Validating the Identity of a Mobile Application for Mobile Application Management

Active Publication Date: 2014-10-02
CITRIX SYST INC
View PDF4 Cites 136 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0009]To overcome limitations in the prior art described above, and to overcome other limitations that will be apparent upon reading and understanding the present specification, aspects described herein are directed towards controlling access to remote computing resources located at an enterprise computing system using managed mobile applications at mobile computing devices. In addition, aspects of the present disclosure are directed towards controlling access to local computing resources at the mobile computing devices themselves. An access manager may perform a validation proc

Problems solved by technology

If the access manager does not successfully validate the mobile application, the ac

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Validating the Identity of a Mobile Application for Mobile Application Management
  • Validating the Identity of a Mobile Application for Mobile Application Management
  • Validating the Identity of a Mobile Application for Mobile Application Management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031]In the following description of the various embodiments, reference is made to the accompanying drawings identified above and which form a part hereof, and in which is shown by way of illustration various embodiments in which aspects described herein may be practiced. It is to be understood that other embodiments may be utilized and structural and functional modifications may be made without departing from the scope described herein. Various aspects are capable of other embodiments and of being practiced or being carried out in various different ways.

[0032]As a general introduction to the subject matter described in more detail below, aspects described herein are directed towards controlling remote and local access to computing resources at a remotely located enterprise computing system or at mobile computing devices themselves. An access manager may perform a validation process that determines whether a mobile application requesting access to computing resources has accurately...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method of managing access to enterprise resources is provided. An access manager may operate at a mobile device to validate a mobile application installed at that mobile device. If the access manager does not successfully validate the mobile application, the access manager may prevent the mobile application from accessing computing resource. If the access manager does successfully validate the mobile application, then the access manager may identify the mobile application as a trusted mobile application. The access manager may thus permit the trusted mobile application to access the computing resource.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is related to U.S. Provisional Application Ser. No. 61 / 806,557, filed Mar. 29, 2013, and entitled “Systems and Methods for Enterprise Mobility Management,” which is herein incorporated by reference in its entirety.TECHNICAL FIELD[0002]Aspects described herein generally relate to management of mobile applications at mobile computing devices. More specifically, various aspects provide approaches to validating a mobile application operating at an unmanaged device and controlling execution of that mobile application.BACKGROUND[0003]The use of mobile computing devices continues to grow. In particular, business and other enterprises have come to rely on mobile computing devices to allow individuals to remotely access various computing resources. Such resources may include, for example, electronic mail services, file services, data, and other electronic resources provided by the computer systems of an enterprise or the mobile de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/10H04W12/06H04W12/08G06F21/33G06F21/51G06F21/53G06F2221/033G06F2221/2103G06F2221/2115G06F21/44H04W12/37H04L63/126H04L9/0643H04L9/3213H04L63/102
Inventor BARTON, GARYLANG, ZHONGMINWALKER, JAMES ROBERT
Owner CITRIX SYST INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products