A user owning a personal mobile device (e.g., smartphone, tablet, etc.) may want to install certain “workplace” mobile applications (e.g., email, calendar, etc.) relating to his work as an employee of a business on his personal mobile device rather than carry an additional mobile device for work purposes. In situations where an employer permits the user to utilize his personal mobile device to install and run a workspace application, the employer's IT department may need to impose certain security measures or policies on the user's personal device to ensure that enterprise data that is accessed from or stored on the personal mobile device is secure. For example, the approaches described in the Related Applications generally utilize an application management agent installed on the user's personal mobile device to assist in imposing security policies only around enterprise data and enterprise related applications included in a “virtual enterprise workspace.”
As described in the Related Applications, a technique of “application wrapping” can be used to “hook” into library function call tables of an already compiled application and make use of language runtime reflection techniques to inject new calls that are executed by the “wrapped” application to perform actions not otherwise compiled into the application in its original unwrapped form. Once the wrapped application has been created, the enterprise can provide the wrapped application for installation by employees on their personal mobile devices. When the wrapped application is then launched on a user's device, the “hooks” in the wrapped application execute the functionality in these new calls when the new calls get triggered during the application's execution flow. For example, one such hook may cause the wrapped application to communicate with servers at the enterprise using a VPN channel established by the application management agent rather than an unprotected channel while another hook may cause the wrapped application to “register” (e.g., via an authentication process) with the application management agent as an “enterprise approved” application upon an initial launch of the wrapped application (e.g., such registration enabling the wrapped application to access security related services provided by the application management agent to maintain the virtual enterprise workspace).
During a “lifecycle” of a launched application on a mobile device, the application may move through various stages of execution state, from its initial launch to its ultimate termination. For example, the execution state of the application may move into a “suspended” or a “background” state when a phone call is received by the mobile device (i.e., the phone call application moves to the foreground) or may be moved into an “active” or “foreground” state, for example, when the employee selects its icon from a home screen or from a list of launched applications. These changes in execution state of a wrapped application during its lifecycle may also raise security policy considerations for a virtual enterprise workspace. For example, if the employee has a wrapped enterprise approved application suspended or running in the background while he is engaged on a lengthy personal phone call, the enterprise may desire that the virtual enterprise workspace on the employee's personal device present a PIN lock screen or other authentication challenge to the employee before allowing the employee to bring the suspended or background running wrapped enterprise approved applications to the foreground after the employee completes his personal phone call. What is needed is a way to leverage the ability to inject calls into a wrapped application so that security or other enterprise considerations may be addressed at appropriate times and during different stages of an application's entire lifecycle (e.g., when an application is launched, terminated, suspended, goes into the background, goes into the foreground, etc.).
Particular embodiments provide a method to authenticate a user of an application running on a mobile operating system (OS) installed on a mobile device, wherein the mobile OS invokes callback methods of the application upon making changes to an execution state of the application. Code may be embedded into an executable version of the application prior to installation of the application on the mobile device, whereby the embedded code causes the application to communicate with a management agent installed in the mobile OS upon invocation of at least one of the callback methods of the application by the mobile OS and wherein the at least one callback method is invoked by the mobile OS when the execution state of the application is about to be changed so that the application runs in the foreground of the mobile device. Upon invocation of the at least one callback method of the application by the mobile OS, the embedded code may assess whether the user should be provided an authentication challenge prior to enabling the application to run in the foreground. If so, the mobile OS may switch execution control from the application to the management agent to enable the management agent to present the authentication challenge to the user through a user interface of the mobile device. In some embodiments, the embedded code may request the management agent to register the application as a business-approved application if the application has not been registered. Finally, the mobile OS may return execution control from the management agent back to the application wherein the application executes the at least one callback method prior to running in the foreground.
In particular embodiments, the assessment may involve determining whether a timeout value stored in the mobile device has expired. The timeout value may correspond to whether any of plurality of business-approved applications installed on the mobile device has been recently used.
Embodiments described herein enable an enterprise to provide wrapped applications that invoke custom functionality during certain stages in the applications' lifecycle (e.g., during certain points in the execution flow of the application on a mobile device) by interposing such functionality into the applications' “lifecycle” callback methods (as further described herein), for example, to enforce security policies.
In order to ensure that the execution of workspace application 170 conforms with the security policies of corporation 110 during the workspace application 170 entire lifecycle, as previously discussed, corporation 110 wraps workspace application 170 prior to providing workspace application 170 to the employee for installation on mobile device 150 in order to hook, interpose or otherwise insert custom functionality or tasks into particular callback methods that manage “state transitions” (e.g., moving the application into the background during a phone call or when the user pushes a “home” button on the mobile device, launching the application, terminating the application, moving the application into the foreground, etc.) in the lifecycle of workspace application 170. Such custom functionality would check compliance with or otherwise enforce certain corporate security policies (e.g., registration, authentication, etc.) during such state transitions.
For example, in an embodiment where mobile OS 190 is a version of iOS from Apple Inc. (“Apple”), the lifecycle of an iOS version of workspace application 170 is managed by an application delegate object (UIApplicationDelegate) instantiated within workspace application 170 whose primary function is to provide a mechanism for the creator of workspace application 170 to insert functionality or tasks that are executed upon the state transitions of the lifecycle of workspace application 170. The UIApplicationDelegate object includes a number of callback methods to handle these lifecycle state transitions (e.g., entering foreground, entering background, terminating, launching, etc.) and allow workspace application 170 to perform appropriate tasks at each state:
In addition to the tasks or functionality already written by the creator of workspace application 170 for the lifecycle callback methods that relate to the core functions of workspace application 170, in embodiments described herein, corporation 110 hooks additional tasks or functionality into these lifecycle callback methods to, for example, enforce corporate security policies or perform any other desired custom tasks desired (e.g., by hooking into the UIApplicationDelegate object in an iOS embodiment, etc.). In other embodiments, rather than utilizing hooking techniques, corporation 110 may provide certain SDKs (software development kits) and/or APIs (application program interfaces) such that the original creator of workspace application 170 may write such security-related tasks or functionalities into the lifecycle callback methods (thereby obviating a need to wrap or hook workspace application 170).
In one embodiment, corporation 110 may desire that workspace application 170 (or, alternatively, application management agent 180 when invoked by workspace application 170) present a PIN lock screen when workspace application 170 (1) is initially launched by the end user, or (2) transitions to the foreground after having been placed in the background. For an iOS embodiment, as depicted in the lifecycle flow for iOS in
In an iOS embodiment, corporation 110, as part of its application wrapping process, can insert hooking code through a technique supported by iOS known as “method swizzling” that redirects the selector for a method (e.g., the applicationDidBecomeActive callback method) to an alternate implementation (e.g., method_exchangeImplementations (Method original, Method new)). Method swizzling operates by applying introspection to access the original method implementation and then applying reflection to redirect the code to use a hooked (i.e., alternate) implementation of a method at runtime. Introspection is a feature of certain programming languages (e.g., Objective C) to provide information about objects at runtime, such as names of methods of a class, type information for instance variables of a class, and the actual implementation (code) of methods of a class. Reflection is a feature of certain programming languages (e.g., Objective C) that enables a developer to perform a number of operations at runtime, such as adding new classes, adding methods to a class, and adding instance variables to a class. By using method swizzling, corporation 110 can hook into a callback method and redirect it to a hooked implementation of the method that interposes any necessary functions before calling the original implementation of the callback method.
As depicted in
For example, when the employee launches workspace application 170 on personal device 150, mobile OS 190 may ultimately trigger a callback into workspace application's 170 callback method application:didFinishLaunchingWithOptions (execution block 210 in
Workspace application 170 similarly invokes a hooked implementation in execution block 320 (hookedApp:openURL), in lieu of mobile OS 190 invoking the application:openURL callback method as depicted in step 220. Execution block 320 (hookedApp:openURL) handles both launches and state transitions involving a URL resource in order to determine if the requested URL resource is a transition from application management agent 180—if so, the appropriate URL handler is called (hookedApp:openURL) and the previously-persisted saved options are loaded; otherwise the URL is noted as a launch option (savedOptions=url).
As further depicted in
In one embodiment, the hooking code in workspace application 170 that performs or confirms user authentication may check a “lease” or other timebound value that is stored in the memory or the file system of mobile OS 190 and only cryptographically accessible by workspace application 170 as a registered member of virtual business workspace 160. This lease or timebound value may be generally updated by application management agent 180 or workspace applications when they are, for example, running in the foreground. If the lease or timebound value indicates an expiration or timeout of a lease or time period (e.g., virtual business workspace 160 has been “inactive” for a period of time since neither application management agent 180 or any other workspace applications 170 have updated the value), the hooking code may, as previously discussed, then further request that execution flow “flip” or switch from workspace application 170 to application management agent 180 (e.g., via a URL call to application management agent 180 or any other inter-process communication, etc.) so that application management agent 180 can present a PIN lock screen or other authentication challenge to the employee before providing access to workspace application 170.
If both registration and user authentication checks succeed, then the security policies of corporation 110 have been satisfied, and based on the specific entry path or “reason” for triggering callback method 230 (“reason” indicates a launch event represented by didFinishLwO, or a move from background to the foreground represented by willEnterForeground), workspace application 170 (1) calls the original implementation of the appropriate callback method of the UIApplicationDelegate object (callback methods 210 or 260, or neither, if “reason” is null), (2) calls the original implementation of the method to access a URL (method 220) if necessary, (3) nullifies the values for “reason” and “savedOptions,” and (4) calls the original implementation of applicationDidBecomeActive, after which point workspace application 170 is running in foreground run loop 240 (in execution block 350).
Execution blocks 340 and 350 similarly depict the actions taken by the hooked implementations of certain callback methods (e.g., hookedApp:willEnterForeground, hookedApp:didEnterBackground, hookedApp:willResignActive, etc.) when the original callback methods are invoked by mobile OS 190, for example, when workspace application 170 is running in a background loop 270 or foreground loop 240, and an “event” (e.g., incoming phone call, end user interaction with the mobile device 150, etc.) such as 250 or 280 occurs as depicted in
It should be recognized that the foregoing embodiments whereby corporation 110 interposes functionality into the lifecycle of the UIApplicationDelegate object of an iOS implementation of workspace application 170 to support the security policies is merely one example of a situation in which the techniques disclosed herein may be utilized. Other situations may be envisioned in which other types of functionality may be interposed to enforce other security policies, or other callback methods or methods for other objects may be hooked in order to enforce the security policies. For example, although the foregoing embodiments generally described registration and user authentication as examples of custom functionality provided in hooked implementation of callback methods, it should be recognized that other functionality provided in other embodiment might include checking to see if a security policy or credential supplied by application management agent 180 may have timed out or may need a refresh, deciding if workspace application 170 needs to “flip” to the application management agent 180 for any another reason (e.g. workspace application 170 has been upgraded and needs to communicate the new version info to application management agent 180), performing a virus scan, allowing an application from one version of mobile OS 190 to run on another version of mobile OS 190, and the like. As such, although one or more embodiments of the present invention have been described in some detail for clarity of understanding, it will be apparent that certain changes and modifications may be made within the scope of the claims. For example, while embodiments herein have referred to certain operating systems such as Apple iOS, it should be recognized that other operating systems providing callback methods during an application's lifecycle may be utilized in alternate embodiments, such as the Android operating system, Open WebOS operating system, Java-based operating system, the Blackberry operation and the like. In addition, other operating systems that provide similar functionality may also be utilized in alternate embodiments, such as Research in Motion's Blackberry operating system (e.g., event handling using the Blackberry Platform Framework), Microsoft's Windows Phone (e.g., event handling using “tombstoning”), and the like. It should further be recognized that use of certain terminology that may be more commonly used with certain operating systems than others is merely exemplary not meant to limit the scope of the teachings herein to any particular operating system and that corresponding functions and components in other operating system platforms may benefit from the teachings herein. Accordingly, the described embodiments are to be considered as illustrative and not restrictive, and the scope of the claims is not to be limited to details given herein, but may be modified within the scope and equivalents of the claims. In the claims, elements and/or steps do not imply any particular order of operation, unless explicitly stated in the claims.
The various embodiments described herein may employ various computer-implemented operations involving data stored in computer systems. For example, these operations may require physical manipulation of physical quantities—usually, though not necessarily, these quantities may take the form of electrical or magnetic signals, where they or representations of them are capable of being stored, transferred, combined, compared, or otherwise manipulated. Further, such manipulations are often referred to in terms, such as producing, identifying, determining, or comparing. Any operations described herein that form part of one or more embodiments of the invention may be useful machine operations. In addition, one or more embodiments of the invention also relate to a device or an apparatus for performing these operations. The apparatus may be specially constructed for specific required purposes, or it may be a general purpose computer selectively activated or configured by a computer program stored in the computer. In particular, various general purpose machines may be used with computer programs written in accordance with the teachings herein, or it may be more convenient to construct a more specialized apparatus to perform the required operations.
The various embodiments described herein may be practiced with other computer system configurations including hand-held devices, microprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers, and the like.
One or more embodiments of the present invention may be implemented as one or more computer programs or as one or more computer program modules embodied in one or more computer readable media. The term computer readable medium refers to any data storage device that can store data which can thereafter be input to a computer system—computer readable media may be based on any existing or subsequently developed technology for embodying computer programs in a manner that enables them to be read by a computer. Examples of a computer-readable medium include a hard drive, network attached storage (NAS), read-only memory, random-access memory (e.g., a flash memory device), a CD (Compact Disc)—CD-ROM, a CDR, or a CD-RW, a DVD (Digital Versatile Disc), a magnetic tape, and other optical and non-optical data storage devices. The computer readable medium can also be distributed over a network coupled computer system so that the computer readable code is stored and executed in a distributed fashion.
Herein, a computer-readable non-transitory storage medium or media may include one or more semiconductor-based or other integrated circuits (ICs) (such, as for example, field-programmable gate arrays (FPGAs) or application-specific ICs (ASICs)), hard disk drives (HDDs), hybrid hard drives (HHDs), optical discs, optical disc drives (ODDs), magneto-optical discs, magneto-optical drives, floppy diskettes, floppy disk drives (FDDs), magnetic tapes, solid-state drives (SSDs), RAM-drives, SECURE DIGITAL cards or drives, any other suitable computer-readable non-transitory storage media, or any suitable combination of two or more of these, where appropriate. A computer-readable non-transitory storage medium may be volatile, non-volatile, or a combination of volatile and non-volatile, where appropriate.
Herein, “or” is inclusive and not exclusive, unless expressly indicated otherwise or indicated otherwise by context. Therefore, herein, “A or B” means “A, B, or both,” unless expressly indicated otherwise or indicated otherwise by context. Moreover, “and” is both joint and several, unless expressly indicated otherwise or indicated otherwise by context. Therefore, herein, “A and B” means “A and B, jointly or severally,” unless expressly indicated otherwise or indicated otherwise by context.
The scope of this disclosure encompasses all changes, substitutions, variations, alterations, and modifications to the example embodiments described or illustrated herein that a person having ordinary skill in the art would comprehend. The scope of this disclosure is not limited to the example embodiments described or illustrated herein. Moreover, although this disclosure describes and illustrates respective embodiments herein as including particular components, elements, functions, operations, or steps, any of these embodiments may include any combination or permutation of any of the components, elements, functions, operations, or steps described or illustrated anywhere herein that a person having ordinary skill in the art would comprehend. Furthermore, reference in the appended claims to an apparatus or system or a component of an apparatus or system being adapted to, arranged to, capable of, configured to, enabled to, operable to, or operative to perform a particular function encompasses that apparatus, system, component, whether or not it or that particular function is activated, turned on, or unlocked, as long as that apparatus, system, or component is so adapted, arranged, capable, configured, enabled, operable, or operative.
The present application claims priority to U.S. Provisional Patent Application No. 61/692,857, filed on Aug. 24, 2012 and entitled “Secure Inter-Process Communication and Virtual Workspaces on Mobile Device Operating Systems,” the entire contents of which are hereby incorporated by reference. The present application is also related to U.S. patent application Ser. No. 13/595,881, filed 27 Aug. 2012 and entitled “Method and System for Facilitating Isolated Workspace for Applications,” U.S. patent application Ser. No. 13/756,347, filed 31 Jan. 2013 and entitled “Method and System for Facilitating Replacement of System Calls,” and U.S. patent application Ser. No. 13/775,047, filed 22 Feb. 2013 and entitled “Method and System for Identifying and Replacing System Calls,” the entire contents of each of the foregoing which are hereby incorporated by reference and are generally referred to, including U.S. Provisional Patent Application No. 61/692,857, herein as the “Related Applications.”.
Number | Name | Date | Kind |
---|---|---|---|
6026235 | Shaughnessy | Feb 2000 | A |
6212632 | Surine et al. | Apr 2001 | B1 |
6405316 | Krishnan et al. | Jun 2002 | B1 |
6463583 | Hammond | Oct 2002 | B1 |
6529985 | Deianov et al. | Mar 2003 | B1 |
6735774 | Krishnaswamy | May 2004 | B1 |
6959441 | Moore | Oct 2005 | B2 |
7111323 | Bhatia | Sep 2006 | B1 |
7280530 | Chang | Oct 2007 | B2 |
7296274 | Cohen et al. | Nov 2007 | B2 |
7552446 | Sosnovsky | Jun 2009 | B1 |
7565665 | Forin et al. | Jul 2009 | B2 |
7792546 | Toy | Sep 2010 | B2 |
7992156 | Wang | Aug 2011 | B1 |
8233882 | Rogel | Jul 2012 | B2 |
8595255 | Krishnaprasad | Nov 2013 | B2 |
8707451 | Ture | Apr 2014 | B2 |
8769643 | Ben Ayed | Jul 2014 | B1 |
8819800 | Gao | Aug 2014 | B2 |
20040006637 | Kuacharoen et al. | Jan 2004 | A1 |
20050108721 | Oshima et al. | May 2005 | A1 |
20050108733 | Bermudez et al. | May 2005 | A1 |
20050246705 | Etelson et al. | Nov 2005 | A1 |
20060161973 | Royer et al. | Jul 2006 | A1 |
20080034071 | Wilkinson et al. | Feb 2008 | A1 |
20080134347 | Goyal et al. | Jun 2008 | A1 |
20080250400 | Vertes | Oct 2008 | A1 |
20080282266 | Kabanov | Nov 2008 | A1 |
20090164994 | Vasilevsky et al. | Jun 2009 | A1 |
20090227274 | Adler et al. | Sep 2009 | A1 |
20090240947 | Goyal et al. | Sep 2009 | A1 |
20090249335 | Vasilevsky et al. | Oct 2009 | A1 |
20100299719 | Burks et al. | Nov 2010 | A1 |
20100306547 | Fallows et al. | Dec 2010 | A1 |
20100333088 | Rogel et al. | Dec 2010 | A1 |
20110030047 | Gao | Feb 2011 | A1 |
20110219234 | Bogner | Sep 2011 | A1 |
20110252240 | Freedman et al. | Oct 2011 | A1 |
20110276987 | Pope et al. | Nov 2011 | A1 |
20120036552 | Dare | Feb 2012 | A1 |
20120149338 | Roundtree | Jun 2012 | A1 |
20120204126 | Yoshimura | Aug 2012 | A1 |
20130007848 | Chaskar | Jan 2013 | A1 |
20130091543 | Wade et al. | Apr 2013 | A1 |
20130160072 | Reus et al. | Jun 2013 | A1 |
20130167250 | Balasubramanian | Jun 2013 | A1 |
20130239197 | Kato et al. | Sep 2013 | A1 |
20140007048 | Qureshi et al. | Jan 2014 | A1 |
20140007183 | Qureshi et al. | Jan 2014 | A1 |
20140007205 | Oikonomou | Jan 2014 | A1 |
20140032491 | Neerincx et al. | Jan 2014 | A1 |
20140059525 | Jawa et al. | Feb 2014 | A1 |
20140059573 | Jawa et al. | Feb 2014 | A1 |
20140059642 | Deasy et al. | Feb 2014 | A1 |
20140059703 | Hung et al. | Feb 2014 | A1 |
20140289511 | Tuch et al. | Sep 2014 | A1 |
Entry |
---|
Stephen Deasy et al., “Method and System for Facilitating Isolated Workspace for Applications”, U.S. Appl. No. 13/595,881, filed Aug. 27, 2012. |
Manish Jawa et al., “Method and System for Facilitating Replacement of System Calls”, U.S. Appl. No. 13/756,347, filed Jan. 31, 2013. |
Manish Jawa et al., “Method and System for Identifying and Replacing System Calls”, U.S. Appl. No. 13/775,047, filed Feb. 22, 2013. |
Riley et al. “Multi-Aspect Profiling of Kernal Rootkit Behavior” ACM,2009, 14 pages. |
Sysmagazine, “Redirection of Functions in Mach-O libraries”, Sysmagazine, 28 pages Apr. 2011. |
Lozzo, Vincent, “Let Your Mach-O Fly”, black Hat Briefings, Feb. 2009, 42 pages https;//www.blachhat.com/presentations/bh-dc-09/lozzo-Macho-on the fil.pdf. |
Mach Developer Library—Mach-O Programming Topics, /developertools/conceptual/machotopics/1-articles/indirect—addressubg,html, February A17. |
Apple Inc., “OS X ABI Mach-O File Format Reference”, 2009, 42 Pages. |
David Schuetz, “The IOS MDM Protocol,”Intrepidus Group, Inc.; Aug. 3, 2011, 29 pgs. |
“Over-the-Air Profile Delivery Concepts,” http://developer.apple.com/library/ios#documentation/networkinginternet/conceptual/iphonetoaconfiguration/OTASecurity/OTASecurity.html; Feb. 12, 2013, 6 pgs. |
“Developer Forums: Retrieving Certificate from Keychain,” p. 2, https://devforums.apple.com/thread/3336?start=25&start=0; Mar. 20, 2013, 5 pgs. |
“Developer Forums: Retrieving Certificate from Keychain,” p. 1, https://devforums.apple.com/message/11142#11142; Mar. 20, 2013, 13 pgs. |
“Verify/Check to see if a Configuration Profile has been installed on iPhone,” Careers 2.0 by stackoverflow, http://stackoverflow.com/questions/2195673/verify-check-to-see-if-a-configuration-profile-has-been-installed-on-iphone; Mar. 20, 2013, 2 pgs. |
International Search Report and Written Opinion dated Dec. 2, 2013, Application No. PCT/US2013/056675, international filing date of Aug. 26, 2013, 8 pgs. |
Number | Date | Country | |
---|---|---|---|
20140059703 A1 | Feb 2014 | US |
Number | Date | Country | |
---|---|---|---|
61692857 | Aug 2012 | US |