用管理代理发送请求以使用认证信息来保护移动应用。

Patent Agency Ranking