The present application relates generally to mobile computing devices (smartphones, tablets, PDAs, etc.) and associated application programs, and to systems for automated or semi-automated management of devices used for accessing managed resources of an enterprise.
Many enterprises (e.g., corporations, partnerships, academic institutions, etc.) maintain enterprise computer networks that allow enterprise users to access enterprise resources, such as hardware and software applications for email, customer relationship management (CRM), document management, enterprise resource planning (ERP), and the like. Also, many enterprises allow users to access the enterprise network via mobile devices, such as smartphones, tablet computers, and the like. In some cases, software applications running on the mobile devices exchange data with the enterprise network, some of which can become saved on the memory hardware (e.g., hard drives, SD cards) of the mobile devices.
A growing trend among businesses is to allow employees to use their personally owned mobile devices both to access company resources and the use and access their personal applications and data. This trend, known as BYOD (bring your own device) or BYOT (bring your own technology), significantly complicates the task of protecting enterprise resources, including confidential and/or sensitive information.
Reference numerals used in this specification are generally based on the first figure (in the above listing) in which the numeral appears. A reference numeral with a value between 100-199 first appears in
Skilled artisans will appreciate that while certain figures of the present disclosure illustrate numerous items, these figures illustrate certain embodiments, and other embodiments may involve more or less than the items shown.
Various inventions and inventive features will now be described with reference to the drawings. As will be recognized, many of the disclosed features and associated components can be used independently of others, and can be implemented differently than described herein. Thus, nothing in this detailed description (or in the preceding background section) is intended to imply that any particular feature, component or characteristic of the disclosed systems is essential. Moreover, it will be understood that headings are provided for convenience and do not necessarily affect the scope or meaning of the claims.
Introduction
The architecture described in this specification can be used by a corporation or other enterprise to flexibly implement a policy, such as a corporate owned device, BYOD (bring your own device) policy, for allowing enterprise users to use their mobile devices to securely access enterprise resources (documents, confidential data, corporate application and database servers, etc.). This is accomplished through various security features that, for example, enable the enterprise to specify and implement policies for controlling mobile device accesses to particular enterprise resources. The policies may, for example, control mobile device accesses to enterprise resources based on a variety of criteria, such as the role of the respective user (e.g., which department the user is in), the configuration of the mobile device (e.g., whether any blacklisted mobile applications are installed), the logged behaviors of the user, the location of the mobile device, and/or the time at which access to the enterprise resource is requested. The architecture further enhances security, in some embodiments, by creating application tunnels that enable enterprise mobile applications to securely communicate over a network with the enterprise system. The architecture may also enable IT staff to selectively (and remotely) wipe a user's mobile device of enterprise application(s) and corporate data when, for example, the user discontinues employment or violates a corporate policy (such as if they jailbreak their device or otherwise use it in a disallowed configuration).
As described in the section titled “Protecting Attachment Data,” the disclosed architecture may also implement an attachment encryption policy in which encryption is applied to email attachments (or attachments to other types of messages, such as SMS messages) that are sent to mobile devices of enterprise users. This feature reduces the likelihood that an unauthorized user who obtains access to an enterprise member's mobile device will be able to access sensitive enterprise documents that have been sent between enterprise users as attachments.
The disclosed architecture, in some embodiments, advantageously enables end users to concurrently run both enterprise mobile applications (those configured or authorized to access enterprise resources) and personal (non-enterprise) mobile applications on the same mobile device, without compromising security. This may be accomplished in part through mobile device software that creates a secure environment or shell in which the enterprise mobile applications can run and store data. This secure environment or shell may, for example, prevent the personal applications installed on a mobile device from accessing the documents and other data stored on the mobile device by the enterprise applications. In some embodiments, a secure launcher that runs on the mobile devices augments the mobile operating system's UI with a UI for launching the enterprise mobile applications installed on the mobile device. When a user launches an enterprise mobile application, the user may, for example, be presented with an authentication screen for entering a personal passcode that is necessary for running the enterprise mobile applications.
The use of passcodes (or other types of authentication information) for enterprise applications reduces the likelihood that enterprise resources will be improperly accessed when, for example, the mobile device is lost or stolen, or when the mobile device is used by an employee's children to play games. In some embodiments, the secure launcher (or another component installed on the mobile device) further reduces this risk by performing a selective wipe of the mobile device when, for example, the user attempts but fails to enter a valid passcode a threshold number of consecutive times (e.g., 5 or 10). The selective wipe operation deletes some or all of the enterprise applications and associated data from the mobile device, without deleting any personal applications or data. In some embodiments, the enterprise's IT department can initiate a selective wipe of a particular mobile device by remotely issuing a wipe command to the device.
The architecture may also support various other types of remedial actions for protecting enterprise resources. One such remedy is to lock the mobile device, or an enterprise container on the device that stores enterprise data, such that the mobile device or container can only be unlocked with a valid code provided by IT staff. In some embodiments, these and other types of remedies can be invoked automatically based on conditions detected on the mobile device, or can be remotely initiated by IT staff.
This specification also discloses processes for creating or augmenting mobile applications to enable them to use various enterprise security features. One such approach is described below under the heading “Modifying Behaviors of Pre-Existing Mobile Applications.” Using this approach, an organization can modify existing mobile applications to add various security features without the need to access the source code of such applications. The mobile application being modified may, for example, be a custom enterprise application, or may be a commercially available mobile application that is being configured for use within the enterprise. Through this process, the preexisting mobile application may, for example, be configured to (a) use application tunnels to communicate with the enterprise system, (b) use an encryption library to encrypt the documents and other data it stores on the mobile device, (c) present users with a login or passcode screen when the mobile application is launched, (d) disable cut, copy and paste operations, (e) disable offline access, (f) use a particular type of user authentication method, such as posture based authentication, or any combination thereof. The ability to modify preexisting mobile applications through this process gives enterprises greater flexibility in selecting mobile applications to offer to their members; for example, rather than requiring employees to use a custom-developed enterprise application for accessing cloud-based storage, the enterprise can modify (or have modified) a popular, commercially-available mobile application with which users are already familiar. Further, different versions of a given application (with different authentication methods, encryption levels, etc.) can be created for different types of employees.
Also disclosed are processes for effectively adding enterprise security features to mobile applications with little or no need to modify the application code of such applications. One such approach involves the use of a secure virtual machine that is separate from the virtual machine of the mobile device's operating system. The secure virtual machine implements or provides access to various enterprise security features (such as application tunnels, data encryption, passcode prompts, etc.), and these security features are effectively inherited by or imposed upon the mobile applications that run within the secure virtual machine. Enterprise mobile applications may be configured or forced to use the secure virtual machine, while non-enterprise mobile applications continue to run within the native virtual machine of the mobile operating system. This capability gives enterprises additional freedom to flexibly select mobile applications to use as enterprise applications; for example, through this approach, an enterprise can effectively configure the mobile devices of users to enable the users to use a popular/familiar mobile application to securely access enterprise resources.
The use of a secure virtual machine can enable an enterprise to provide a higher level of security for running an enterprise application on BYOD devices. For example, by running the application within a secure execution environment created by the secure virtual machine, a corporation can enforce a separate set of policies for the application, including networking and storage policies.
Another approach, which is described under the heading “Secure Web Browser,” involves the use of a mobile browser application that implements the various enterprise security features. Like the secure virtual machine approach, mobile applications (or web pages accessed by the browser) that are configured to run within the secure browser effectively inherit the security mechanisms implemented by the secure browser. The use of such a secure browser also enables an enterprise to implement a content filtering policy in which, for example, employees are blocked from accessing certain web sites from their mobile devices. The secure browser can be used, for example, to enable mobile device users to access a corporate intranet without the need for a virtual private network (VPN).
The disclosed architecture can also include a meta-application or system that monitors the overall enterprise system, including the mobile devices of enterprise users. The meta-application can operate generally as described in Qureshi '526, and can be implemented as a cloud based meta-application. The data collected by the meta-application can include data collected and reported by enterprise agents running on the mobile devices. In some embodiments, the meta-application generates rules based on observed behaviors, including behaviors of mobile device users. These rules can include gateway rules that are used by a secure mobile gateway to grant and deny mobile device requests to access enterprise resources.
These and other security features and components are described in detail in the following sections. As will be recognized, many of the disclosed features and components can be used independently of others. Thus, nothing in the following description should be taken to imply that certain security features and components must be used in combination.
System Overview and Terminology
In many cases, when a mobile computing device accesses an enterprise computer/IT system, sensitive data associated with the enterprise and/or enterprise-related software applications can become stored onto the mobile device. Enterprise-related data can comprise any data associated with the enterprise, such as, without limitation, product information, sales data, customer lists, business performance data, proprietary know-how, inventions, trade secrets, and the like. Since this information can be very sensitive, an enterprise may wish to safeguard such information.
Further, enterprises may wish to regulate how users use their mobile devices. For example, enterprises may want some control over where the mobile devices are used, which mobile device features can be used, which software applications can be installed and/or run on the devices, and the like. Enterprises also have a need to control and implement remedial actions for users that violate their mobile device usage policies.
When users in the field experience problems with their mobile devices or could benefit from information, data, software, or coaching on how to perform certain operations using the devices, it can be difficult for the enterprise's IT support to provide highly effective assistance. Accordingly, there is also a need for improved secure management and technical support of mobile devices associated with an enterprise.
Embodiments described in the present application address these and other concerns. The present application discloses computer systems and methods for automated or semi-automated management of mobile computing devices that access an enterprise computer network, such as access to computer-implemented resources of the enterprise. As used herein, an “enterprise” may comprise substantially any type of organization, including, without limitation, a business, partnership, corporation, and the like. A “mobile computing device” can comprise any of a wide variety of devices, such as, without limitation, a mobile phone, smartphone, personal digital assistant, tablet computer, handheld computing device, and the like. The mobile devices managed by the disclosed system may, for example, include or consist of mobile devices that run the Android™, IOS, or Windows Mobile operating system (or some subset thereof). As will be recognized, however, the architecture disclosed herein may be used with other mobile device operating systems, including operating systems that may be developed in the future.
Individuals, entities, or groups of users that use mobile computing devices to access the enterprise computer network are referred to herein as “users.” Users can comprise members of the enterprise, such as employees, partners, officers, etc. Alternatively, users can comprise individuals or entities that are not members of the enterprise, but nevertheless have a need or reason to access the enterprise computer network. For example, users can be enterprise customers, suppliers, etc.
An “enterprise resource” may comprise a machine-accessible resource associated with the enterprise. Enterprise resources can comprise any of a wide variety of different types of resources, including resources that assist or enable users in the performance of the users' roles or duties associated with the enterprise. For example, enterprise resources can comprise raw data stored on non-transitory computer-readable storage, documents stored on non-transitory computer-readable storage, computer hardware (e.g., physical servers), software applications stored on non-transitory computer-readable storage, macros for software applications (e.g., word processor macros) stored on non-transitory computer-readable storage, electronic mail systems, workspaces, customer relationship management (CRM) systems, document management systems, enterprise resource planning (ERP) systems, accounting systems, inventory systems, engineering tools, forms, style sheets, and many other resources. Enterprise resources can be configured to be accessed and used by software applications installed and running on mobile computing devices.
The enterprise system 110 preferably includes an external firewall 122 and an internal firewall 124. Each firewall 122, 124 can comprise a device or set of devices designed to permit or deny network transmissions based upon certain criteria. The firewalls 122 and 124 can comprise software stored on non-transitory computer-readable storage, hardware, firmware, or a combination thereof. The firewalls 122 and 124 can be configured to perform basic routing functions. Embodiments of the invention can cooperate with one or both of the firewalls 122 and 124 or other devices of the enterprise system 110 to filter mobile devices' access requests based on a set of gateway rules, in order to protect the enterprise system 110 from unauthorized access while permitting legitimate communications to pass. As will be described in further detail below, such access rules can be used to regulate access based on, e.g., mobile device properties, user properties, the specific enterprise resources 130 for which access is requested, or any combination thereof.
The physical or logical subnetwork between the two illustrated firewalls 122 and 124 can be referred to as the “demilitarized zone” (DMZ), or alternatively as a “perimeter network.” Typically, the DMZ contains and exposes the enterprise's external services to a larger untrusted network, usually the Internet. Ordinarily, the purpose of the DMZ is to add an additional layer of security to the enterprise's local area network (LAN); an external attacker only has access to equipment in the DMZ, rather than any other part of the enterprise network.
The illustrated enterprise system 110 includes a mobile device management system 126, a secure mobile gateway 128, and a “meta-application” 150, each of which is described in further detail below. The enterprise system 110 also includes enterprise resources 130 logically positioned behind the internal firewall 124, illustrated as resources 1 to N. At least some of the enterprise resources 130 can be configured to be accessed and/or used by the mobile devices 120, such as by software applications installed and running on the mobile devices.
Referring still to
In some embodiments, a software application on a mobile device 120 can communicate with an enterprise resource 130 through an application tunnel via connections 142, 144, and 152. Application tunnels are described in further detail below. In the illustrated embodiment, the mobile device management system 126 acts as a “tunneling mediator” within an application tunnel between the mobile device 120 (and typically a specific application running on the mobile device) and the enterprise resource 130.
It will be understood that any of the enterprise systems 110 can be implemented with any of the principles and advantages described herein, as appropriate. Moreover, it will also be understood that the enterprise systems illustrated in
In the illustrated embodiment, the mobile device 120 includes an enterprise agent 320, which is preferably a software application or other executable program installed on the mobile device. The enterprise agent 320 is preferably separate from the operating system of the mobile device 120. In some embodiments, however, the enterprise agent 320 can be a component of the operating system of the mobile device or partially/fully embedded into the operating system of the mobile device 120. In various embodiments described in greater detail below, the enterprise agent 320 executes the mobile device rules 214 and cooperates with the enterprise system 110 to regulate the mobile device's access to the enterprise system 110, including to the enterprise resources 130. In some embodiments, an enterprise system 110 can prompt an enterprise agent 320 to connect to the system 110 (e.g., the mobile device management system 126) by sending a text message (e.g., SMS) to the mobile device 120, with a connection command.
The enterprise agent 320 can be installed onto the mobile device 120 as a condition of the mobile device's enrollment with the mobile device management system 126. The enterprise can employ an automated subsystem for installing enterprise agents 320 onto the mobile devices 120 associated (e.g., enrolled) with the enterprise. For example, a mobile device manager 202 can be configured to send the enterprise agents 320 to the mobile devices 120 for automated installation or manual installation by the users 115. Alternatively, IT personnel can manually install the enterprise agents 320 onto the mobile devices 120, or end users can download and install the enterprise agent 320 from commercially available application stores. Different types of enterprise agents 320 can be provided for different mobile device types, platforms, operating systems, etc. The mobile device manager 202 or another software component of the enterprise system 110 can be configured to select an appropriate enterprise agent 320 for each given mobile device 120, based on such properties of the mobile devices 120 (e.g., mobile device properties 208 of
Enterprise Agent and Other Security Components Installed on Mobile Devices
The enterprise agent 320 may implement a variety of security-related features, including features that control (or enable the control of) mobile device accesses to enterprise resources 130. For example, the enterprise agent 320 installed on a given mobile device 120 may perform (i.e., instruct or cause the mobile device 120 to perform) some or all of the following tasks: (1) maintain a data connection with the enterprise system 110, which connection can be used both for application tunnels and for communications that do not involve application tunnels; (2) provide access to a public or private enterprise app store from which the user can download enterprise applications that have been approved by and configured for the particular enterprise; (3) create application tunnels for enabling enterprise applications installed on the mobile device to securely access certain enterprise resources, (4) collect, and transmit to the mobile device management system 126, “inventory” data regarding the properties and configuration of the mobile device, such as its manufacturer, model, operating system, screen size, memory size, memory availability, GPS coordinates, and which personal and enterprise mobile applications are installed on the device; (5) implement a log-in or other authentication service that requests and verifies the user's authentication information (e.g., passcode) when, for example, the user launches an enterprise mobile application; (6) decrypt encrypted message attachments received from the secure mobile gateway 128, such as encrypted attachments to email messages received from other members of the user's enterprise; (7) maintain a secure key store that is accessible by enterprise applications for obtaining keys for encrypting and decrypting data; (8) check for blacklisted mobile applications installed on the mobile device, and report any such applications to the mobile device management system; (9) perform precautionary actions, such as deleting decryption keys used for decrypting message attachments, when certain conditions are met, such as when a blacklisted mobile application is detected on the mobile device or the device is reported as stolen, (10) kill (terminate execution of) any blacklisted applications or other mobile applications determined to create a security risk, (11) provide one or more additional services for keeping enterprise applications and data on the device separate from personal application and data; and (12) wiping the device of all enterprise application and data (in response to a command received from the mobile device management system) when, for example, the user discontinues employment with the enterprise. As described below, some of these functions may alternatively be implemented in a separate mobile application or component that is distinct from the enterprise agent 320.
The enterprise agent 320 collects information about the mobile device's configuration using standard operating system APIs and mechanisms, and/or using its own APIs and mechanisms. For example, in implementations for the Android operating system, the enterprise agent may query the package manager to obtain a list of the applications installed on the device. The enterprise agent can similarly query the operating system for a list of mobile applications that are currently running, and can monitor broadcast messages to identify new applications that are being installed. The device configuration information collected by the enterprise agent through this process may be reported to the mobile device management system 126, which may use the information to generate rules that are applied by the secure mobile gateway 128 to control the mobile device's accesses to enterprise resources 130. The enterprise agent 320 may itself also use the collected device configuration information to take various precautionary actions, such as killing blacklisted mobile applications as mentioned above.
In one embodiment, the enterprise agent 320 is (or is part of) a mobile application that can be downloaded from an application store and installed on a mobile device 120. Once the enterprise agent has been installed and launched, the end user supplies configuration information, such as a corporate email address and email password, for enabling the agent to communicate with a particular enterprise system 110. Once configured, the agent 320 provides the user access to a secure application store from which the user can download and install enterprise mobile applications that have been approved by, and in some cases specifically configured for, the user's enterprise. The functionality for downloading and installing enterprise mobile applications may alternatively be embodied within a separate “secure launcher” mobile application that runs in conjunction with the enterprise agent.
With further reference to
As further shown in
One benefit of using a secure VM 350C is that it reduces or eliminates the need for the mobile applications to be specifically written or modified for use with an enterprise system 110. For example, an enterprise may wish to make a particular commercially-available mobile application available to its employees for use in accessing company resources, but may not have permission to modify the application to implement the various security features described herein (such as authentication, secure storage, and secure networking). In such a scenario, the enterprise may configure the mobile application or the mobile device to cause this particular application, when executed, to run only within the secure VM.
The secure VM is preferably implemented as a separate mobile application, but may alternatively be part of another application or component (such as the enterprise agent 320 or the secure launcher 350B). The secure VM may be invoked in various ways; for example, the enterprise agent may request that the secure VM run a particular application, or an application may, upon being launched, request or specify the secure VM as it's execution environment. In some embodiments, the secure launcher 350B and the secure VM 350C are used in combination to create a secure space for running enterprise applications, although each can be used independently of the other. Additional details of the secure VM are described below in the section titled Secure Virtual Machine.
As further shown in
In addition to the components shown in
User Interface for Launching Enterprise Applications
In one embodiment, which is depicted in
In some embodiments, when the user launches an enterprise application via the wheel 172, the user is prompted to enter a passcode, and the application is not launched unless the correct passcode is entered. The task of requesting and verifying the passcode may, for example, be performed by the enterprise agent 320 (
In one embodiment, which is shown in
The secure launcher's user interface may also include features for enabling the user to, for example, arrange the icons 174 on the wheel 172, control the position of the wheel (e.g., which screen edge it extends from), and control the extent to which the wheel is displayed. The selectable element 170 (
Overview of Mobile Device Management System
Referring to
The illustrated mobile device management system 126 includes a mobile device manager component 202 (
In the illustrated embodiment of
The mobile device information 204 can also include user-device assignment records 210 that identify which users 115 or user accounts are assigned to the enrolled mobile devices 120, as well as roles 206 of the users 115 within the enterprise. A user's role 206 typically associates the user 115 with the enterprise-related duties or activities in which the user engages. Roles 206 can have names and, optionally, associated definitions. The roles 206 (and role names) can mimic the enterprise's departments and positional hierarchy. For example, an enterprise can define roles with names such as Upper Management, Officer, Sales, Accounting, Engineering, Word Processing, Human Resources, etc. In this scheme, a salesperson can be given the role “Sales,” an engineer can be given the role “Engineering,” and so forth. Also, roles 206 can be defined as broadly or as narrowly as may suit the needs of the enterprise. For example, an enterprise can give all of its engineers the “Engineering” role. Alternatively or additionally, the enterprise may wish to define narrower roles such as “Computer Engineer,” “Materials Engineer,” “Semiconductor Processing Engineer,” etc, particularly if the enterprise wishes to differentiate the mobile device authorizations of its different types of engineering personnel. Further, a user 115 can be assigned to multiple roles 206, depending upon the user's duties or activities associated with the enterprise. In certain embodiments, an enterprise may use an RBAC (role-based access control) system to assist in the regulation of enterprise resources 130, and the user roles 206 can relate to or be the same as the roles defined in the RBAC system.
The enterprise agents 320 of the mobile devices 120 can be configured to send device-related data to the mobile device management system 126 periodically, and/or whenever the mobile devices 120 connect to the mobile device management system 126 (e.g., upon the formation of an application tunnel). For instance, the enterprise agents 320 can send data concerning software applications installed on the mobile devices 120, software upgrades, system information, etc., as described above. In one embodiment, the agent 320 sends such device-properties information over the same connection that is used for application tunnels, but without the use of an application tunnel.
With continued reference to
As shown in
The mobile device management system 126 can include a gateway rule generator 222 for creating, editing, and/or sending gateway rules to the secure mobile gateway 128, as described below. These tools 220, 221 may, for example, be used by IT administrators to implement various security-related features and policies, as described below.
The mobile device management system 126 can include a tunneling mediator module 224 for mediating an application tunnel between a software application running on a mobile device 120 and another resource, such as an enterprise resource 130, as described below. The tunneling mediator module 224 can also be configured to grant or deny access requests based on the access policies 218 and information 204.
The mobile device management system 126 can also include a remedy agent 226 for executing remedial actions provided by the meta-application 150 and/or 151, as described below. The remedy agent 226 may execute various types of remedial actions based on conditions specified by rules, for example, as described generally in Qureshi '526.
With further reference to
For example, an enterprise may wish to use multiple mobile device management systems 126. An enterprise with multiple offices may use separate systems 126 for the separate offices. This may be useful if the enterprise has offices located in different geographical areas. For example, a large enterprise with offices in England, Japan, and the U.S. may use three different mobile device management systems 126 located within or near to those office locations. In such embodiments, each mobile device management system 126 can be responsible for managing mobile devices 120 in a different geographical area, wherein such mobile device management can comprise sending rule packages to the mobile devices 120 (as described below) and/or regulating access to enterprise resources 130. In such embodiments, the secure mobile gateway 128 is preferably configured to communicate with each of the mobile device management systems 126 for the purposes described herein. In some implementations, a console is provided that can be used to view the various systems 126 associated with a given enterprise.
Use of Secure Mobile Gateway to Regulate Mobile Device Access to Enterprise System
With reference to
With the proliferation of mobile devices and the desire to use existing applications for the mobile devices, a need exists to take action at a network level to provide controlled access to enterprise resources. Moreover, as enterprises implement BYOD (bring your own device) or BYOT (bring your own technology) policies, a need exists for flexibility while addressing the increasingly complex task of protecting enterprise resources and sensitive enterprise data. Such flexibility can include allowing a number of different mobile devices and/or applications running on such mobile devices to access enterprise resources while providing a desired level of control over such access to enterprise resources. As one example, it can be desirable to allow mobile devices 120 having a variety of different email clients to access enterprise resources and to enable the enterprise to implement certain protections, such as denying some access requests in certain circumstances configurable by the enterprise and/or encrypting at least a portion of data provided to email clients of a mobile device based on enterprise policies, when allowing the various email clients to access enterprise data. Allowing a variety of existing mobile applications to access enterprise resources can eliminate the need to develop proprietary applications and/or modify existing applications in order to access enterprise resources. At the same time, implementing a desired level of control over access to enterprise data can allow an enterprise to strike a balance between protecting enterprise data and enabling users to access the enterprise data on a mobile device 120.
A secure mobile gateway 128 can assist in flexibly protecting sensitive enterprise data accessed by mobile devices 120. The secure mobile gateway 128 can monitor and log traffic between one or more enterprise resources 130 and a mobile device 120. The secure mobile gateway 128 can apply rules to implement enterprise policies applied to a selected mobile device 120. Based on a particular protocol, the secure mobile gateway 128 can take actions to implement enterprise policies as applied to the selected mobile device 120 that is requesting access to an enterprise resource 130. Thus, in the context of a mobile device 120 communicating with an enterprise computing system 110, the secure mobile gateway 128 can take actions associated with a protocol and certain conditions to provide access to enterprise resources 130. It will be understood that the secure mobile gateway 128 can control traffic associated with any suitable protocol, for example, the protocols described herein. Any combination of the policies, rules, and remedial action described herein can be implemented by the secure mobile gateway 128. Moreover, the secure mobile gateway 128 can implement a variety of other policies, rules, remediation actions, or any combination thereof in accordance with the principles and advantages described herein.
The secure mobile gateway 128 can include a gateway filter that functions as a protocol analyzer and a rules remediator. The gateway filter can detect a defined protocol, such as ActiveSync or HTTP(s), associated with enterprise traffic. The gateway filter can implement gateway rules that take certain actions for a particular protocol and one or more conditions. For example, when a request from a mobile device 120 to access an enterprise resource 130 is an ActiveSync request, the gateway filter can implement rules specific to the ActiveSync protocol. In this example, the conditions can be that the mobile device 120 is associated with an executive of the enterprise that is likely to receive sensitive enterprise information. The gateway filter can then take the action of encrypting attachment data before sending the data to the mobile device of the executive. In another example, the gateway filter can deny a request by a mobile device 120 to access an enterprise resource 130 due to the mobile device 120 having a certain application installed thereon.
Although the secure mobile gateways 128 of
The illustrated secure mobile gateway 128 in
Take for example the case of a secure mobile gateway 128 configured to process ActiveSync requests to synchronize enterprise system data with mobile devices 120. ActiveSync is a well-known mobile data synchronization technology and protocol developed by Microsoft™. One implementation of ActiveSync, commonly known as Exchange ActiveSync (or EAS), provides push synchronization of contacts, calendars, tasks, and email between ActiveSync-enabled servers and mobile devices. The gateway filter 401 can be configured to intercept every incoming request 402, determine if it is an ActiveSync request, and consult a database of gateway rules 404 to determine if the gateway filter 401 should allow or deny the request. The request can be, for example, an HTTP request. The database of gateway rules 404 can be a local database stored on the enterprise firewall server 400. In the case of an allowed ActiveSync request 402, the gateway filter 401 can send the request to the enterprise resource 130, which can comprise a Microsoft Exchange server.
The gateway filter 401 can detect whether the request 402 is an ActiveSync request by inspecting the request's header and possibly body to detect indicia of the ActiveSync protocol. Each ActiveSync command typically comprises a web Uniform Resource Locator (URL) issued by the mobile device 120. After the URL, the request typically includes query parameters and an ActiveSync command. To illustrate, consider the following ActiveSync request:
A gateway rule 404 can include one or more values of properties of a mobile device request 402 formatted according to a protocol supported by the secure mobile gateway 128. Such properties can comprise URL parameters, header values, commands, etc. The gateway filter 401 can be configured to filter the requests 402 based at least partly on these properties. In the case of ActiveSync, the request properties can include DeviceID and DeviceType (taken from the request URL), the User and UserAgent parameters (taken from the HTTP headers), and one or more ActiveSync command parameters (ActiveSync defines numerous different commands, such as sync mailbox, send mail, get attachment, etc.). A gateway rule 404 can specify conditions under which a request is to be granted or denied by the gateway filter 401. Such a condition can involve a logical expression and/or combination of one or more values of the request properties of a protocol supported by the secure mobile gateway 128. For example, a gateway rule 404 can cause the gateway filter 401 to block all ActiveSync requests having any one of a particular group of DeviceID values, and which issue the get attachment command (for downloading an email attachment). As this example illustrates, a gateway rule 404 can identify one or more mobile devices 120 and/or users 115. As this example also illustrates, a gateway rule 404 can allow or deny access based on what a mobile device 120 is attempting to do or achieve by issuing an access request 402 to the enterprise system 110. Through the secure mobile gateway 128, an operator of the secure mobile gateway 128 can customize gateway rules 404 for a particular enterprise computing system 110.
In some embodiments, the secure mobile gateway 128 can be configured to inspect the body or “payload” of a request 402 to access an enterprise resource 130, in order to detect additional information that may be useful in evaluating whether to grant or deny the request. The payload may provide information about the specific data being requested, how the mobile device application will use the requested data, and so on. Access policies (e.g., policies 218 of the device management system 126) can be created to regulate or restrict access based on such information. For example, the secure mobile gateway 128 may inspect the payloads of messages that are formatted according to selected protocols such as ActiveSync, SharePoint, SAP, and/or those based on HTTP. The secure mobile gateway may also modify protocol metadata in these messages to implement various security-related features. For instance, as described below under the heading “protecting attachment data,” the secure mobile gateway may be configured to inspect the payloads of ActiveSync or other requests 402 to determine whether they are associated with messages that include attachments (such as email attachments); the secure mobile gateway 128 may also encrypt some or all of the identified attachments to prevent them from being stored in an unencrypted format on the associated mobile devices 120.
The gateway rules 404 can be based on data provided by the mobile device management system 126 and/or data provided by an operator of the secure mobile gateway 128. The mobile device management system 126 can convert high level rules into relatively simple (lower level) rules and provide the relatively simple rules to the secure mobile gateway 128 for application to monitored traffic. The secure mobile gateway can also implement rules provided by or based on inputs from an inference engine of a meta-application 150 and/or a meta-application portion 151 in the cloud 156 (such as the inference engine 824 of
The gateway rules 404 can take many different forms and can be written in a variety of programming languages, such as XML. In one embodiment, a gateway rule 404 includes a list of “groups” plus an indication of a default “action” (e.g., grant or denial of the access request or whether to encrypt attachment data). In this context, a group is a collection of “group members” plus a corresponding action for the group. A group member can be a set of values of one, some, or all of the properties of a mobile device request 402. Each group member can match an incoming mobile device access request 402 by any value of a property of a request protocol supported by the secure mobile gateway 128. The gateway filter 401 can match an inbound request 402 with a group member by matching all of the property values of the group member to the corresponding property values of the request 402. If a group member does not include any values for one or more possible request properties, the gateway filter 401 can determine that it does not matter what are request's values for those particular properties. In other words, a group member can effectively specify “any” or “don't care” for one or more request properties. Hence, different group members can correspond to the same mobile device 120 or user 115. For example, for a secure mobile gateway 128 that supports ActiveSync, the group members can match inbound HTTP requests 402 by any combination of DeviceID, User, UserAgent, and DeviceType, as well ActiveSync Cmd values.
Here is one example of a gateway rule 404:
This gateway rule specifies a default action as a denial of an inbound access request received by the secure mobile gateway 128 from a mobile device 120. This gateway rule also specifies a “StaticAllow” group whose action is “Allow,” a “StaticDeny” group whose action is “Deny,” a “ZdmDeny” group whose action is “Deny,” and a “ZdmAllow” group whose action is “Allow.” Together a group and an action can be a subrule. The StaticAllow and StaticDeny groups and their associated action are examples of subrules that are local to the secure mobile gateway 128. Such subrules can be modified by an operator of the secure mobile gateway independent of the mobile device management system 126. The ZdmDeny and ZdmAllow groups and their associated actions are examples of subrules received from the mobile device management system 126. The priorities of the rules can be set in any suitable order. In the example above, the StaticAllow and StaticDeny groups and their associated actions are prioritized over the ZdmDeny and ZdmAllow groups and their associated actions. In this way, an operator of the secure mobile gateway 128 can override subrules provided by the mobile device management system 126.
A number of other sub-rules from various sources can be implemented with or in place of the above example subrules provided above. A gateway rule 404 can alternatively or additionally define a number of other actions for the secure mobile gateway 128 to take for various groups, such as encrypting attachments for certain groups, modifying a body of a message (such as an email) for certain groups, blocking a mobile device 120 from certain groups from receiving messages in certain locations, etc.
To enforce the example gateway rule 404 provided above, the secure mobile gateway 128 can access all of the group members of these four groups. Here is an example of a “group list” that can be provided to the secure mobile gateway 128 (e.g., by a provider 408 as described below):
This group list defines locations of files containing lists of group members, where each group member is identifiable by one or more values of properties of an access request 402 of a protocol supported by the gateway 128. For the ActiveSync protocol, each group member can include values of DeviceID, User, UserAgent, DeviceType, and Cmd parameters.
When the secure mobile gateway 128 receives an inbound mobile device request 402, the gateway filter 401 can read the values of properties of the request 402 and match them against the corresponding property values of group members of the group list. If there is a match, the gateway filter 401 can enforce the action associated with the group. If there is no match, the gateway 128 performs the same analysis for the next group listed in the gateway rule 404. If there are no matches with any of the groups of the gateway rule 404, the gateway 128 enforces the default action. To the extent that there may be conflicts between the groups of the gateway rule 404, the secure mobile gateway 128 can be configured to give priority to groups that appear earlier in the rule.
Referring still to the above example of a gateway rule 404, after the gateway filter 401 reads the values of the request properties, the gateway filter 401 reads the property values of the group members of the StaticAllow group and determines if any of them matches any property values of the request 402. For example, for a gateway 128 supporting ActiveSync, the DeviceID of the request 402 could match the DeviceID of one of the group members. If there is such a match, the gateway filter 401 enforces the action associated with the StaticAllow group, which is to allow the request 402 to pass through the firewall. If there is no match with any property values of any group member of the StaticAllow group, then the gateway filter 401 reads the property values of the group members of the StaticDeny group and determines if any of them matches any property value of the request 402. If there is a match, then the gateway filter 401 enforces the action associated with the StaticDeny group, which is to deny the request 402. If there is no match with any property values of any group member of the StaticDeny group, then the gateway filter 401 reads the property values of the group members of the ZdmDeny group and determines if any of them matches any property value of the request 402. If there is a match, then the gateway filter 401 enforces the action associated with the ZdmDeny group, which is to deny the request 402. If there is no match with any property values of any group member of the ZdmDeny group, then the gateway filter 401 reads the property values of the group members of the ZdmAllow group and determines if any of them matches any property value of the request 402. If there is a match, then the gateway filter 401 enforces the action associated with the ZdmAllow group, which is to allow the request 402. If there is no match with any property values of any group member of the ZdmAllow group, then the gateway filter 401 enforces the default action, which is to deny the request 402.
The secure mobile gateway 128 can include a gateway configuration service 406 that allows a user (e.g., administrators, IT personnel, etc.) to view, edit, and/or create gateway rules 404, and then save them in the local database. The configuration service 406 can be configured to allow an administrator to set “static” gateway rules 404. A static gateway rule can identify a mobile device 120 or groups of devices 120 that are always to be granted access or denied access. For example, the administrator can input a rule 404 that specifies that the mobile device 120 (e.g., identified by ActiveSync DeviceId) used by the CEO of the enterprise is always granted access to the enterprise network 110. As another example, the administrator can input a gateway rule 404 that denies access to devices 120 that are known to have malware or incompatibilities with the enterprise network 110. The configuration service 406 can also be configured to allow the user to adjust various other settings and features of the gateway 128, including any of those described herein.
The gateway configuration service 406 can allow for gateway rules 404 to be statically defined. Further, the secure mobile gateway 128 can be configured to receive gateway rules 404 from one or more external “providers” 408. A provider 408 can be any entity authorized by the gateway 128 to provide gateway rules 404 for regulating access to the enterprise network 110. The gateway 128 can have an open architecture that permits IT personnel of the enterprise to add, remove, and configure the providers 408. Preferably, the gateway 128 supports any number of providers 408. The mobile device management system 126 can be one of the providers 408. Another provider 408 can be the meta-application 150 that manages some or all of the enterprise network 110, such as the “backend” subnetwork behind the firewall 124 (
Each provider 408 can be configured to create and send one or more gateway rules 404 to the gateway 128. The providers 408 can be configured to query their own databases of information to create the rules 404. Compared to the gateway 128, a provider 408 can have significantly more data on which to grant or deny mobile device access requests 402, such as information about the users 115 and/or mobile devices 120. For instance, the illustrated mobile device management system 126 (
For example, if an access policy 218 requires that all Android™ mobile devices 120 having a Facebook™ application installed thereon are to be denied access to the enterprise network 110, the gateway rule generator 222 can query the mobile device information 204 to obtain a list of such devices 120. The gateway rule generator 222 can create one or more gateway rules 404 that instruct the gateway filter 401 to deny access to the listed devices 120, and then send the created rules to the gateway configuration service 406. In the case of a gateway 128 that supports the ActiveSync protocol, the gateway rule generator 222 can, for example, generate a list of ActiveSync DeviceID's of Android™ mobile devices 120 having a Facebook™ application installed thereon, and then create one or more gateway rules 404 instructing denial of access for such devices.
As the above example illustrates, an access policy 218 can comprise any logical combination of conditions that can be transformed into a gateway rule 404. The policy 218 in the above example represents a conjunction (AND operator) of two conditions: (1) that the mobile device is an Android™ device, and (2) that the device has a Facebook™ application installed thereon. It will be understood that a logical combination of conditions can include OR operators, XOR operators, NOR operators, NAND operators, THEN operators, mathematical operators (including “less than” and “greater than”), and any other suitable operators.
In addition to generating gateway rules 404 based at least partly on the mobile device information 204, the gateway rule generator 222 can be configured to generate the rules based at least partly on a locally stored database of information received from the meta-application 150, such as a model of the enterprise network 110 and mobile devices 120, or detected “features,” “problems,” and “root causes” (see below discussion of meta-application). In an embodiment in which the meta-application 150 manages Microsoft Exchange™, the information received from the meta-application 150 can include ActiveSync partnership data.
As noted above, the meta-application 150 (
The illustrated gateway configuration service 406 is configured to receive gateway rules 404 from the providers 408, and save them in the local storage of rules 404. The gateway configuration service 406 can be implemented as a web service and can have a list of all of the providers 408 associated with the gateway 128. The gateway configuration service 406 can be configured to periodically (e.g., every 24 hours, hour, or few minutes, etc.) query the providers 408 for any new gateway rules 404 that are available. In this sense, the configuration service 406 acts as a collector of gateway rules 404 for the gateway 128.
Protecting Attachment Data
Mobile devices are pervasively used to check emails, including emails associated with an enterprise email account. Some emails include attachments containing sensitive data. These attachments are often stored on a mobile device when a user checks email using the mobile device. The attachment data stored on the mobile device can be compromised in a number of ways. When the attachment data is compromised, sensitive data associated with the enterprise can be exposed. Accordingly, a need exists to protect attachment data associated with an enterprise that is stored on a mobile device. This need may vary depending upon the individual's position or role in an associated organization; for example, the need to protect the attachments to messages received by a corporation's executives may be greater than the need to protect the attachments received by the corporation's IT staff. In addition, if the company's enterprise supports the use of other messaging protocols (SMS, MMS, instant messaging, AS, EWS, OWA, proprietary messaging protocols, etc.) to send documents, this need may extend to such protocols.
Aspects of certain embodiments relate to protecting enterprise attachments stored on a mobile device, such as enterprise email attachments, from being compromised. The attachments may include, for example, Word documents, Excel documents, PowerPoint presentations, text files, and documents and files created with other application programs. According to the principles and advantages described herein, attachment data can be protected on mobile devices with non-proprietary email applications, such as an email application that comes pre-installed on or is later installed on an iPhone or an Android device. As such, features related to protecting attachment data can be implemented with any suitable email client. Enterprise attachments can be protected prior to being stored on a mobile device such that the protected attachment data remains safe even when data stored on the mobile device is compromised. The attachment data can be securely stored in the general file system of a mobile device. Attachment data can be identified and stripped from an email message. The attachment data can be encrypted and then sent to the mobile device as encrypted attachment data. A secure mobile gateway can be configured to encrypt attachment data and provide the encrypted attachment data to the mobile device. According to some embodiments, an encrypted attachment key can also be sent with the encrypted attachment data. Secure, policy-based access to the protected attachment data can be provided. An enterprise agent can decrypt the encrypted attachment data. For example, the enterprise agent can decrypt the encrypted attachment key and then use the attachment key to decrypt the encrypted attachment data. When the mobile device is compromised, the enterprise agent can be configured such that the encrypted attachment data remains encrypted. For example, the enterprise agent can destroy and/or invalidate the attachment key. Without the device key to decrypt the encrypted attachment key, the encrypted attachment data can remain encrypted. When the encrypted attachment data is stored on removable memory, such as a secure digital (SD) card, the attachment data can remain secure when the removable memory is removed from the mobile device since the attachment data is encrypted.
In one embodiment, enterprise users access their enterprise email accounts from their mobile devices using the enterprise agents installed on their mobile devices. The enterprise agent can operate transparently to an email client and an enterprise email server. The enterprise agent may require an end user to log-in before accessing the user's email account and/or before an opening encrypted attachment. The enterprise agent can register with a platform of the mobile to device. When the user opens an encrypted attachment, the enterprise agent can be invoked. An encrypted attachment can be identified by a particular file suffix. After being invoked, the enterprise agent can decrypt the attachment transparently to the user.
Although the system is described herein primarily in the context of email attachments for illustrative purposes, it will be understood that the principles and advantages described herein may be applied to any other suitable communication protocol that can be used to send an attachment from an enterprise resource to a mobile device. For example, any combination of features of protecting email attachments can be applied to protecting an attachment to an instant message, text message (for example, an SMS), or the like. It will be understood that, in certain embodiments, the policy based encryption of attachment data described herein can be implemented in combination with other encryption applied to the attachment data. Moreover, although attachment data is described herein as being encrypted for illustrative purposes, it will be understood that the principles and advantages described herein may be applied to any other suitable way of protecting attachment data on a mobile device, such as scrambling and the like. Furthermore, the principles and advantages described herein with reference to attachment data can be applied to protecting some or all of a message, such as an email message.
With reference to
The secure mobile gateway 128 can be configured to detect attachments in incoming and/or outgoing email messages. In some embodiments, the secure mobile gateway 128 can inspect and/or modify a data payload being transmitted to and/or from a mobile device 120, such as an ActiveSync data payload. The incoming and/or outgoing data payload can be in WBXML, a binary version of XML optimized for low bandwidth environments. The secure mobile gateway 128 can include a parser and generator that operate on the data payload. For example, the parser and generator can process WBXML. In this example, the parser and generator can process data in accordance with the ActiveSync WBXML schema. The secure mobile gateway 128 can programmatically identify which character encoding schemes are being used. WBXML messages may include MIME payloads. The secure mobile gateway 128 can include a MIME parser and generator configured to construct and deconstruct this data. With a parser and generator, the secure mobile gateway 128 can identify an attachment so that the attachment can be separated from an email and secured.
According to one embodiment, to intercept and/or modify incoming and/or outgoing data payloads, the secure mobile gateway 128 can register with an Internet Server Application Programming Interface (ISAPI) or other server to receive notifications. The received notifications can correspond to various processing stages. The secure mobile gateway 128 can maintain a context state to track the various processing stages of a request. The secure mobile gateway 128 can chunk and de-chunk request and response data.
The secure mobile gateway 128 can modify, or otherwise mark, an attachment and/or a reference to an attachment. For instance, the secure mobile gateway 128 can append a particular suffix, such as “.zendata” to the names of encrypted attachments to signify that they should be preprocessed by the enterprise agent 320. As another example, the secure mobile gateway 128 can append a particular suffix, such as “.zendata” to the names of a reference to an attachment to signify that the attachment should later be encrypted prior to being delivered to a mobile device 120. The secure mobile gateway 128 can adjust a header attribute (for example, in MIME data) to identify that attachment data is encrypted as an alternative to or in addition to appending a suffix to a file or a link. The secure mobile gateway 128 can encrypt and/or decrypt attachment data and/or attachment keys. The secure mobile gateway 128 can be configured to initiate communication with the mobile device management system 126 to obtain device properties, device policies, public device keys, the like, or any combination thereof.
Device Agents, such as an operating system and/or the enterprise agent 320 (
The mobile device management system 126 can generate a device key. The mobile device management system 126 can distribute the device key or a portion thereof to a mobile device 120 and/or to a secure mobile gateway 128. A suitable key can be used by the secure mobile gateway 128 to encrypt attachment data and another suitable key can be used by the mobile device 120 to decrypt the encrypted attachment data. For instance, the mobile device 120 can receive a private device key from the mobile device management system 126, and the secure mobile gateway 128 can receive a public device key from the mobile device management system 126. The secure mobile gateway 128 need not include special key management and/or key archiving, according to some embodiments. When an attachment is encrypted and a corresponding device key is subsequently destroyed, invalidated, and/or replaced, the encrypted attachment may be unrecoverable.
A number of different rules and/or policies related to protecting attachments can be implemented by the enterprise system 110. For example, features related to protecting attachments can be implemented based on one or more properties of a particular mobile device 120 that receives attachment data. In this example, certain mobile devices 120 with particular software applications installed thereon can enable attachment protection as a default. As another example, protecting attachments can be enabled and/or disabled based on one or more properties of a user of a mobile device 120 that is receiving the attachment data. For instance, an employee of the enterprise that is likely to receive attachments with sensitive and/or confidential information, such as an executive and/or a member of the legal team, can have attachments encrypted as a default. By contrast, an employee who is unlikely to receive attachments with sensitive and/or confidential data can have attachment protection disabled as a default. As yet another example, attachments can be protected based on one or more properties of the attachment itself, such as file name, file type, data included in the attachment, or any combination thereof. For instance, the attachment can be searched for one or more key words and phrases, such as “confidential,” “proprietary,” “attorney-client privileged,” etc., and if such a key word or phrase is found the attachment can be encrypted. It will be appreciated that rules and/or policies can allow the enterprise to configure features related to protecting attachments in a flexible way, based on mobile device properties, user properties, attachment properties, the like, or any combination thereof. Any of the rules and/or policies related to protecting attachments can be implemented in combination with any of the other rules described herein, rules packages described herein, policies described herein, the like or any combination thereof.
Moreover, any of these rules and/or policies related to protecting attachments can be implemented by any suitable computer hardware described herein. For example, the secure mobile gateway 128 can be configured to enable and/or disable features related to protecting attachments, such as encrypting attachments, globally. The secure mobile gateway 128 can obtain policies from the mobile device management system 126 related to protecting attachments. The mobile device management system 126 can be configured to manage any selection policy related to protecting attachments, such as which mobile devices 120 receive encrypted attachments and/or what type of attachments are encrypted.
In a typical use case scenario, a mobile device 120 can receive an email with an attachment from an enterprise email server, such as an Exchange server, in accordance with an ActiveSync protocol. The mobile device 120 can retrieve encrypted email attachments such that the attachment data saved on the mobile device 120 is protected with device-specific keys. The saved attachment data can only be decrypted using an enterprise agent 320 running on the mobile device 120, according to certain embodiments. For instance, the enterprise agent 320 can control and manage the device-specific key used to decrypt the attachment data. A mobile device management system 126 can select or specify the mobile devices 120 and/or users for which attachments are to be encrypted. For example, selected mobile devices 120 may be excluded from receiving encrypted attachments based on one or more mobile device management system 126 policies and/or one or more secure mobile gateway 128 policies.
Encrypted attachments that are forwarded and/or sent from a mobile device 120 can be decrypted by the secure mobile gateway 128 before being delivered to new recipient(s). As a result, a new recipient within the enterprise can receive the attachment based on its policy. When the new recipient is a mobile device 120 with an enterprise agent 320, the attachment data can be re-encrypted for that particular recipient mobile device 120. When the new recipient is an unmanaged mail client, the attachment data can be delivered unencrypted.
Example communications and events related to delivering an email with an attachment from an enterprise resource 130 to a mobile device 120 via a secure mobile gateway 128 will be described with reference to
In event D of
An attachment can also be encrypted in event D of
The sync response from the enterprise email server and/or another enterprise resource 130 as modified by the secure mobile gateway 128 is delivered to the mobile device 120 in event E of
For emails with attachment references, such as WBXML emails, a request to retrieve attachments can be sent from the mobile device 120 in event F of
Email messages and associated attachments stored on a mobile device 120 can be forwarded from the mobile device 120 to a new recipient.
In event A of
In the example illustrated in
In event A of
To encrypt email attachments, various keys can be generated, delivered to other devices, encrypted, used to decrypt encrypted attachment data, the like, or any combination thereof. Although encryption of email attachments may be described herein with reference to certain computing devices performing particular functionalities for illustrative purposes, it will be understood that any of the features related to encrypting and/or decrypting an attachment described herein can be performed by any suitable computing device. For example, some functions related to encryption/decryption or a subcombination thereof that are described as being performed by the secure mobile gateway 128 and/or the mobile device management system 126 can be performed by the mobile device 120. As another example, some functions related to encryption/decryption or a subcombination thereof that are described as being performed by either the secure mobile gateway 128 or the mobile device management system 126 can alternatively or additionally be performed by the other of the two computing systems.
In certain embodiments, the secure mobile gateway 128 can generate keys related to an attachment and the mobile device management system 126 can generate keys for selected mobile devices 120. For instance, the secure mobile gateway 128 can generate a symmetric secure mobile gateway key Smgkey and store this key in a suitable data store. The symmetric secure mobile gateway key Smgkey can be generated, for example, when the secure mobile gateway 128 is being installed and/or when software is being installed thereon. According to some embodiments, the mobile device management system 126 can generate an asymmetric key DeviceKey associated with a selected mobile device 120. Alternatively or additionally, the mobile device management system 126 can generate an asymmetric key associated with a group of mobile devices 120, a user of the enterprise, the like, or any combination thereof. Such an asymmetric key can be used in place of the asymmetric key DeviceKey or in combination with the asymmetric key DeviceKey. The mobile device management system 126 can distribute a private key DeviceKeyPr of the asymmetric key DeviceKey to the selected mobile device 120. The mobile device management system 126 can distribute a public key DeviceKeyPb of the asymmetric key DeviceKey to the secure mobile gateway 128.
The attachment key AttachmentKey is encrypted at block 3420. For example, the secure mobile gateway 128 can encrypt the attachment key AttachmentKey with the secure mobile gateway key Smgkey. This produces an encrypted secure mobile gateway attachment key EncyptedSmgAttachmentKey for the secure mobile gateway 128, which can be used by the secure mobile gateway 128 to decrypt the encrypted attachment data, for example, as described with reference to
At block 3430, attachment data is encrypted with the attachment key AttachmentKey to generate encrypted attachment data. The secure mobile gateway 128 replaces previous attachment data with encrypted attachment data at block 3440. The encrypted attachment keys EncyptedSmgAttachmentKey and EncryptedDeviceAttachmentKey can also be included with the encrypted attachment data. For example, the secure mobile gateway 128 can replace attachment data with encrypted attachment data, the encrypted secure mobile gateway attachment key EncyptedSmgAttachmentKey and the encrypted device attachment key EncryptedDeviceAttachmentKey.
Encrypted attachment data can be decrypted in order to access the attachment data. In certain embodiments, a user can be prompted to log-in or otherwise supply access credentials when accessing encrypted attachment data on a mobile device 120. To maintain the protection of the encrypted attachment data, the encryption keys associated with the attachment data can be provided to particular computing devices. For instance, as discussed with reference to block 3420 of
At block 3510, a computing device receives an encrypted attachment. In certain embodiments, the computing device can also receive an encrypted attachment key with the encrypted attachment data. The encrypted attachment data and the encrypted attachment key can both be included in the same file, according to some of these embodiments. The encrypted attachment key is decrypted at block 3520. Then, at block 3530, the attachment data is decrypted using the attachment key.
The method illustrated in
The method illustrated in
To support distribution and/or updating of public device keys, such as the public device key DeviceKeyPb, a web service interface or other suitable interface can be provided. The interface can enable a user to define device/key pairs and/or user/key pairs. The interface can enable a user, such as an IT staff member or an enterprise network administrator, to update the key pairs by, for example, adding new pairs, replacing existing pairs, removing pairs, the like, or any combination thereof. The interface can enable a user to map a mobile device 120 to a set of properties (for example, name/value pairs). Such properties can include the attachment public key, blocking attachments, blocking selected attachment types, blocking contact sync, blocking calendar sync, client certificate ID, any of the other properties described herein, the like, or any combination thereof.
Application Tunnels
With reference to
One benefit of using application tunnels for communications between mobile device applications 318 and enterprise resources 130 is that it is possible to limit the mobile device's access to those enterprise resources 130 that the user 115 of the mobile device 120 needs for the performance of his or her enterprise role 206. Another potential advantage of using application tunnels is that access control can be provided at the application level for pre-existing applications. In preferred embodiments, the application tunnels are defined at the application layer in the OSI model. This is in contrast to a virtual private network (VPN), a methodology which is widely used to provide remote offices or individual users secure access to their organization's network. A VPN operates at the network layer (or lower) of the Open Systems Interconnection (OSI) model and ordinarily provides users with full access to all of the resources within an enterprise's computer network. A significant problem with using a VPN connection is that no suitable mechanism exists for restricting access by the mobile applications (and potentially mobile applications containing malware) to the VPN connection. In contrast, as described below, each application tunnel may be exclusive to (available for use only by) a single, corresponding mobile application. By limiting access only to enterprise resources 130 needed by a particular user 115, the use of application tunnels can promote enterprise network security.
As explained in further detail below, an additional benefit of using application tunnels for communications between a mobile device 120 and an enterprise system 110 is that it allows the enterprise to improve the user's connectivity experience (e.g., by caching data in the event of a network connection loss), log data flows, and implement other features.
In order to implement the application tunnels, a tunneling mediator can be provided, through which the tunneled communications flow. The tunneling mediator is a component that receives mobile device application communications formatted according to an encapsulation protocol, “unpacks” or extracts data from the communications using the protocol, and sends the unpacked or extracted data to a network resource requested or specified by the mobile device application. The tunneling mediator also does substantially the same for communications sent by a network resource to a mobile device application via the tunneling mediator. The tunneling mediator can comprise a software application installed on a server. The tunneling mediator can be located within the enterprise system 110 (e.g., the tunneling mediator 224 of the mobile device management system 126), or alternatively outside of the enterprise system 110 (e.g., in a cloud computing environment 156 as in
A tunneling mediator or enterprise agent 320 can use a tunnel definition to construct an application tunnel, in accordance with methods described below. The mobile device management system 126 illustrated in
A tunneling mediator or related system can include an interface, such as a web console, for viewing, creating, and editing tunnel definitions. The interface can also allow an administrator or other person to view data associated with mobile devices 120 adapted to connect via application tunnels. At least some of the data can be obtained from the repository of mobile device information 204 (
Many mobile device software applications 318 are capable of issuing network communications (also referred to as “application-generated communications”), including requests to access and communicate with enterprise resources 130. The enterprise agent 320 can be configured to intercept and/or receive these communications, and redirect at least some of them to URLs associated with one or more tunneling mediators, such as the mediator 224. The tunneling mediator can redirect the application-generated communications to requested enterprise resources 130, receive responsive communications from the enterprise resources 130, and forward the responsive communications back to the mobile devices 120. Advantageously, the tunneling mediator can add a layer of enterprise security by applying access policies 218 to grant or deny access, and restricting access only to the requested enterprise resources 130.
In one embodiment, upon intercepting and/or receiving an application-generated communication for accessing an enterprise resource 130 (or another resource), the enterprise agent 320 searches the application tunnel definitions stored in local storage to retrieve a tunnel definition associated with the software application 318 that produced the application-generated communication, and/or associated with the requested enterprise resource 130 (or other resource). The enterprise agent 320 generates an application tunnel formation request that identifies the retrieved tunnel definition, and encapsulates at least a portion of the application-generated communication within one or more headers of an encapsulation protocol. The encapsulated application-generated communication is also referred to herein as an “agent-generated communication.” The enterprise agent 320 sends the application tunnel formation request and the encapsulated application-generated communication (which can together comprise a single communication) to the tunneling mediator 224 (e.g., via connections 142 and 144 of
The tunneling mediator 224 receives the application tunnel formation request (which identifies the tunnel definition) and the agent-generated communication. The tunneling mediator 224 can read the tunnel definition identified in the tunnel formation request and then retrieve the identified tunnel definition from the repository 228. The tunneling mediator 224 can determine, from the retrieved tunnel definition or even from the information provided in the tunnel formation request, a URL and/or port of a computer server or other computing device on which the requested enterprise resource 130 is located. The tunneling mediator 224 opens a network connection to the server port (e.g., the connection 152 of
Communications in the opposite direction (e.g., from an enterprise resource 130 to a mobile device application 318) can be encapsulated by the tunneling mediator 224, sent by the tunneling mediator 224 to the mobile device 120, and then unpacked by the enterprise agent 320, in accordance with the encapsulation protocol. The tunneling mediator 224 can communicate with the enterprise resource 130 as though the mediator 224 is the mobile device application 318, and so that responses generated by the enterprise resource 130 are returned to the tunneling mediator 224 (e.g., via connection 152 of
In this type of application tunnel, the software application 318 installed on the mobile device 120 can be given an impression that it is connecting directly with a resource (such as an enterprise resource 130) associated with the URL of the network request issued by the application 318. In reality, the application 318 is actually communicating with the resource via a tunneling mediator (such as the tunneling mediator 224). Thus, the application 318 need not be aware of the tunnel's existence.
In some embodiments, the enterprise agent 320 can be configured to filter out those application-generated communications that meet predefined and/or configurable criteria. Such criteria can include, for example, any one or more of the following, as well as various other critera: (1) the URL (e.g., of the enterprise system 110, or of web sites whose access is restricted by the enterprise), (2) server port(s) to which an application 318 attempts to send the request, (3) data regarding the application that issues the request (e.g., name, version, etc.), (4) time of day, (5) day of the week, and/or (6) geographic location of the mobile device 120. Such filtering criteria can be communicated to a mobile device 120 by the enterprise system 110 via wireless communications to the enterprise agent 320.
In one method of initiating the formation of an application tunnel, the enterprise agent 320 is configured to intercept the application-generated communications from the software applications 318. For instance, in mobile devices 120 running certain Microsoft™ operating systems (e.g., Windows Mobile™, Windows CE™), it is possible to use a layered service provider (LSP) to filter network requests issued by mobile device applications 318. An LSP, which is a feature of the Microsoft Windows Winsock 2 Service Provider Interface (SPI), is a DLL that uses Winsock APIs to insert itself into the TCP/IP protocol stack. Once in the stack, the LSP can intercept and modify inbound and outbound Internet traffic. The LSP can allow for processing of all the TCP/IP traffic taking place between the Internet and the device's software applications 318. The LSP can be configured to be loaded automatically by any application 318 that uses network connections. The LSP has a layered model, like a filter. Thus, every time an application 318 makes a network call, it goes through the LSP. The LSP allows the enterprise agent 320 to intercept every application network communication attempting to send information to one or more defined URLs, and redirect the communication to a tunneling mediator, such as the mediator 224 associated with the enterprise system 110. In this manner, the enterprise agent 320 can detect requests from the applications 318 to connect to the enterprise resources 130, and modify and redirect the requests to a URL of the tunneling mediator. The enterprise agent 320 can be configured to filter requests from the applications 318 by one or more identified ports of the enterprise resources 130. The enterprise agent 320 can be configured to select port(s) of the tunneling mediator(s) to send the redirected requests, based at least partly on the enterprise resource ports provided within the requests.
As noted above, after the tunneling mediator establishes an application tunnel connection between the mediator and the requested resource, the mediator can send a notification thereof to the enterprise agent 320, and the enterprise agent 320 can accept the application tunnel connection. All of this can happen transparently with respect to the software application 318. The application 318 can send network requests via the tunneling mediator without modifications or reconfiguration of the application 318, according to certain embodiments.
Unfortunately, in some mobile devices it is difficult or even impossible for a mobile device 120 to intercept network connection requests issued by software applications 318. Some mobile device operating systems (such as iOS™ and Android™) can restrict the ability of different software applications to interact and share data with each other. Such restrictions are sometimes referred to as the “sandboxing” of software applications, and can be useful in preventing rogue applications from stealing data from mobile devices 120 and sending the data to unauthorized Internet locations. This can prevent an enterprise agent 320 from accessing or modifying network requests issued by the applications 318.
Hence, another approach to initiating the formation of an application tunnel is to reconfigure how the software applications 318 send their network requests (or at least some of them). In certain embodiments, a software application 318 is reconfigured to send its network requests to a local host of the mobile device 120, on a defined mobile device port. The enterprise agent 320 can be configured to “listen” to the port and react to an application's network request by establishing a connection with a tunneling mediator (if it is not already established) to open an application tunnel with a resource requested by the application 318. The enterprise agent 320 can consult the relevant application tunnel definition in order to determine the port to which to listen for the application tunnel request. In other embodiments, a software application 318 is reconfigured to send at least some of its network requests directly to the tunneling mediator. Further, the application 318 can also be configured to “unpack” communications (encapsulated via the encapsulation protocol) received from the tunneling mediator. An enterprise can make available an application store of downloadable mobile device applications 318 that are configured to generate application tunnel requests as described herein.
Encapsulation protocols for producing application tunnels are now further described. The enterprise agent 320 or software applications 318 (depending on which particular approach to forming an application tunnel is used) can be configured to modify the software application's network connection request using any of a variety of different methods or encapsulation protocols. An encapsulation protocol for use in an application tunnel can allow for the addition of metadata for various purposes. For example, the encapsulation protocol, via added metadata, can identify the particular application tunnel, which allows the tunneling mediator to distinguish the tunnel from other application tunnels that the tunneling mediator may simultaneously be handling. This can help to prevent mixing data between the different application tunnels, helping to ensure that the tunneled data is delivered to the correct resource (e.g., enterprise resource 130). Stated differently, the encapsulation protocol may add metadata that enables multiple application tunnels to be multiplexed for transmission on a common connection. The added metadata can also specify the length of each message sent through the tunnel. Added metadata can also be unrelated to the application tunnel or to the application 318 that initiated the tunnel, such as a list of software applications 318 installed on the mobile device 120, or results of commands sent to the mobile device 120 by the mobile device management system 126. Such data can be used by the mobile device management system 126 to update the mobile device information 204.
A typical network connection request generated by the software application 318 may use a multi-layered communication protocol involving multiple protocol headers. In a simplified example, the access request generated by the software application 318 may take the following form:
[IP header][TCP header][HTTP header][SOAP header][SOAP body],
wherein “IP” refers to the Internet Protocol, “TCP” refers to the Transmission Control Protocol, “HTTP” refers to the Hypertext Transfer Protocol, and “SOAP” refers to the Simple Object Access Protocol. In this example, the mobile device's enterprise agent 320 can be configured to intercept this communication (e.g., by use of an LSP) at the TCP layer, and then rewrap or encapsulate the TCP payload (which in this example is [HTTP header][SOAP header][SOAP body]) in multiple layers according to an encapsulation protocol used by the enterprise agent 320. For example, the enterprise agent 320 could rewrap or encapsulate the TCP payload within the following plurality of layers: SSL (Secure Sockets Layer), TCP, IP, etc. The enterprise agent 320 can then send the encapsulated request to the tunneling mediator. In other embodiments, as described above, the software application 318 can be configured to send the request to a local port of the mobile device 120 (from which the enterprise agent 320 receives, encapsulates, and redirects the request to the tunneling mediator), or even encapsulate the request and send it directly to the tunneling mediator.
Upon receipt of the encapsulated request from the mobile device 120, the tunneling mediator can unpack the request according to the encapsulation protocol. In the above example, the tunneling mediator extracts the TCP payload generated by the mobile device's software application 318. The tunneling mediator can then send the TCP payload to a URL/port (obtained from the relevant tunnel definition 228) of the requested enterprise resource 130 (e.g., a server port of the server on which the requested enterprise resource 130 is installed). In the above example, the extracted TCP payload contains the higher level protocols, HTTP and SOAP. In certain embodiments, the encapsulation protocol uses Secure Sockets Layer (SSL) over HTTPS to form the tunnel.
The illustrated logging steps 608 and 616 of
Application tunnels as described above can also be used for purposes other than accessing enterprise resources 130. For example, as described below in connection with
Another use of an application tunnel involves so-called “web filtering” or “content filtering,” in which an enterprise may wish to restrict the network sites (e.g., websites) or other online information resources that a mobile device 120 is authorized to access. Using an application tunnel to perform content filtering can be implemented with features related to modifying a pre-existing mobile application, and/or through the use of a secure web browser as described below. Access can be authorized, for example, at all times, only during business hours, etc. In certain embodiments, the enterprise agent 320 is configured to redirect intranet and/or Internet requests generated by the mobile device 120 (e.g., a URL entered into a web browser, or an HTTP request generated by the web browser, for an information resource available on the world wide web) through an application tunnel to a content-filtering server associated with the enterprise. The content-filtering server acts as a tunneling mediator, and inspects each request to determine whether the requested site is authorized by the enterprise. For example, the content-filtering server can maintain a list of sites that are “blacklisted” by the enterprise, and can deny requests to access blacklisted sites. In certain embodiments, this determination may be based on the specific mobile device 120 and user 115 making the request (e.g., based on user role 206). The content-filtering server can be located within or outside of the enterprise system 110, and could be a third-party server operated at least partially for the benefit of the enterprise. If the request is authorized, the content-filtering server can send the request to a server associated with the authorized site to be accessed by the mobile device 120. The content-filtering server can be configured to modify the request to strip away any headers that were produced by the enterprise agent 320 to form an application tunnel with the content-filtering server (according to the encapsulation protocol). The server associated with the requested site can then receive the request in a form as though it was never sent to the content-filtering server.
In this embodiment of
One potential problem with this approach is that some application servers, such as Microsoft SharePoint, will reject the request if the hostname is incorrect. To address this issue, the enterprise agent 320, in some embodiments, replaces the hostname (localhost:XXX) in the intercepted request with the correct hostname of the target application server 2500. This involves modifying the relevant HTTP header or headers of the original HTTP request received from the mobile application, and then sending the modified HTTP request via the application tunnel. In other embodiments, the task of replacing the hostname is instead performed by the mobile device management system 126 upon receiving and extracting the encapsulated HTTP request.
The process by which HTTP requests are intercepted and modified in the configuration of
Referring again to
In event D of
Use of Mobile Device Management System to Regulate Mobile Device Access to Enterprise System
If the mobile device management system 126 is used as a tunneling mediator for application tunnels between mobile devices 120 and enterprise resources 130, the system 126 can be configured to regulate the devices' access to the resources 130. The system 126 can be configured to read information from the application tunnel request headers or bodies, compare it to the mobile device data 204 (
As noted above, in some embodiments the tunneling mediator 224 is positioned outside of the enterprise system 110 (e.g., in a cloud-computing system as in
Examples of Policies for Controlling Mobile Device Access to Enterprise System Resources
There are many possible cases in which an enterprise may wish to regulate or restrict mobile device access to enterprise resources 130 based on mobile device properties and/or properties of users 115 assigned to the mobile devices 120. Several of these “use cases” are now described. For clarity, the use cases are enumerated below. Also, for simplicity, the use cases are described in the context of access policies 218 stored in the mobile device management system 126. As discussed above, the system 126 can be a provider 408 of gateway rules 404 to the secure mobile gateway 128, and/or can regulate mobile device access to enterprise resources 130 via application tunnels. However, it will be appreciated that such gateway rules 404 could be created and given to the gateway 128 by any other provider 408.
Skilled artisans will understand that the following examples represent only a small portion of the full range of possibility for how enterprise access can be regulated using the disclosed components and/or processes. For instance, it will be appreciated that the access policies 218 can depend on any combination of user 115 properties, mobile device 120 properties (e.g., device properties 208), the specific enterprise resources 130 for which access is being requested, and other information, and that the specific examples provided below are merely illustrative and far from exhaustive. Further, it will be understood that some use cases can be combined.
Use Case 1: One or more of the access policies 218 may require that the mobile device 120 requesting access (the “access-requesting device”) is enrolled with the mobile device manager 202. This helps to prevent giving enterprise resource access to people who are not associated with the enterprise.
Use Case 2: One or more access policies 218 may require that the access-requesting device 120 be a certain device type (e.g., iPhone™, Windows Mobile™, etc.)
Use Case 3: One or more of the access policies 218 may require that the access-requesting device 120 have certain settings, such as being password-protected. This helps to prevent giving enterprise resource access to people who are not associated with the enterprise (e.g., are not users 115) but somehow obtain a mobile device 120 (e.g., a device 120 that is misplaced or lost by the assigned user 115) and attempt to access the enterprise system 110.
Use Case 4: One or more of the access policies 218 can require that the access-requesting device 120 use a current operating system version.
Use Case 5: One or more of the access policies 218 can require that the access-requesting device 120 complies with a security requirement (e.g., an antivirus requirement) of the enterprise. If a mobile device 120 is not security-compliant (e.g., does not have up-to-date antivirus software installed or has not conducted a sufficiently recent auto-scan of its files, data, or applications for viruses), then permitting the device 120 to access an enterprise resource 130 may cause the virus to infect the resource 130, potentially jeopardizing the operability of the enterprise system 110 or at least the specific resource 130 to which access is given. Hence, these types of access policies 218 can prevent such undesirable outcomes.
Use Case 6: One or more of the access policies 218 can require that the access-requesting device 120 not be “jailbroken.” Jailbreaking is a process that allows a mobile device 120 to gain full access (“root access”) to unlock all features of its operating system, thereby removing limitations that may be imposed by the device manufacturer. Once jailbroken, a mobile device 120 may be able to download previously unavailable applications and extensions. Jailbreaking a mobile device 120 can give access to its root file system, allowing modification and installing third-party software components. Hence, a jailbroken device is often one in which security protections are removed. Thus, preventing jailbroken devices from accessing enterprise resources 130 further protects the enterprise system 110 from security threats and vulnerabilities.
Use Case 7: One or more of the access policies 218 can require that the access-requesting device 120 not have any unauthorized applications installed. In this example, an “unauthorized application” can be a software application that is not authorized to be installed on the access-requesting device 120, and/or on a particular group of devices 120 of which the access-requesting device is a member.
Use Case 8: One or more of the access policies 218 can require that the user 115 assigned to the access-requesting device 120 have one or more predefined roles 206 associated with the enterprise. For example, an access policy 218 can deny mobile device access to one or more of the enterprise resources 130 for mobile devices 120 assigned to users 115 having roles 206 that are not related to sales, engineering, or upper management.
Use Case 9: One or more of the access policies 218 can depend on which particular enterprise resources 130 are being requested to be accessed by an access-requesting device 120. For example, the conditions for which an enterprise may grant mobile device access to a CRM resource may be different than the conditions for which an enterprise may grant access to a product information database. Accordingly, different access policies 218 can be created and used for different enterprise resources 130. In addition to depending on the requested enterprise resource(s) 130, an access policy 218 can require that the user 115 assigned to the access-requesting device 120 have certain properties, such as a specific role 206 (as in Use Case 8 described above) or another status indication. For example, for a CRM resource 130, an enterprise may wish to grant mobile device access only to users 115 with roles 206 involving sales or upper management. In that case, an access policy 218 for the CRM resource 130 may require that the user 115 assigned to the access-requesting device 120 have a sales or upper management role 206, and the mobile device manager 202 can be configured to deny access requests from mobile devices 120 assigned to users without those roles 206. An access policy 218 can further require that the user 115 assigned to the access-requesting device 120 be in good standing with the enterprise (e.g., users 115 whose employment is not terminated and who are not on a probationary status).
Meta-Application
Referring again to
Inputs (e.g., features) to the logic rules used by the meta-application 150 to detect problems can come not only from the “backend” of the enterprise system 110 (the portion of the system 110 behind the internal firewall 124), but also from other sources, such as the secure mobile gateway 128, the enterprise agents 320 on the mobile devices 120, or an application tunnel mediator, such as embodiments of the mobile device management system 126. For example, an input to a logic rule can be a grant or denial of a mobile device's access request 402 by the secure mobile gateway 128. For instance, a logic rule can define a particular problem, at least in-part, as the denial by the gateway 128 of enterprise system access to a mobile device 120 used by the CEO of the enterprise. If the CEO is denied access, data indicative of this event satisfies this portion of the logic rule. In another example, an input to a logic rule can be data indicating that a user 115 has downloaded greater than a certain threshold amount of data within a specified time period. Such data could be provided to the meta-application 150 by an application tunnel mediator. In still another example, an input to a logic rule can be data indicative of the device's configuration or performance, such as data indicating that a user 115 has installed a certain software application on the user's mobile device 120. Such data could be provided to the meta-application 150 by the enterprise agent 320 of the user's device 120.
In certain embodiments, one type of remedial action defined by a logic rule used by the meta-application 150 can be the creation of a new gateway rule 404 or the modification of an existing gateway rule 404, along with sending the new or modified gateway rule to the secure mobile gateway 128. In this manner, the meta-application 150 can be configured to programmatically control the gateway 128 to block mobile device access requests in an automated fashion. Another type of remedial action can be the creation of a new access policy 218 or the modification of an existing access policy 218, along with sending the new or modified policy to the mobile device management system 126. Another type of remedial action can be the creation of a mobile device rule 214 or the modification of an existing mobile device rule 214, along with sending the new or modified mobile device rule to the mobile device management system 126 and/or one or more of the mobile devices 120. Another type of remedial action can be to send a command directly to one or more of the mobile devices 120, for execution by the enterprise agent 320. In this manner, the meta-application 150 can effectively execute actions on the devices 120, such as wiping data or applications from the devices 120, locking (i.e., preventing usage of) the devices 120, preventing certain applications installed on the devices from running, turning device features on or off, adjusting device settings, and the like.
In the embodiment of
In the illustrated embodiment, the enterprise system 110 includes one or more computer servers 802, which can include some or all of the elements shown in the systems 110 of
In the illustrated embodiment, the meta-application agent 804 includes an enterprise modeling processor 806, a telemetry processor 808, a feature detector 810, and a remedy agent 812. These components are now described.
The enterprise modeling processor 806 can be configured to access and/or obtain information from the server 802, which is needed or useful for constructing a queriable model 814 of the enterprise system. The enterprise model 814 can describe the hardware, software, and/or firmware of the enterprise system 110, and can include, for example, configuration information, registry data, database information, and other information useful for evaluating logic rules 818. The enterprise model 814 can comprise an object graph, with the objects representing hardware, software, firmware, relationships therebetween, and the like. Exemplary methods and approaches to modeling are described in Qureshi '536, particularly the sections relating to “discovery” and “application models.” Each enterprise modeling processor 806 can be configured to construct a model of the particular server 802 on which it is installed. The cloud-based meta-application portion can be configured to receive data from the enterprise modeling processors 806 and use the data to construct the overall enterprise model 814. The enterprise modeling processors 806 can be configured to send new data to the cloud-based meta-application portion on an ongoing basis, to support dynamic updating of the enterprise model 814. Finally, it will be appreciated that the enterprise agents 320 of the mobile devices 120 can also be configured to conduct discovery of information about the devices 120 and send the discovered information to the enterprise model 814, and the enterprise model 814 can thereby model one or more of the devices 120 as well as the enterprise system 110. In other words, agents 320 can include enterprise modeling processors 806 or similar functionality.
The telemetry processor 808 can be configured to receive, from the cloud-based meta-application portion 151, requests for specific data about the server 802 on which it is installed. The telemetry processor 808 can be configured to respond to such a request by gathering the requested data (referred to herein as “telemetry”) and providing it to the feature detector 810 for analysis. The telemetry can comprise many different types of data about the hardware, software, and/or firmware of the enterprise system 110, including without limitation configuration data, performance data, data about the mobile devices 120, and data from or about the mobile device management system 126, secure mobile gateway 128, and enterprise resources 130. Telemetry can comprise “state metric data,” as described in Qureshi '536. State metric data can comprise raw time-varying data indicative of a state of the server 802 or any component thereof. It will be appreciated that the enterprise agents 320 of the devices 120 can also be configured to gather device data based on requests for same from the meta-application portion 151, and to send the gathered telemetry to a local feature detector 810 or back to the meta-application portion 151. In other words, agents 320 can include telemetry processors 808 or similar functionality.
The feature detector 810 can be configured to analyze the telemetry received from the telemetry processor 808, to detect features of the logic rules 818. The features can be defined within a telemetry query that the cloud-based meta-application portion sends to the meta-application agent 804. Performing feature detection at least partly within the enterprise system 110, as opposed to within the cloud 156, can significantly reduce the bandwidth for communications between the meta-application agent 804 and the cloud 156, because not all of the telemetry is sent to the cloud 156 in certain applications. For instance, the meta-application agent 804 can merely send the detected features to the cloud 156. Skilled artisans will understand that a feature can be much less data-intensive than the raw telemetry from which the feature is detected. For example, a feature can simply be an indication that a particular condition is true. In an alternative embodiment, the feature detector 810 resides within the cloud 156, and the telemetry processor 808 can send some or all of the gathered telemetry to the cloud for feature detection. It will be appreciated that the enterprise agents 320 of the mobile devices 120 can also be configured to analyze telemetry gathered in response to a request from the meta-application portion 151, in order to detect features of the logic rules 818 and send those features back to the meta-application portion 151. In other words, agents 320 can include feature detectors 810 or similar functionality.
The remedy agent 812 can be configured to execute remedial actions 820 on the server 802 on which it is installed. The meta-application agent 804 can receive remedial actions 820 from the cloud-based meta-application portion. Although not shown in
Referring still to
The telemetry monitor 822 can manage communications between the cloud-based meta-application portion and the meta-application agents 804, as well as any other components that provide data that the cloud-based meta-application portion can use to evaluate the logic rules 818, such as the enterprise agents 320 of the mobile devices 120, the mobile device management system 126, and the secure mobile gateway 128. Hence, the telemetry monitor 822 can receive features detected by the feature detectors 810, and can provide the features to the inference engine 824. The telemetry monitor 822 can be configured to prioritize incoming features and other data, so that more important or urgent information is passed on to other components of the meta-application before less important or less urgent information.
The inference engine 824 can be configured to access the repository 816 of logic rules 818 and evaluate whether individual rules 818 are satisfied by features of the deployment, wherein each satisfied rule corresponds to the detection of at least one problem. A logic rule 818 can include queries for information, such as a telemetry query or an enterprise model query. The inference engine 824 can be configured to process these queries of the logic rules 818 by querying the enterprise model 814 or relevant ones of the meta-application agents 804 for the needed information (e.g., features of the rule). The inference engine 824 can also be configured to perform root cause analysis to detect root causes of problematic behavior of the enterprise system 110. A root cause can be an object of the enterprise model 814, which represents a component of the enterprise system 110. The inference engine 824 can be configured to employ rule evaluation methods and root cause analysis methods as taught in the '536 Qureshi patent (refer to discussions of “Problem Logic” and root cause analysis, respectively). The inference engine 824 can further be configured to log detected problems and root causes in a repository 826.
The user interface 828 can allow administrators to interact with the cloud-based meta-application portion. The illustrated user interface 828 comprises a web server interface to facilitate access over the Internet. The user interface 828 can also include a server terminal interface as well.
The notification manager 830 can be configured to send notifications to administrators about information detected or computed by the meta-application, such as problems and root causes. Notifications can comprise, for example, emails, voice messages, SMS text messages, and the like. Preferably, the notification manager 830 allows an IT administrator to set and adjust the criteria under which the notification manager 830 sends notifications.
The remedy workflow module 832 can be configured to select remedial actions 820 for attempting to solve or counter problems or root causes detected by the inference engine 824. The remedial actions 820 can be stored in the repository 816 of logic rules 818. A remedial action 820 can be stored in association with one or more of the logic rules 818. The remedy workflow module 832 can be configured to determine an optimal sequence of execution of remedial actions 820 associated with the detected problems or root causes. The remedial actions 820 can be abstract or generalized for many different types of managed computer systems 110. In that case, the remedy workflow module 832 can be configured to customize the remedial actions 820 into plans that are tailored for the specific enterprise system 110 and mobile devices 120 managed by the meta-application. The remedy workflow module 832 can be configured to send the customized plans and/or other instructions to the remedy agents 812 of the meta-application agents 804, to similar remedy agents of the mobile device management system 126 and secure mobile gateway 128, or to the enterprise agents 320 installed on the mobile devices 120. These remedy/enterprise agents can be configured to execute the plans and/or other instructions on such systems and devices. A plan can require human (e.g., an IT administrator) confirmation of plan steps at stages of the plan. A plan can also be designed to be executed by the remedy agent 812 without human intervention or approval.
The meta-application 150 of
Meta-application components installed on the mobile devices 120 (e.g., within the enterprise agents 320 or separately) can be configured to collect state metric data from the devices 120 and send the data back to the cloud-based meta-application portion 150 and/or the enterprise system 110. Such data can be collected regularly (e.g., periodically) or upon specific request by the cloud-based or enterprise system-based meta-application portions. Such data can be analyzed (e.g., by the inference engine 824 using the logic rules 818) to diagnose problems involving the devices 120, and to select remedial actions for addressing such problems. Such analysis can be conducted even if there is no currently available connection to the device 120.
Persons of ordinary skill in the art will understand that the meta-application can be configured to enforce and implement a wide variety of different types of logic rules 818 and remedial actions 820 involving the mobile devices 120. For example, a logic rule 818 can define a problem as the downloading of more than a particular threshold amount of data to a mobile device 120. The enterprise backend portion of the meta-application can detect the throughput of data downloaded to a user's device 120 and determine if it exceeds the threshold defined in the rule 818. A remedial action 820 associated with the rule 818 can require the disabling of the mobile device 120, or perhaps merely the disabling of the device's ability to download data. Such remedial actions 820 may involve the meta-application sending to the device's enterprise agent 320 a command or script configured to enforce the remedy. Alternatively, the remedial action 820 can require the revocation of the mobile device's certificate by the mobile device management system 126. Still further, the rule 818 can revoke the device's permission to use application tunnels for communicating with enterprise resources 130 or other network resources.
In another example, the meta-application 150 can be configured to create gateway rules 404 based at least partly on the time(s) at which a mobile device 120 was “wiped” (e.g., deletion of some or all data stored on the device or removal of software application(s) from the device).
In an embodiment in which the meta-application 150 is configured to manage Microsoft Exchange™, the meta-application 150 can have full visibility into the ActiveSync partnership data for the mobile devices 120 associated with the enterprise. The meta-application 150 can use the ActiveSync partnership data to generate gateway rules 404 that filter mobile device access requests 402 based on such data. For example, the ActiveSync partnership data includes the ActiveSync DeviceID's of the mobile devices 120. The meta-application 150 can use this information to generate gateway rules 404 that filter access requests 402 based on the known DeviceID's.
Device-Resident Management System
In certain embodiments, an enterprise may wish to regulate the settings, applications, uses, other activities, or any combination thereof associated with the mobile devices 120 used by the enterprise's users 115. This can safeguard against threats to the security of enterprise data and resources and/or to address productivity risks—the risk of users using their mobile devices 120 in ways that can negatively affect user productivity in meeting the user's duties toward the enterprise. Such embodiments are now described.
With continued reference to
The mobile device rules 214 can be relatively simple, taking the form of, for example, IF-THEN statements and/or simple declarative logic rules. In other embodiments, the mobile device rules 214 can be much more complex, such as the logic rules described in Qureshi '536, which describes logic rules that are configured to be used to generate virtual circuits that have atomic gates and downstream operator gates. The mobile device rules 214 can include metadata for calculating various parameters associated with the rules and related problems, such as a confidence value indicative of a confidence in the detection of the problem associated with a mobile device rule 214, for example, as taught by Qureshi '536.
In some embodiments, a mobile device rule 214 has the following format:
The rule name can be a name of the particular mobile device rule 214. If the rule 214 is encrypted, the security key can allow the enterprise agent 320 to decrypt the rule body. The authentication information can include data concerning the applicability of the rule to the mobile device 120. The enterprise agent 320 can use the authentication information to determine whether the rule 214 can run on the mobile device 120. The rule body includes the underlying logic of the rule, and is the part that the enterprise agent 320 evaluates in order to detect problems and execute one or more associated remedial actions 216.
In certain embodiments, a mobile device rule 214 maps one or more mobile device state metric data values to one of a plurality of the aforementioned problems indicative of security risks and/or productivity risks to which the devices 120 can expose the enterprise. A “state metric” can be any data item indicative of a mobile device state, such as error log entries, records of activations of device features, operating system version, installed software applications 318 (including applications that the enterprise may have “blacklisted” as not being authorized for installation), whether the mobile device 120 is roaming, a battery level of the mobile device 120, a signal strength of a signal received by of the mobile device 120, available memory of the mobile device 120, etc. For example, a “state metric” can be a metric that indicates whether a mobile device feature (e.g., a camera, web browser, password-protection, etc.) has been activated. Another example of a state metric is an indicator of whether the mobile device's SIM card is properly engaged with the mobile device 120. Other examples of state metrics will be apparent from the examples of mobile device rule applications provided below.
With continued reference to
In certain embodiments, the mobile device rules 214 and their associated remedial actions 216 are organized into separate “rule packages,” each rule package including one or more of the rules 214 and preferably the rules' associated remedial actions 216. Each rule package can be designed or customized for users 115 with specific types of user roles 206 and/or mobile device properties 208. Accordingly, each rule package can be associated with one or more of the user roles 206, and/or with one or more of the mobile device properties 208. For example, a rule package of mobile device rules 214 and associated remedial actions 216 can be prepared for all users 115 having roles 206 that that are sales-oriented (e.g., all sales people of the enterprise). As another example, one rule package can be prepared for people using iPhones™ and another rule package can be prepared for people using Android™ devices. If it is desired to differentiate the permissible activities associated with mobile device users 115 having a given role 206, based on differences in their mobile device properties 208, then different rule packages of mobile device rules 214 and associated remedial actions 216 can be formed for the different types of mobile devices 120. For example, an enterprise can form one rule package of mobile device rules 214 and remedial actions 216 for sales people using iPhones™, another rule package of mobile device rules 214 and remedial actions 216 for sales people using Android™ devices, and so on. In this manner, rule packages can be customized as desired for different user roles 206 and/or mobile device properties 208.
It will be appreciated that different mobile device rule packages can share common mobile device rules 214 and/or remedial actions 216. For example, suppose that a first mobile device rule and an associated remedial action is suitable for sales people and corporate board members, and a second mobile device rule and associated remedial action is only suitable for sales people. A rule package for users 115 that are sales people can include the first and second mobile device rules and their remedial actions, while a mobile device rule package for users 115 that are board members of the corporate enterprise may include the first mobile device rule and remedial action but not the second mobile device rule and remedial action. Many other examples are possible and are in accordance with the principles and advantages described herein.
The mobile device manager 202 is preferably responsible for sending appropriate rule packages to the mobile devices 120, based on, e.g., the properties 208 of the mobile devices and/or the roles 206 of the users 115 assigned to the mobile devices. In certain embodiments, a deployment rule is associated with each rule package or individual mobile device rule 214 and associated remedial actions 216. The mobile device manager 202 can be configured to use the deployment rule to determine which mobile devices 120 to send the rule package or individual mobile device rule 214 and associated remedial actions 216. A deployment rule can cause the mobile device manager 202 to access the mobile device information 204 to identify the mobile devices 120 whose assigned users 115 have a role 206 associated with a given one of the rule packages or rules, and/or the mobile devices 120 whose properties 208 are associated with the given rule package or rule. Further, the mobile device manager 202 can be configured to send the given rule package (including mobile device rules 214 and/or remedial actions 216) to the identified mobile devices 120. In this manner, the mobile device manager 202 can send the appropriate mobile device rule package(s) to each mobile device 120.
For example, suppose that a new mobile device user 115 (e.g., a new employee) joins the enterprise. The new user's role information 206 and/or mobile device properties 208 can be entered (by administrators and/or by a computer-automated process) into the enterprise's mobile device information 204. In one embodiment, the user's role information 206 is entered into an RBAC system of the enterprise, and a software module (such as the mobile device manager 202) transfers the role information 206 to the mobile device information 204. In another embodiment, the user role information 206 of the mobile device information 204 is an RBAC role repository that directly supports an RBAC system. The mobile device manager 202 can be configured to use the new user's role information 206 and/or mobile device properties 208 to determine an appropriate mobile device rule package to send to the new user's mobile device 120. In another embodiment, the mobile device information 204 does not come from or support an RBAC system.
In another example, suppose that an enterprise modifies its policies regarding a particular group of mobile device users 115. IT personnel can modify a mobile device rule package customized for the particular user group. This can include creating new mobile device rules 214 for the rule package, deleting rules 214 from the rule package, and/or modifying some of the rules 214 of the rule package. Alternatively or additionally, modifying the mobile device rules package can include creating, deleting, and/or modifying remedial actions 216 of the rules package. The mobile device manager 202 can send the updated mobile device rule package to each of the mobile devices 120 of the users 115 of that particular group.
In many cases, the updated mobile device rule package may be fairly similar to older mobile device rule packages that have already been sent to the users' mobile devices 120. In such cases, the mobile device manager 202 can be configured to send only the new and/or modified mobile device rules 214 and/or remedial actions 216 to each mobile device 120, along with instructions for deletion of those rules 214 and/or actions 216 that have been deleted from the rule package, such instructions being carried out by the enterprise agent 320 of each mobile device 120. In this manner, the mobile device manager 202 can be configured to send mobile device rule package updates to the mobile devices 120.
In certain embodiments, the enterprise agent 320 is configured to implement and/or execute the mobile device rules 214 on the mobile device 120. Accordingly, the enterprise agent 320 is preferably configured to receive (e.g., via the network interface 310) mobile device rules 214 and/or remedial actions 216 from the mobile device management system 126 associated with the enterprise, and store the received rules 214 and/or remedial actions 216 in a computer-readable storage of the mobile device 120, such as the hard drive 306 or a memory card inserted into the memory card port 307. The enterprise agent 320 can be configured to receive and store the aforementioned mobile device rule packages and rule package updates from the mobile device management system 126 and store them on the hard drive 306 or memory card. In the illustrated embodiment, the hard drive 306 stores a plurality of mobile device rules 214 and remedial actions 216. In some embodiments, the enterprise agent 320 is configured to separately store the mobile device rules 214 and remedial actions 216 of the rule packages and/or rule package updates. In other embodiments, the mobile device rules 214 and their corresponding remedial actions 216 are stored together in association with one another. In some embodiments, a mobile device 120 can receive mobile device rules 214 and/or remedial actions 216 from sources other than the mobile device management system 126.
With continued reference to
Some remedial actions 216 can comprise producing an alert, such as a message delivered to the user 115 of the mobile device 120. The message can include text, images, audio, and/or video. The enterprise agent 320 can be configured to produce the message and convey the message to the user 115 via the user interface 304, such as displaying the message on the screen 326 and/or playing an audible message using the speaker 328. The message can comprise information about a detected problem, and/or instructions to the user 115 to execute an action on the mobile device 120, such as activating or deactivating a feature of the device 120. The message can be statically defined in the remedial action 216. Alternatively, the message can be defined using variables that can be bound to actual data values when evaluating a mobile device rule 214 (e.g., by the resolution of queries), for example, as taught in Qureshi '536. This can allow the enterprise agent 320 to customize the message to the specific circumstances of the device 120. Further, any remedial action 216 instructing the agent 320 to produce such a message can further include instructions for actions to be conducted by the enterprise agent 320 if the user 115 (or other person handling the mobile device 120) does not execute the action instructed by the message. For example, the remedial action 216 can cause the enterprise agent 320 to conduct the action if the user 115 does not execute the instructed action within a time period defined in the remedial action.
An enterprise can vary the punitiveness of the remedial action 216 to be applied for a detected problem or violation of a mobile device rule 214 based on properties of the mobile device 120 and/or its user 115. For instance, it may be desirable to vary the remedy based on the role 206 of the user 115. In one example, an enterprise may wish to apply less stringent remedial actions for higher level executives of an enterprise.
As noted above, some remedial actions 216 can comprise an action (other than generating and conveying a message to the user) executed by the enterprise agent 320 on the mobile device 120. In certain embodiments, the remedial actions 216 can comprise actions that the mobile device 120 is already designed to conduct, such as activating or deactivating certain mobile device features, adjusting device settings, and the like. In such cases, the enterprise agent 320 can be configured to use the mobile device's API's to conduct such remedial actions 216.
In some embodiments, the enterprise agent 320 includes a scripting engine 322, and at least one of the remedial actions 216 comprises a script that the scripting engine 322 is configured to execute on the mobile device 120. The scripts can be written in a scripting language associated with the mobile device 120, which can be a command set targeted at controlling the device hardware, software, and/or operating system. The scripting engine 322 can be configured to interpret a script, and/or to convert the script to a bytecode or other form that can be interpreted relatively quickly. In some cases, the mobile device management system 126 (or another component of the enterprise system 110) can include one or more script-creation tools or applications 220 that assist IT personnel in the creation of the scripts.
In some embodiments, a script can have the following high-level format:
In this example, the script imports a library of code (“android”) associated with the Android™ operating system, as well as a library of compiled code (“zenlib”) that interprets the rule body and decryption and authentication information. For example, the “zenlib” code can be configured to interpret logical, mathematical, and/or Boolean operators such as “AND,” “OR,” “THEN,” “LESS THAN,” “MORE THAN,” etc.
From the various use cases described below, it will be appreciated that it is possible to provide many different types of mobile device rules 214 that cause the enterprise agent 320 to detect and guard against various types of problematic events associated with the mobile device 120. It is also possible to provide many different types of corresponding remedial actions 216 that cause the agent 320 to react to such problematic events by conducting various types of actions, such as restricting network communications, enforcing password-protections, sending reports back to the enterprise system 110 (e.g., reports of data content stored on the mobile device 120, data usage on the device 120, applications 318 running on the mobile device 120, and many other types of information), deleting data from the device 120, uninstalling applications 318 from the mobile device 120, and many other actions.
The use of mobile device rules 214, remedial actions 216, and/or scripts to be run by the scripting engine 322 can be leveraged to conduct compliance audits of mobile devices 120. In certain embodiments, an enterprise system 110 can be configured to cause the enterprise agents 320 of all or just some of the mobile devices 120 enrolled with the mobile device manager 202 to run one or more mobile device rules 214 at the request of the enterprise.
For example, suppose that the enterprise learns of a new computer virus to which the enterprise's mobile devices 120 may be particularly vulnerable. In such a case, the enterprise's IT personnel can cause the mobile device manager 202 to send instructions to the enterprise agents 320, for example, to run a particular mobile device rule 214 that scans for the new virus or simply determines whether the mobile device 120 is using the latest antivirus software updates.
In some cases, the enterprise's IT personnel can cause the mobile device manager 202 to send one or more “special” mobile device rules 214 to the mobile devices 120. In certain instances, the special mobile device rules 214 can be sent with instructions for the enterprise agents 320 to immediately determine whether the mobile devices 120 comply with these rules. Also, the special mobile device rules 214 can be sent with associated remedial actions 216, and it will be understood that different types of these special mobile device rules 214 and remedial actions 216 can be sent to different types of mobile devices 120. The mobile device manager 202 can send a special mobile device rule 214 to all of the mobile devices 120 whose assigned users 115 have particular roles 206. These special mobile device rules 214 may or may not be the same as the mobile device rules 214 and remedial actions 216 provided within the customized rule packages described above.
Upon receipt of such a special mobile device rule 214 and possibly a special remedial action 216, or upon receipt of instructions to run a mobile device rule 214 already stored on the mobile device 120, a mobile device's enterprise agent 320 can be configured to immediately determine whether the mobile device 120 is in compliance with the rule 214. If the mobile device 120 is not in compliance, the enterprise agent 320 can be configured to simply implement the special remedial action 216.
Alternatively or additionally, the agent 320 can be configured to send a compliance report to the mobile device manager 202, detailing the results of running the special mobile device rule 214 (e.g., a report detailing compliance or non-compliance with the rule, and/or a degree of compliance). The mobile device manager 202 can be configured to use these reports for various purposes. For example, the mobile device manager 202 can respond to the reports by sending, only to those mobile devices 120 that are not in compliance with the executed mobile device rule(s), (1) instructions for the agent 320 to run one or more additional mobile device rules 214 and, if the mobile device 120 is not in compliance with the additional mobile device rules 214, one or more additional remedial actions, or (2) additional special mobile device rules 214 and/or special remedial actions 216. These additional mobile device rules 214 can check for other forms of non-compliance, based on the assumption that a mobile device 120 that does not comply with one mobile device rule 214 is more likely to be out of compliance with other mobile device rules 214.
Example Use Cases for Device-Resident Management System
There are numerous possible “use cases” for which an enterprise may wish to use a mobile device rule 214 and an associated remedial action 216 on a mobile device 120. Examples of such use cases are now described. It will be understood that the following examples are not exhaustive, and that many different types of mobile device rules 214 and associated remedial actions 216 can be used for many different purposes. Further, skilled artisans will understand that a remedial action described below for a particular use case can be alternatively be executed for any other mobile device rules, problems, or use cases, as may be desired by the enterprise. Some of the use cases described below contain one or more sub-cases, also described below. Finally, some of these use cases overlap in certain ways.
Use Case 1: One possible use case involves a situation in which a mobile device 120 is lost or stolen from its assigned user 115 (
Use Case 2: This use case relates to Use Case 1. A thief can prevent a wireless command, sent from the enterprise system 110, from reaching the mobile device 120 by removing the device's SIM card (or, depending on the mobile device 120, a similar or equivalent card that securely stores, e.g., the service-subscriber key (IMSI) used to identify a subscriber on the mobile device 120) from the SIM card port 312, which can effectively disable the connectivity of the mobile device 120 to the carrier network 125. In such an instance, the enterprise may be prevented from deleting the data from the device 120, and the thief may be able to access the data. This problem can be addressed by providing a mobile device rule 214 that the enterprise agent 320 uses to detect the disengagement of the SIM card from the SIM card port 312 of the device 120. In this use case, the agent 320 can execute a remedial action 216 that comprises producing a message delivered via the user interface 304, the message instructing the person using the device 120 (e.g., the user 115 or a thief) to reengage the SIM card with the SIM card port 312. For example, the message can instruct the person to reengage the SIM card with the SIM card port 312 within a specified time period (e.g., five minutes), or all of the data on the mobile device 120 (or just the enterprise-related data) will be deleted. In that case, the agent 320 can be further configured to delete the data if the SIM card is not reengaged within the specified time period. Alternatively or additionally, an encryption key used to decrypt the enterprise data can be invalidated or deleted as a remedial action associated with problems related to the SIM card disengagement.
Use Case 3: The enterprise agent 320 can use a mobile device rule 214 to detect a problem defined as the disablement of password-protection for the mobile device 120. A corresponding remedial action 216 can cause the agent 320 to produce a message on the user interface 304, the message instructing the user 115 to activate password-protection on the device 120, perhaps within a specified time period. The remedial action 216 can further include instructions for the agent 320 in the event that password-protection is not activated, such as disabling the mobile device 120, deleting enterprise-related data from the device 120, decommissioning the device 120 (e.g., revoking its certificate and/or terminating its enrollment with the mobile device manager 202), and the like. It will be understood that deleting data from the mobile device 120 (in the context of this use case or any other) can include permanently deleting the data or, alternatively, merely deleting pointers to the data or deleting and/or invalidating data decryption keys. In a related example, a mobile device rule 214 can require the user 115 to change the password periodically, such as every 90 days.
Use Case 4: The enterprise agent 320 can use a mobile device rule 214 to detect a problem defined as the mobile device 120 being located outside of an authorized geographical zone, or the device being located within an unauthorized geographical zone. A geographical zone can be specified in a variety of different ways, such as by inputting a location (e.g., on a map, or longitude/latitude values), a shape and size of the geographical zone, and a positional relationship between the inputted location and the shape of the zone. For example, a circular zone centered about the inputted location can be defined by specifying a radius of the geographic circle. A mobile device rule 214 can also include time ranges (hours, days, etc.) within which the restriction applies. The agent 320 can detect the location of the device 120 using the GPS chip 316.
A corresponding remedial action 216 can cause the agent 320 to produce a message delivered via the user interface 304, the message instructing the user 115 to return the device 120 to the authorized geographical zone or leave the unauthorized zone, for example, within a specified time period. The remedial action 216 can further include instructions for the agent 320 in the event that the device 120 is moved as instructed, such as disabling the mobile device 120, disabling features or software applications (e.g., the camera, Bluetooth connectivity, Wi-Fi connectivity, etc.) of the device 120, deleting enterprise-related data from the device 120, and the like. A remedial action 216 can simply send a communication (e.g., SMS text, email) to appropriate authorities of the enterprise, alerting them to the mobile device's location.
Use Case 5: As described above in Use Case 4, mobile device rules 214 can effectively lead to activation or deactivation of mobile device features based on a location of the mobile device 120 (e.g., as determined by using the GPS chip 316) and/or temporal data. The mobile device feature in question can be the user interface 304 (keyboard, touchscreen, etc.), network interface 310, camera 314, microphone 330, USB connection, etc.
Take for example the camera 314. The enterprise agent 320 can use a mobile device rule 214 to detect a problem defined as the mobile device 120 being located within premises of the enterprise with the camera 314 being available for use. An enterprise may wish to prevent use of the camera 314 while the mobile device 120 is within the enterprise premises, to prevent the camera from capturing any sensitive or confidential information, images, or video from within the premises. As used herein, “enterprise premises” can include any buildings, facilities, factories, campuses, design houses, or other structures or areas owned, used, or operated by the enterprise. In one embodiment, a remedial action 216 corresponding to this problem can cause the agent 320 to deactivate or disable the camera 314 without the user's consent. In another embodiment, a remedial action 216 corresponding to this problem can cause the agent 320 to produce a message delivered via the user interface 304, the message instructing the user 115 to deactivate or disable the camera 314, perhaps within a specified time period. The remedial action 216 can further include instructions for the agent 320 in the event that the user 115 does not deactivate or disable the camera 314, such as deactivating or disabling the camera 314 without the user's consent. Preferably, after the remedial action 216 has been executed (and the camera 314 has been disabled), the agent 320 is configured to detect when the mobile device 120 has left the enterprise premises. At that point, the agent 320 can be configured to either reactivate the camera 314 without the user's consent, or produce a message delivered via the user interface 304, informing the user 115 that the user is authorized to reactivate the camera 314.
Use Case 6: Related to Use Case 5, another example of a mobile device “feature” that can be regulated based on mobile device location is a software application 318, such as the device's web browser. For example, the enterprise agent 320 can use a mobile device rule 214 to detect a problem defined as the mobile device 120 being located within premises of the enterprise with the device's web browser being available for use. Corresponding remedial actions 216 can cause the agent 320 to instruct the user to disable the web browser (by producing a message on the user interface 304), or to simply disable the web browser without the user's consent. Then, when the mobile device 120 subsequently leaves the enterprise premises, the agent 320 can be configured to detect this and either inform the user that the web browser can be used or simply re-enable the web browser without the user's knowledge or consent. It will be appreciated that other software applications 318, aside from the web browser, can be regulated similarly.
Use Case 7: Related to Use Cases 4 and 5, upon detecting that the mobile device 120 has entered a defined geographical area (e.g., the enterprise premises), the enterprise agent 320 can be configured to execute a remedial action 216 that causes the agent 320 to require the user 115 to enter a password into the device 120 in order to use certain device features, such as the camera 314 and/or web browser. Such a remedial action may be more appropriate for users 115 whose roles 206 require the users to have access to such features within the geographical area. Once the mobile device 120 leaves the defined area, the agent 320 can be configured to no longer require the password for the user 115 to use such mobile device features.
Use Case 8: A mobile device rule 214 can cause the enterprise agent 320 to disable certain mobile device features (e.g., camera, microphone) based on temporal information (possibly without considering geographical data), such as the time of the day, the day of the week, a date range of the calendar, etc.
Use Case 9: The mobile device 120 can comprise a credit card scanner for use within a store or other retail establishment. When an agent 320 of the scanner detects that the scanner has physically left the store, the agent can execute a remedial action 216 that instructs a user 115 of the scanner to return the scanner to the store, perhaps within a specified time period. The remedial action 216 can further include instructions to delete scanned credit card data from the scanner if the scanner is not returned to the store.
Use Case 10: Another mobile device feature that can be regulated is the device's network connection capability, such as the network interface 310. The enterprise agent 320 can use a mobile device rule 214 to detect a problem defined as the mobile device's use of the network connection capability to connect or attempt to connect to a communication network that is unsecured or blacklisted by the enterprise (e.g., a false base Wi-Fi station). For example, the user 115 may attempt to connect to an unsecured Wi-Fi network or blacklisted cellular service towers, which may expose the mobile device 120 to a security threat. A remedial action 216 can prevent the device 120 from accessing the restricted network(s).
In another embodiment, a remedial action 216 corresponding to this problem can cause the agent 320 to terminate or prevent the mobile device's connection to the unsecured network, without the user's consent. In another embodiment, the remedial action 216 can cause the agent 320 to deactivate the mobile device's network connection capability (e.g., by shutting down the network interface 310), without the user's consent. Such an action may leave one type of network communication capability (e.g., cellular networks, such as 3G or 4G networks) available, while only terminating a network communication capability (e.g., Wi-Fi) associated with the connection to the unsecured network. In another embodiment, the remedial action 216 can cause the agent 320 to produce an audio alert to the user 115 or a message delivered via the user interface 304, the message instructing the user 115 of the device 120 to terminate the connection to the unsecured network, perhaps within a specified time period. In yet another embodiment, the remedial action 216 can cause the agent 320 to produce a message delivered via the user interface 304, the message instructing the user 115 of the device 120 to deactivate the device's network connection capability, perhaps within a specified time period. In embodiments in which the agent 320 produces a message delivered via the user interface 304, the remedial action 216 can further include instructions for the agent 320 in the event that the user 115 does not terminate the connection or deactivate the network connection capability, such as taking one of such actions without the user's consent. In still other embodiments, a remedial action 216 can cause the agent 320 to lock the mobile device 120 to render it unusable, perhaps until the device disconnects from the unsecured or blacklisted communication network.
Use Case 11: An enterprise may wish to regulate which software applications 318 are authorized for installation on a mobile device 120. For example, certain types of software applications 318 can negatively impact a user's productivity (e.g., by distracting the user from his or her duties), while other applications 318 can introduce a security threat (e.g., file-sharing applications that may allow other devices to copy enterprise data stored on the mobile device 120; or a rogue application that has malware or has been determined to collect device data and send the data to a rogue server). The enterprise agent 320 can use a mobile device rule 214 to detect a problem defined as the mobile device 120 having installed a software application 318 that the enterprise has blacklisted (i.e., forbidden for installation) or at least not white-listed (expressly permitted for installation). The agent 320 can be configured to use device-specific API's to determine which applications are installed on the mobile device 120.
Since different mobile device platforms vary as to the ability of an enterprise system 110 to uninstall the unauthorized application 318 without the user's consent, several different remedial actions 216 are possible. In one embodiment, a corresponding remedial action 216 can cause the agent 320 to producing a message on the user interface 304, the message instructing the user 115 to uninstall the unauthorized software application 318 from the mobile device 120, perhaps within a specified time period. The remedial action 216 can further include instructions for the agent 320 in the event that the user 115 does not uninstall the unauthorized application 318, such as disabling the mobile device 120, uninstalling the unauthorized application 318 (e.g., by causing the scripting engine 322 to run a script or plan that uninstalls the application), preventing the unauthorized application 318 from starting or running (e.g., by causing the scripting engine 322 to run a script that terminates one or more processes associated with the unauthorized application 318), deleting enterprise-related data from the device 120 (which can also be achieved by the scripting engine 322 running an appropriate script), sending an alert message (SMS text, email, etc.) to enterprise authorities about the installation of the blacklisted software application, and the like. In another embodiment, a corresponding remedial action 216 can cause the agent 320 to uninstall the unauthorized application 318 from the mobile device 120 without the user's consent. For mobile device platforms that do not permit an enterprise system 110 to uninstall software applications 318 from a mobile device 120 without the user's consent, the enterprise may opt to cause the agent 320 to use the scripting engine 322 to run a script that terminates one or more processes associated with the unauthorized application 318, thereby preventing it from running on the mobile device.
An enterprise can vary the punitiveness of the remedial action based on the role 206 of the user 115 assigned to the mobile device 120 that is running an unauthorized software application 318. For example, consider a corporate enterprise having some users 115 with roles 206 corresponding to high level executives, other users 115 having roles 206 corresponding to mid-level managers, and other users having roles 206 that correspond to lower level employees. For a high level executive whose mobile device 120 has an unauthorized application 318, the agent 320 can implement a remedial action 216 that simply instructs the user 115 to uninstall the application 318. For a mid-level manager whose mobile device 120 has an unauthorized application 318, the agent 320 can implement a remedial action 216 that causes the scripting engine 322 to terminate one or more processes associated with the unauthorized application 318, thereby preventing it from running on the mobile device 120. Moreover, the agent 320 might run such a script only under certain conditions (e.g., when the mobile device is on enterprise premises during normal working hours). Finally, for a lower level employee whose mobile device 120 has an unauthorized application 318, the agent 320 can implement a remedial action 216 that uninstalls the application 318 without the user's consent. Skilled artisans will appreciate that an enterprise can vary its remedial actions in many different ways based on different sets of criteria, and that this is just one example.
The enterprise may allow certain software applications 318 to be installed on a mobile device 120, but only under certain conditions, such as conditions relating to user roles 206 and/or mobile device properties 208. An enterprise may allow users 115 with particular roles 206 to install such applications 318 on their devices 120, while disallowing other users 115 from doing so. An enterprise may allow mobile devices 120 having certain device-types to install particular software applications 318, while disallowing the same for different device types. Prohibitions on the installation of particular software applications 318 on the mobile devices 120 can be regulated in a very flexible and customizable way, by defining appropriate mobile device rules 214.
Use Case 12: Related to Use Case 11, a mobile device rule 214 can define a problem as an attempt to run (as opposed to install) a software application 318 in violation of defined restrictions. Such restrictions can be temporal (the application is allowed to run only during certain times and/or days), geographical (the application is allowed to run only when the mobile device 120 is in one or more defined geographical zones), password-dependent (the application is allowed to run only if the user provides a correct password associated with the application), other types of restrictions or conditions, or combinations thereof.
In one embodiment, the rule 214 includes a list of restricted or blacklisted applications 318, and possibly even a list of unrestricted or white-listed applications 318. The enterprise agent 320 can use an application monitor service 334 (which can be part of the agent 320 itself, or alternatively another part of the mobile device 120, as shown) to detect which applications 318 or processes are running. For example, the Android™ operating system provides a mechanism for collecting and viewing system output, whereby logs from various applications and portions of the system are collected in a series of circular buffers, which then can be viewed and filtered by the “logcat” command. The “logcat” command can be used from an ADB (Android Debug Bridge) shell to read the log messages. Alternatively, Android's Dalvik Debug Monitor Server (DDMS) can automatically report “logcat” information via connection to ADB. Hence, in a mobile device 120 running the Android™ operating system, the enterprise agent 320 can be configured to “listen” to certain “logcat” information and detect the invocation of mobile device applications of interest. It will be appreciated that other mobile device operating systems provide alternative systems and methods for detecting the invocation of mobile device applications.
When the agent 320 determines that an application 318 is invoked, the agent 320 determines if the application is blacklisted (or white-listed). If the application 318 is white-listed or at least not blacklisted, the agent 320 allows the application to run. If the application 318 is blacklisted (or perhaps, more strictly, not white-listed), the agent 320 can use the rule 214 to determine the defined restriction(s) for the application and whether the restrictions apply. For example, if a restriction is temporal, the agent 320 can determine if allowing the application to run currently would violate the temporal restriction. If a restriction is geographical, the agent 320 can determine if the device 120 is in a restricted geographical zone. If a restriction is password-dependent, the agent 320 can invoke a password input activity (which can be part of a remedial action 216) that prompts the user 115 for a password associated with the application 318. If any of the restrictions is violated (e.g., unauthorized time or day, device 120 outside of authorized geographical zone, incorrect password provided, other restrictions, combinations of these restrictions, etc. as defined by the rule 214), then the agent 320 can prevent the application 318 from running by, e.g., using the scripting engine 322 to run a script that kills the application.
In certain embodiments, the agent 320 is configured to terminate a running application 318 if the use restriction is violated after the application 318 was invoked. In other words, if the use conditions are met at the invocation of the application 318, but then subsequently violated during the use of the application 318, the agent 320 can be configured to kill the application 318. For example, suppose that the applicable mobile device rule 318 allows for an application 318 to be used only during a defined time window, and that the application 318 is invoked during the allowed time window but then remains in use at the expiration of the time window. In this case, the rule 318 may direct the agent 320 to terminate the application 318. In another example, suppose that the mobile device rule 318 allows for an application 318 to be used only when the mobile device 120 is in a defined geographical zone, and that the application 318 is invoked when this condition is met. Suppose further that the user 115 takes the device 120 outside of the defined geographical zone during the use of the application 318. In this case, the rule 318 may direct the agent 320 to terminate the application 318 as soon as the device 120 leaves the defined geographical zone.
Use Case 13: A mobile device rule 214 can also define a problem as the removal of a required software application 318 from the mobile device 120. A user 115 might accidentally or intentionally uninstall the application. An associated remedial action 216 can cause the enterprise agent 320 to notify the user 115 of the removal of the application 318, and that its reinstallation is required.
Use Case 14: Related to Use Case 13, a mobile device rule 214 can also be used by the enterprise agent 320 to detect when a required software application 318 is installed but not running on the mobile device 120. An associated remedial action 216 can cause the enterprise agent 320 to notify the user 115 and instruct the user to run the required application.
Use Case 15: The enterprise agent 320 can use a mobile device rule 214 to detect a problem defined as the mobile device 120 storing enterprise-related data for which the device is not authorized to store. In one embodiment, a corresponding remedial action 216 can cause the agent 320 to produce a message on the user interface 304, the message instructing the user 115 to delete the unauthorized enterprise-related data from the mobile device 120, perhaps within a specified time period. The remedial action 216 can further include instructions for the agent 320 in the event that the user does not delete the data, such as deleting the data from the device 120 without the user's consent, disabling the device 120, and the like. In another embodiment, a corresponding remedial action 216 can cause the agent 320 to delete the enterprise-related data from the mobile device 120 without the user's consent.
Use Case 16: A mobile device rule 214 can be used by an enterprise agent 320 to detect when the mobile device 120 is in a roaming network, and an associated remedial action 216 can cause the agent 320 to alert the user 115 of the same. A remedial action 216 can also cause the agent 320 to connect the device 120 to available Wi-Fi networks while the device is roaming.
Use Case 17: A remedial action 216 can cause the agent 320 to begin recording the mobile device's location for a certain time period, such as when the device 120 is roaming. The agent 320 can report this information back to the enterprise system 110.
Use Case 18: A mobile device rule 214 can cause the enterprise agent 320 to activate or make applicable new mobile device rules 214 if a mobile device 120 goes a certain time period (e.g., a few hours or days) without connecting to the enterprise system 110.
Use Case 19: A mobile device rule 214 can cause the enterprise agent 320 to toggle the mobile device 120 from its airplane mode if a Wi-Fi or other network becomes available to the device.
Use Case 20: If the mobile device 120 uses a VPN, a mobile device rule 214 can cause the enterprise agent 320 to disable connectivity to networking hotspots.
Use Case 21: Related to Use Case 11, a mobile device rule 214 can cause the enterprise agent 320 to detect when a user 115 or mobile device 120 attempts to use a software application 318 (e.g., Facebook™, Dropbox™, Gmail™, Hotmail™, etc.) to send enterprise data that is sensitive or confidential. An associated remedial action 216 can cause the agent 320 to kill the software application 318, uninstall it, or other action preventing the data transfer.
Use Case 22: Related to Use Case 21, a mobile device rule 214 can cause the enterprise agent 320 to detect when a user 115 or mobile device 120 is connected to an enterprise resource 130 and accessing sensitive or confidential data. In certain circumstances, a remedial action 216 can cause the agent 320 to prevent the device 120 from downloading, copying, and/or sending the data to anyone else.
Use Case 23: A mobile device rule 214 can cause the enterprise agent 320 to detect when the number of SMS messages in a mobile device inbox exceeds a defined amount, and an associated remedial action 216 can cause the agent 320 to alert an IT administrator of the same.
Use Case 24: A mobile device rule 214 can cause the enterprise agent 320 to monitor the mobile device's message inbox and detect inbound SMS messages from blacklisted telephone numbers or messages that include enterprise information that is confidential or sensitive. An associated remedial action 216 can cause the agent 320 to alert an IT administrator of the same, disable the device 120, delete the sensitive messages, disable the device's messaging capability, and the like.
Use Case 25: Related to Use Case 24, a mobile device rule 214 can cause the enterprise agent 320 to monitor the mobile device's outbound message queue and detect outbound SMS messages to blacklisted telephone numbers or messages that include enterprise information that is confidential or sensitive. An associated remedial action 216 can cause the agent 320 to alert an IT administrator of the same, disable the device 120, delete the sensitive messages, disable the device's messaging capability, and the like.
Use Case 26: A mobile device rule 214 can be used by the enterprise agent 320 to detect when a new or unauthorized SIM card is inserted into the mobile device 120. A remedial action 216 can cause the agent 320 to send a communication to enterprise authorities of the new SIM card, instruct the user 115 to remove the SIM card, etc.
Use Case 27: A mobile device rule 214 can be used by the enterprise agent 320 to detect a pattern or signature of suspicious behavior by a user 115 of a mobile device 120. For example, the rule 214 can define a problem involving some logical combination of user behaviors, such as frequenting of blacklisted or suspicious websites, use of blacklisted or suspicious IP addresses, and/or the installation or running of blacklisted mobile device applications. If the agent 320 determines that the behaviors of a user 115 have violated the rule 214, the agent 320 can enforce a remedial action 216 such as preventing the user 115 from logging into the enterprise system 110, deleting all enterprise data from the device 120, etc.
Some mobile device operating systems do not permit an application (such as the enterprise agent 320) to see what other applications on the device 120 are doing. This is sometimes referred to as the “sandboxing” of applications on the device 120. Preferably, the mobile device's applications whose usage is necessary to implicate the mobile device rule 214 that defines the user's suspicious behavior pattern are programmed to record these behaviors into a secure document container 336, which is described more fully below. By doing so, the agent 320 can be configured to read those suspicious behaviors by accessing the container 336.
Use Case 28: The enterprise agent 320 can use a mobile device rule 214 to detect a problem defined as the mobile device's receipt of an unauthorized or suspicious network connection. Generally, a mobile device 120 receives much fewer incoming network connections than it generates outgoing connections, because users 115 of mobile devices 120 more typically connect outwardly (e.g., when users 115 browse web sites, search online stores, etc.). Hence, the incoming network connection may be due to an attempt by a third party to hack into the mobile device 120 for nefarious reasons, such as to steal enterprise information, disable the device 120, and the like. Of course, there are some instances when incoming connections are authorized or benign, such as when a mobile device 120 receives email. However, email is typically received through a well known port of the device 120, which the agent can be configured to determine. Thus, the enterprise agent 320 can be configured to react to the receipt of an incoming network connection by inspecting parameters of the connection (e.g., the mobile device port for the connection). If the inspection leads to a determination that the incoming connection is authorized, then the agent 320 can be configured to allow the incoming connection. On the other hand, if the inspection leads to a determination that the incoming connection is not authorized or is suspicious, the agent 320 can be configured to execute a corresponding remedial action 216 that denies, prevents, or terminates the unauthorized or suspicious network connection. This functionality may be referred to as a “mobile firewall.”
Cloud-Based Enterprises
In some embodiments, the enterprise system 110 is provided substantially or entirely within the cloud 156. Any needed mobile device management systems 126, secure mobile gateways 128, and enterprise resources 130 are deployed substantially or entirely within the cloud 156 in such cloud-based enterprise systems 110. A meta-application system can be deployed within the cloud 156 and/or the mobile devices 120 to help manage the devices 120. Such embodiments may or may not include a non-cloud enterprise system, or meta-application components deployed within a non-cloud enterprise system.
For example, an enterprise (e.g., a social networking enterprise) can provide mobile devices 120 (e.g., iPads™) to a group of people, with meta-application components being deployed within the devices 120, and with meta-application components and any needed systems 126, gateways 128, and resources 130 being deployed solely within the cloud 156. In certain embodiments, an enterprise can use policies (e.g., access policies 218) stored within the cloud 156 and/or the devices 120 to help manage or restrict mobile device communications or access to cloud-based enterprise resources. The meta-application can also be used to monitor/measure/remediate the cloud or cloud-based services used by the enterprise.
Improved Communication Experience Between Enterprise and Mobile Devices
For many carrier networks 125, there are typically some geographical areas in which wireless service is weak or unavailable. This can occur if, for example, the wireless carrier has relatively few or no cellular communication nodes or towers in such areas. With reference to
From the perspective of a mobile device 120, the loss of the network connection 142 can be inconvenient when a user 115 inputs data to be sent to an enterprise resource 130 of the enterprise system 110. For example, a software application 318 may be configured to open a network connection 142, 144 to the mobile device management system 126 or other network component, and to request data input from the user, typically via the user interface 304 of the mobile device 120. For instance, an application 318 can be configured to provide one or more data fields on the display 326, the data fields configured to receive the user's data as text entry via the keypad 324. The application 318 can be further configured to send the data to the enterprise resource 130 once the data is input by the user 115. However, if the network connection 142 is lost before the data is sent to the mobile device management system 126, the application 318 might discard the data that the user 115 input. For example, the application 318 might discard the data upon receipt of a TCP socket error reporting the lost connection 142. Or, the application 318 may attempt to send the data to the mobile device management system 126 and wait for a reply. Since the connection 142 is lost, the application 318 would eventually time-out after receiving no reply for a certain time period. In either case, the application 318 might discard the data that the user 115 provided, without the data being sent to the mobile device management system 126. Ultimately, this makes the user 115 re-enter the data once the connection 142 is regained.
A somewhat similar dynamic may occur from the perspective of an enterprise resource 130 and tunneling mediator 224 (or other tunneling mediator). In particular, the mobile device's network connection 142 can become lost when the tunneling mediator 224 attempts to send data to a mobile device 120 via an application tunnel.
In some embodiments, upon the creation of an application tunnel between a software application 318 of a mobile device 120 and an enterprise resource 130 as described above, the device's enterprise agent 320 and/or the enterprise's tunneling mediator 224 (or other tunneling mediator) can be configured to enhance communications between the mobile device 120 and the enterprise resource 130, by caching data. For example, the agent 320 can cache data on the mobile device 120, and the tunneling mediator 224 can cache data within the mobile device management system 126.
If the network connection 142, 144 is lost and unavailable, then, in step 1016, the agent 320 can prevent the software application 318 from detecting the loss of the network connection 142, 144. For example, the agent 320 can prevent the application 318 from detecting a TCP socket error caused by the loss of the connection 142, 144. Then, in step 1018, the agent 320 caches at least a portion (and preferably all) of the received data that has not been sent from the mobile device 120 to the tunneling mediator 224. The data can be cached in any suitable machine-readable memory device, such as the random access memory 308, the hard drive 306, flash memory, or a memory card engaged with the memory card port 307 of the mobile device 120. Then, in decision step 1020, the agent 320 determines whether the network connection 142, 144 to the tunneling mediator 224 has been regained. The determination in decision step 1020 can involve the agent 320 receiving a notification from a notification service to which the agent has subscribed. If the network connection 142, 144 to the tunneling mediator 224 has not been regained, the method can wait for a time period and then return to decision step 1020. Once the network connection 142, 144 is regained, the agent 320 sends the cached data to the tunneling mediator 224 via the regained network connection 142, 144.
In the illustrated embodiment, the enterprise agent 320 caches user-provided data (step 1018) only after the agent 320 determines that the connection to the tunneling mediator 224 has been lost (step 1010). In other embodiments, the agent 320 can be configured to cache user-provided data before determining whether the connection to the tunneling mediator 224 is lost or available. For instance, the agent 320 can cache the data in response to receiving the data from the user at step 1004. In such embodiments, the cached data can be erased after the data has been sent to the tunneling mediator 224.
It will be appreciated that the software application 318 may conduct a process in which the user inputs data in several successive stages, wherein the application 318 attempts to send the received data after each stage. If the network connection 142, 144 is lost before the final data input stage, and the application 318 receives additional data after the connection 142, 144 is lost, then the enterprise agent 320 can be configured to cache at least a portion (and preferably all) of the additional data. In that case, the agent 320 can respond to a regaining of the network connection 142, 144 by sending the cached additional data to the tunneling mediator via the regained network connection 142, 144.
As noted above, in step 1016 the enterprise agent 320 can prevent the software application 318 from detecting the loss of the network connection 142, 144. From the perspective of the software application 318, the connection 142, 144 is available in such circumstances. As far as the application 318 is concerned, it has an IP address and a server port with which to communicate. In this way, the application 318 can be given the impression that it is communicating with the enterprise resource 130, when in reality it is either communicating only with the agent 320 (when the connection 142, 144 is lost) or with the tunneling mediator 224 via the agent 320 (when the connection 142, 144 is available). When the connection 142, 144 is lost, the agent 320 can give the application 318 the impression that the enterprise resource 130 is still in the process of reading and responding to the request, thereby preventing the application 318 from timing out.
The mobile device user's experience can be similar to that of the application 318. The user's experience is dependent on the application 318. So, if the agent 320 keeps the application 318 unaware of the lost network connection 142, 144, the user may also remain unaware of it. This method can prevent, for example, the aforementioned problem of the user having to reenter the data into the application 318 when the connection 142, 144 is lost.
In some cases, particularly when a mobile device 120 is downloading a large amount of data from the enterprise system 110, it may be useful to respond to a lost network connection by caching data packets within the enterprise system 110.
In the illustrated embodiment, the tunneling mediator 224 caches data (step 1110) only after the mediator 224 determines that the connection to the mobile device 120 has been lost (step 1106). In other embodiments, the tunneling mediator 224 can be configured to cache the data before determining whether the connection to the mobile device 120 is lost or available. For instance, the tunneling mediator 224 can cache the data responsive to receipt of the data from the enterprise resource 130. In such embodiments, the cached data can be erased after the data has been sent to the mobile device 120.
As noted above, during the method illustrated in
In some embodiments, the tunneling mediator (e.g., the mediator 224) and/or the enterprise agent 320 is configured to compress data transmitted through the application tunnel. The tunneling mediator can be configured to compress data received from the enterprise resource 130 (or another resource outside the enterprise system 110) through the resource network connection 152, and to send the compressed data to the mobile device 120 through the network connection 142, 144. Upon receipt of the compressed data, the enterprise agent 320 can be configured to decompress the data before it is provided to a software application 318 that is the intended recipient of the data. Thus, the application 318 need not be capable of decompressing the data.
Similarly, the mobile device's enterprise agent 320 can be configured to compress data intercepted or received from a software application 318, and to send the compressed data to the tunneling mediator through the network connection 142, 144. Upon receipt of the compressed data, the tunneling mediator can be configured to decompress the data before it is provided to an enterprise resource 130 (or another resource outside the enterprise network 110) that is the intended recipient of the data. Thus, the enterprise resource 130 need not be capable of decompressing the data.
This compression functionality can be useful when the mobile device 120 is sending or receiving large data files, or when the mobile device 120 is in an area in which the network connection 142, 144 has low bandwidth. In certain embodiments, data is compressed by about 20-95%. The extent of the data compression can depend on the data type, the available bandwidth of the network connections 142, 144, and 152, as well as other factors. Moreover, both the application 318 and the user 115 of the mobile device 120 can remain unaware of the compression and decompression of the data.
In some embodiments, an application tunnel can be used by the enterprise system 110 for error correction (e.g., parity checks), resending of lost data packets, etc. The tunneling mediator 224 can be used for load balancing or thread safety/synchronization of a thread unsafe server application.
“Remote Control” of Mobile Devices
In some embodiments, a “remote control” system and methodology can be provided to allow an enterprise's mobile devices 120 to be diagnosed and controlled by one or more helpdesk operators, administrators or other persons (collectively referred to herein as “controllers”) at computers (“controller computers”) that are remotely located with respect to the mobile devices 120. Such systems and methods are now described.
With reference to
With reference to
A user 115 of a mobile device 120 may encounter technical difficulties with the user's mobile device 120, and may wish to seek help from a helpdesk service. A helpdesk service can be operated exclusively by or for the enterprise, or alternatively for multiple enterprises. In some embodiments, the user 115 can request a remote control session with a controller computer 1200 by contacting the helpdesk service (e.g., by a phone call, email, text message, and the like). In such embodiments, a controller 1204 associated with the helpdesk service can then cause a remote control module 1202 of a controller computer 1200 to send to the user's mobile device 120 a request for a remote control session between the controller computer 1200 and the mobile device 120. In some embodiments, the enterprise agent 320 of a mobile device 120 allows the user 115 to request or initiate a remote control session with the controller computer 1200. In some embodiments, a remote control session can be initiated by a controller 1204 without first being requested by the user 115.
In step 1302, the remote control module 1202 provides, for the controller 1204, identifications of one or more mobile devices 120 that are available for a remote control session. This may be achieved by the remote control module 1202 sending a request to the mobile device management system 126 for such identifications, and the mobile device manager 202 responding by looking up the information in the mobile device information 204 and sending the requested information to the controller computer 1200. The provided identifications can comprise, e.g., the names or usernames of the users 115 assigned to the mobile devices 120. The identified devices 120 can be filtered (e.g., by the mobile device manager 202 or the remote control module 1202) in accordance with any criteria, such as criteria specified by the controller 1204 to the remote control module 1202. For example, the remote control module 1202 can list only those mobile devices 120 that are currently connected to the enterprise system 110, or only those mobile devices 120 or users 115 that are members of a defined user group, etc. Also, the remote control module 1202 can be configured to allow the controller 1204 to conduct searches against the enrolled mobile devices 120, to, e.g., search for a specific device 120 or user 115. In addition to identifying the users 115 of the mobile devices 120 to the controller 1204, the remote control module 1202 can also be configured to provide additional information about the identified devices 120, such as device model, operating system version, platform, etc. The mobile device manager 202 can obtain such information from the mobile device information 204, such as the mobile device properties 208.
Referring still to
With continued reference to
Preferably, the remote control module 1202 of the controller computer 1200 allows the controller 1204 to issue commands to the mobile device 120. Such commands are referred to herein as “remote control commands.” Accordingly, referring still to
In certain embodiments, the remote control module 1202 can allow the controller 1204 to view information about the mobile device 120. The controller's viewing of information can be sequestered from the user interface 304 of the mobile device 120. Hence, in step 1320, the remote control module 1202 can receive a request from the controller 1204 for information about the mobile device 120. In step 1322, the remote control module 1202 can send the request for information to the mobile device 120. The request can essentially automate an API for a mobile device feature that returns requested information (e.g., API's for task manager, file explorer, registry editor, etc.). In step 1324, the remote control module 1202 can receive the requested information from the mobile device 120, preferably without displaying the information within the emulated user interface 1402. In step 1326, the remote control module 1202 can display the requested information on a display associated with the controller computer 1200, preferably in a location other than the emulated user interface 1402. Examples of mobile device information that can be requested in steps 1320 and 1322, received in step 1324, and displayed in step 1326 include the mobile device's system information, processes occurring on the mobile device, files stored on the mobile device, the mobile device's registry, and other data.
For example, the screen display of
In another example,
In another example,
The method begins in step 1802, in which the enterprise agent 320 of the mobile device 120 receives a request from a controller computer 1200 to participate in a remote control session with the controller computer. In some embodiments, the agent 320 can be configured to automatically accept such requests. In other embodiments, the agent 320 is configured to obtain permission from the user 115 to participate in the remote control session, e.g., by prompting the user for an indication of permission. In the illustrated method, the agent 320 determines, in decision step 1804, whether to accept the request. If the agent 320 does not accept the request (e.g., due to the user 115 denying the request, or due to the user 115 simply not giving permission within a predefined time period), then the method can end in step 1806.
On the other hand, if the enterprise agent 320 accepts the request, then the agent 320 responds to the request by requesting or establishing an application tunnel connection with the controller computer 1200 and obtaining, in step 1808, user interface emulation data (described above) from the mobile device 120. In step 1810, the agent 320 sends the user interface emulation data to the controller computer 1200. The agent 320 can repeatedly send updated user interface emulation data, for example at fixed time intervals or perhaps only when changes occur to the mobile device's user interface 304.
Referring still to
In step 1816, the enterprise agent 320 of the mobile device 120 receives a request from the controller computer 1200 for information about the mobile device. For example, such information can include the information described above in steps 1320, 1322, 1324, and 1326 of
In conducting a remote control session with a remote control module 1202 of a controller computer 1200, the enterprise agent 320 of a mobile device 120 can be configured to allow the controller 1204 to execute actions on the mobile device 120. In some cases, these can include actions that even the user 115 of the device 120 cannot perform (e.g., if the remote control module 1202 has functionality beyond that of the software applications 318 installed on the mobile device 120).
It will be appreciated that the remote control module 1202 can be configured to allow the controller 1204 to conduct numerous other operations against the mobile device 120 during a remote control session. For example, the remote control module 1202 can be configured to allow the controller 1204 to shut down or reboot the mobile device 120. In another example, the remote control module 1202 can be configured to allow the controller 1204 to install new software onto the mobile device 120. This may involve sending software application installation files from the controller computer 1200 or another networked computer to the mobile device 120, and then installing the application. In another example, the remote control module 1202 can be configured to allow the controller 1204 to uninstall software applications 318 from the mobile device 120. Many other operations are possible.
In some embodiments, the remote control module 1202 of the controller computer 1200 and the enterprise agent 320 of the mobile device 120 are configured to enable the controller 1204 and the mobile device user 115 to communicate with one another, using the controller computer 1200 and mobile device 120. For example, the remote control module 1202 and the enterprise agent 320 can be configured to enable a voice over internet protocol (VOIP) session that allows the controller 1204 and user 115 to speak to each other audibly. The mobile device 120 can use the speaker 328 of the mobile device 120 to audibly broadcast the controller's speech (input via a microphone of the controller computer 1200) to the user 115. Alternatively, the user 115 can listen to the controller's speech by connecting a pair of headphones to a headphone jack of the mobile device 120. Similarly, a speaker of the controller computer 1200 can broadcast the user's speech (input at the microphone 330 of the mobile device 120) to the controller 1204.
In another example, the remote control module 1202 and the enterprise agent 320 can be configured to enable a text chat session between the controller 1204 and the user 115.
In another example, the remote control module 1202 and the enterprise agent 320 can be configured to enable shared whiteboard communications between the controller 1204 and the user 115.
In certain embodiments, the remote control module 1202 is configured to allow the controller 1204 to adjust the view of the emulated user interface 1402. For example, in various embodiments, the remote control module 1202 is configured to allow the controller 1204 to adjust the emulated interface's resolution, color scheme, bits per pixel (BPP), zoom level, rotational orientation, etc. Further, the remote control module 1202 can be configured to allow the controller 1204 to adjust a “refresh rate” at which the enterprise agent 320 of the mobile device sends updated user interface emulation data to the controller computer 1200. The remote control module 1202 can also be configured to allow the controller 1204 to specify whether the data received from the mobile device 120 is to be compressed by the enterprise agent 320, as well specify the degree of compression.
In certain embodiments, the remote control module 1202 is configured to capture and save aspects of remote control sessions. For example, the remote control module 1202 can be configured to allow the controller 1204 to capture images of the emulated user interface, print the images onto a hardcopy printout, to record video of a remote control session, and the like. The remote control module 1202 can be configured to allow the controller 1204 to edit the captured images or video, and/or send captured media files to others, via email and the like.
In some embodiments, the remote control module 1202 can be configured to allow the controller 1204 to create macros for activating or executing certain features, settings, and/or software applications of the mobile device 120.
Analytics on Secure Mobile Gateway
Referring again to
The logged data can be provided to or accessed by an analytics service 414. In the illustrated embodiment, the secure mobile gateway 128 includes a log redirector service 412 that periodically reads the logged data 410 and sends some or all of it to the analytics service 414. The log redirector service 412 is preferably configurable so that an IT administrator can direct it to send only those portions of the logged data that match configurable criteria. For example, the log redirector service 412 can be configured to send only the logged data concerning denied requests 402, or only the logged data concerning granted requests 402, or logged data filtered based on different criteria. Further, the log redirector service 412 and/or the repository 410 of logged data can comprise a data-sharing interface that enables other systems (such as the analytics service 414) to query or extract data concerning the logged requests 402, such as user data, mobile device data, mobile traffic data (e.g., IP address of sender device), etc. It will be understood that the principles and advantages described with reference to analytics on the secure mobile gateway 128, can be applied to implement a variety of data mining and correlation for security or other purposes. As an example, if the logged data indicates that a mobile device 120 has accessed certain prohibited sites and also recently downloaded confidential documents which were then forwarded to an external email, this information can be a basis for denial of access to enterprise resources.
The analytics service 414 can comprise, for example, a Security Information Management (SIM) system, a Security Event Management (SEM) system, or a Security Information and Event Management (SIEM) system. SIEM solutions are a combination of SIM and SEM solutions. The analytics service 414 can be configured to monitor, analyze, and/or generate and send alerts, notifications, or reports based on the logged data. The analytics service 414 can be configured to detect patterns in the logged data, provide metrics useful for further analysis or actions, and diagnose problems associated with the data. The analytics service 414 can be configured to process data formatted according to various standards, such as Syslog. For instance, the analytics service 414 can utilize Splunk, a software program having these types of features. The analytics service 414 can be part of the enterprise system 110, or alternatively can be part of a third party system for analyzing data of the type logged in the repository 410.
For example, the analytics service 414 can be configured to process an access denial by the secure mobile gateway 128 by sending a communication (e.g., an email or SMS message) to the denied user 115, possibly specifying the reason for the denial of access (e.g., “Your request to access the XYZ Corp's network was denied because your mobile device does not comply with the enterprise's policy against installing the Angry Birds™ software application.”).
Authentication of Mobile Device Users
Enterprise networks typically authenticate their users at the onset of the users' computer transactions with enterprise resources. In existing systems, authentication commonly involves a login process of receiving a username and password from the user's client device, verifying that the username corresponds to an authorized user, and verifying that the password is the correct password for the username. While some enterprise resources 130 may be configured to consume username data for all transactions with mobile devices (e.g., to grant access based on user ID, user role 206 or other group membership, etc.), other resources 130 do not. For some types of enterprise resources 130, after authentication, the user is permitted to conduct at least some transactions with the resource 130 without providing login information. For a defined time period after the last transaction with the authenticated user, some enterprise resources 130 downstream of the enterprise's firewall(s) assume that new requests that use the authenticated IP address (i.e., the IP address of the device that sent the user's login information to the enterprise network) are from the authenticated user. Such enterprise resources generally do not request and confirm the user's login information for each transaction with the user's computing device.
While this approach is generally suitable for non-mobile client devices, it can present security risks specific to mobile devices. Mobile devices often change their IP addresses when in use. For instance, a mobile device connected to a cellular network while in a moving vehicle can switch between different cellular towers. Similarly, a mobile device can switch between different Wi-Fi networks. A mobile device can also switch between different IP addresses associated with a single cellular tower or Wi-Fi network. Hence, an enterprise resource 130 that determines the user associated with an inbound mobile device request by examining only the request's IP address risks conducting a transaction with a person who is not the user.
In the illustrated embodiment, the secure mobile gateway 128 includes a gateway filter 401 and a repository 410 of logged data, for example, as described above. The logged data can include data from mobile device access requests 402 received by the gateway filter 401, for example, as described above. For example, if the gateway 128 supports ActiveSync, the logged data can include the Deviceld, DeviceType, User, and/or UserAgent property values from an ActiveSync request 402, as well as the ActiveSync command issued by the request 402.
The request 2302 can include mobile traffic data, such as an IP address of a mobile device 120 that sent the request 2302. The request 2302 may or may not include data about the mobile device 120 that sent the request 2302. The enterprise resource 130 can receive the request 2302 and send a user determination request 2304 to the analytics service 414. The user determination request 2304 includes the mobile traffic data of the request 2302. The user determination request 2304 can additionally include the time at which the enterprise resource 130 received the request 2302, the data about the mobile device 120 that sent the request, as well as other data associated with the request 2302. In some embodiments, the user determination request 2304 can include an identification of a user 115 that the enterprise resource 130 or another enterprise component believes to be the sender of the request 2302, such that the analytics service 414 is essentially being asked to verify whether the identified user 115 is the actual person who sent the request 2302.
The analytics service 414 can employ a user determination algorithm for determining user information associated with the request 2302 received by the enterprise resource 130. In this context, user information can include a determination of whether the request 2302 was sent by a user 115 (as opposed to someone who is not associated or enrolled with the enterprise), a determination of whether a user 115 identified in the user determination request 2304 is the person who sent the request 2302 to the enterprise resource 130, and/or an identification (e.g., username) of a user 115 who sent the request 2302. The user determination algorithm can additionally determine a reliability score indicative of a confidence level in the computed binding—a degree of confidence that a particular user 115 is the actual person who sent the request 2302. The analytics service 414 can produce and send a response 2306 containing result(s) produced by the user determination algorithm. The results of the algorithm can comprise the user information and/or the reliability score.
In the embodiment illustrated in
In other embodiments, a component upstream of the enterprise resource 130 (e.g., a gateway, firewall, proxy server, DLP monitoring device, tunneling mediator, SSL traffic inspection device, or other components different than those of the secure mobile gateway 128) receives the request 2302, generates the user determination request 2304, and sends the user determination request 2304 to the analytics service 414, and the analytics service 414 sends the response 2306 to said component upstream of the enterprise resource 130. In these embodiments, the upstream component can be configured to use the data within the response 2306 to determine whether to pass the request 2302 along to the enterprise resource 130. Further, the upstream component can be configured to make this determination at least partly based on the reliability score and/or the action or command issued within the request 2302. For example, if the request 2302 seeks to download sensitive or confidential enterprise data, the upstream component can be configured to send the request 2302 to the enterprise resource 130 only if the reliability score exceeds a relatively high value. In another example, if the request 2302 seeks to upload data to the enterprise resource 130, the upstream component can be configured to require a relatively low reliability score for passing the request 2302 along to the resource 130. The upstream component can be configured to allow an administrator to configure the reliability score threshold at which the upstream component takes any given action in response to the request 2302.
In some embodiments, the analytics service 414 proactively sends out its computed bindings of user 115 to mobile traffic data (e.g., IP address) to the enterprise resources 130. The analytics service 414 can send the bindings directly to the resources 130, and/or to one or more components upstream of the resources 130, which append the bindings or related data to the mobile device communications that are transmitted to the resources 130. In these approaches, the resources 130 can use the computed bindings without requesting them from the analytics service 414.
The user determination algorithm employed by the analytics service 414 can include scanning some or all of the logged data for mobile traffic data (from the mobile device requests 402 received by the secure mobile gateway 128) that matches the mobile traffic data received within the user determination request 2304. For any requests 402 having mobile traffic data that matches that of the request 2302, the algorithm can also include determining, from the logged data 410, user data or mobile device data provided within the requests 402. For example, the user data and the mobile device data can respectively include the values of the User property and the DeviceID property of an ActiveSync request 402. The analytics service 414 can determine a user 115 corresponding to the user data and/or mobile device data by, e.g., requesting it from the mobile device management system 126. For instance, the User and DevicelD property values can correspond to a particular user 115 in the mobile device information 204. If the logged data does not include (or the analytics service 414 is unable to find) mobile traffic data that matches that of the request 2302, the analytics service 414 can determine that the request 2302 was not sent by a user 115.
In order to determine the user information and compute the reliability score, the user determination algorithm can evaluate a variety of factors. In certain embodiments, the user determination algorithm compares the time at which the request 2302 was received by the enterprise resource 130 to the time of receipt (by the secure mobile gateway 128) of mobile device access requests 402 having mobile traffic data matching that of the request 2302. For instance, suppose an ActiveSync request 402 has User and DeviceId property values corresponding to a particular user 115. Suppose further that the sender's IP address within the request 402 is the same as that of the request 2302, and that the request 402 was received by the secure mobile gateway 128 within a relatively narrow time period (before or after) from the time at which the enterprise resource 130 (or upstream component) received the request 2302. Under these circumstances, the analytics service 414 might compute a high reliability score indicating that the user 115 associated with the request 402 is the person who sent the request 2302 to the enterprise resource 130. The user determination algorithm can compute a lower reliability score as the time period between the receipt of the request 2302 and the receipt of the temporally closest request 402 having the same sender IP address increases. On the other hand, if the sender's IP address within the request 402 is different than that of the request 2302, the analytics service 414 might compute a relatively low reliability score and/or determine that the user 115 associated with the request 402 is likely not the person who sent the request 2302 to the enterprise resource 130. Further, if there were no requests 402 received by the gateway 128 within a predefined or dynamically computed time window from (before or after) the time of receipt of the request 2302 and which have the same sender IP address as the request 2302, then the analytics service 414 can compute a relatively low reliability score.
In certain embodiments, the user determination algorithm evaluates the frequency with which the enterprise network sees a particular user 115 associated with certain mobile traffic data, such as an IP address. For instance, suppose that the secure mobile gateway 128 has received numerous ActiveSync requests 402 that have User values corresponding to a particular user 115, within a relatively short time window containing the time at which the enterprise resource 130 received the request 2302. Suppose further that all of said ActiveSync requests 402 include sender IP addresses that are the same as that of the request 2302. Under these circumstances, the analytics service 414 might compute a very high reliability score indicating that the user 115 associated with the requests 402 is the person who sent the request 2302 to the enterprise resource 130. On the other hand, if the sender IP addresses within the requests 402 is/are different than that of the request 2302, the analytics service 414 might compute a very low reliability score and/or determine that the user 115 associated with the requests 402 is likely not the person who sent the request 2302 to the enterprise resource 130.
In certain embodiments, the user determination algorithm evaluates the extent to which different access requests 402 associated with a particular user 115 have different mobile traffic data. For instance, the fact that a string of access requests 402 from a particular user 115 have numerous different sender IP addresses likely indicates that the user 115 is on the move and constantly switching IP addresses while communicating with the enterprise system 110. Under these circumstances, the analytics service 414 might compute a relatively lower reliability score than if all of the access requests 402 from the particular user 115 had the same sender IP address as the request 2302. In one specific approach, the analytics service 414 determines a total number of access requests 402 that (1) have user data corresponding to a particular user 115 of interest, (2) have mobile traffic data that does not match the mobile traffic data received within the user determination request 2304, and (3) were received by the secure mobile gateway 128 within a predetermined or dynamically computed time window containing the time of receipt in the user determination request 2304. The analytics service 414 can reduce the computed reliability score (in a confidence level that the request 2302 was from the particular user 115) as the total number of determined access requests 402 increases.
In certain embodiments, the user determination algorithm takes into consideration whether the IP address of a request 2302 is from a known block or subnet of IP addresses that are registered or otherwise associated with the enterprise system 110. Such a block or subnet of IP addresses can be available via the enterprise's own equipment, primarily for use by enterprise personnel, such as a Wi-Fi network, an enterprise VPN allocation block, or roaming external IP addresses. A block or subnet of IP addresses can be registered with the secure mobile gateway 128. If a request 2302 is sent from an IP address associated with the enterprise, the algorithm can be configured to compute a higher reliability score.
It will be understood that the user determination algorithm for computing the reliability score can include factors in addition to those described above. It will also be understood that the algorithm need not consider all of the factors described above, and can use any sub-combination thereof.
In the embodiment illustrated in
The analytics service 414 can be configured to generate reports and displays of its bindings of user and mobile device to mobile traffic data (e.g., IP address). The enterprise system 110 can include a web-based or other type of user interface for viewing such bindings. For example, such information could be displayed via a user interface of the mobile device management system 126.
In preferred embodiments, various components of the enterprise system 110 can use the bindings of user and/or device to mobile traffic data produced by the analytics service 414 to track or log network usage events for one or more mobile devices 120. The analytics service 414 can be queriable and configured to share its information with other components via, e.g., web services.
As noted above, the analytics service 414 can be configured to generate and send notifications to users 115 or IT administrators based on the logged data. Additionally, the analytics service 414 can be configured to send such a notification at least partly based on one or more reliability scores computed according to the user determination algorithm. For example, if a large number of requests were denied, and if reliability scores associated therewith satisfy a defined threshold, then the analytics service 414 can be configured to send an appropriate alert. On the other hand, the analytics service 414 can be configured to ignore situations involving low reliability scores. If there are a large number of access denials, but they all have low reliability scores, it may not be worth generating and sending a notification.
For security purposes, the analytics service 414 can be configured to encrypt the user, device, and mobile traffic data bindings that the service 414 produces.
Secure Document Containers
Reference is made again to
As used in this context, a “document” can comprise any computer-readable file including text, audio, video, and/or other types of information or media. A document can comprise any single one or combination of these media types.
The secure document container 336 can comprise an application that implements a file system 338 that stores documents and/or other types of files. The file system 338 can comprise a portion of a computer-readable memory of the mobile device 120. The file system 338 can be logically separated from other portions of the computer-readable memory of the mobile device 120. In this way, enterprise data can be stored in secure document container 336 and private data can be stored in a separate portion of the computer-readable memory of the mobile device 120. The container 336 can allow the enterprise agent 320, mobile device applications 318 and/or other components of the device 120 to read from, write to, and/or delete information from the file system 338 (if authorized to do so). Deleting data from the container 336 can include deleting actual data stored in the container 336, deleting pointers to data stored in the container 336, deleting encryption keys used to decrypt data stored in the container 336, and the like. The container 336 can be installed by, e.g., the agent 320, IT administrators of the enterprise system 110, or the device 120 manufacturer. The container 336 can enable some or all of the enterprise data stored in the file system 338 to be deleted without modifying private data stored on the mobile device 120 outside of the container 336. The file system 338 can facilitate selective or complete deletion of data from the file system 338. For example, a component of the enterprise system 110 can delete data from the file system 338 based on, e.g., encoded rules. In some embodiments, the agent 320 deletes the data from the file system 338, in response to receiving a deletion command from the enterprise system 110. In other embodiments, the data is deleted without the assistance of the agent 320, for example if an agent 320 is not provided.
The secure document container 336 can comprise an access manager 340 that governs access to the file system 338 by applications 318 and other components of the mobile device 120. Access to the file system 338 can be governed based on document access policies (e.g., encoded rules) stored in the documents and/or the file system 338. A document access policy can limit access to the file system 338 based on (1) which application 318 or other component of the device 120 is requesting access, (2) which documents are being requested, (3) time or date, (4) geographical position of the device 120, (5) whether the requesting application 318 or other component provides a correct certificate or credentials, (6) whether the user of the device 120 provides correct credentials, (7) other conditions, or any combination thereof. A user's credentials can comprise, for example, a password, one or more answers to security questions (e.g., What is the mascot of your high school?), biometric information (e.g., fingerprint scan, eye-scan, etc.), and the like. Hence, by using the access manager 340, the container 336 can be configured to be accessed only by applications 318 that are authorized to access the container 336. As one example, the access manager 340 can enable enterprise applications installed on the mobile device 120 to access data stored in the container 336 and to prevent non-enterprise applications from accessing the data stored in the container 336.
Temporal and geographic restrictions on document access may be useful. For example, an enterprise administrator may deploy a document access policy that restricts the availability of the documents (stored within the container 336) to a specified time window and/or a geographic zone (e.g., as determined by a GPS chip 316) within which the device 120 must reside in order to access the documents. Further, the document access policy can instruct the container 336 or agent 320 to delete the documents from the container 336 or otherwise make them unavailable when the specified time period expires or if the mobile device 120 is taken outside of the defined geographic zone.
Some documents can have access policies that forbid the document from being saved within the secure document container 336. In such embodiments, the document can be available for viewing on the mobile device 120 only when the user 115 is logged in to the enterprise system 110.
The access manager 340 can also be configured to enforce certain modes of connectivity between remote devices (e.g., an enterprise resource 130 or other enterprise server) and the container 336. For example, the access manager 340 can require that documents received by the container 336 from a remote device and/or sent from the container 336 to the remote device be transmitted through application tunnels, for example, as described above. Such application tunnels can use the tunneling mediator 224 of the enterprise system 110. The access manager 340 can require that all documents transmitted to and from the container 336 be encrypted. The enterprise agent 320 or access manager 340 can be configured to encrypt documents sent from the container 336 and decrypt documents sent to the container 336. Documents in the container 336 can also be stored in an encrypted form.
The secure document container 336 can be configured to prevent documents or data included within documents from being used by unauthorized applications or components of the mobile device 120 or other devices. For instance, a mobile device application 318 having authorization to access documents from the container 336 can be programmed to prevent a user from copying a document's data and pasting it into another file or application interface, or locally saving the document or document data as a new file outside of the container 336. Similarly, the container 336 can include a document viewer and/or editor that does not permit such copy/paste and local save operations. Moreover, the access manager 340 can be configured to prevent such copy/past and local save operations. Further, the container 336 and applications 318 programmed and authorized to access documents from the container 336 can be configured to prevent users from attaching such documents to emails or other forms of communication.
A mobile device application 318 can be programmed to lookup and find the secure document container 336 (or a secure web browser 332, described below, that includes the container 336) as a resource of the mobile device 120. In certain embodiments, the application 318 can run in a secure virtual machine separate from a virtual machine of an operating system of the mobile device 120. According to some other embodiments, the application can run within the secure web browser 332. An application 318 can be programmed to write enterprise-related data only into the container 336. For instance, the application's 318 source code can be provided with the resource name of the container 336. Similarly, a remote application (e.g., an enterprise resource 130) can be configured to send data or documents only to the containers 336 of one or more mobile devices 120 (as opposed to other components or memory locations of the devices 120). Storing data to the container 336 can occur automatically, for example, under control of the application 318, the enterprise agent 320, or the web browser 332. An application 318 can be programmed to encrypt or decrypt documents stored or to be stored within the container 336. In certain embodiments, the container 336 can only be used by applications (on the device 120 or remote) that are programmed to look for and use the container 336, and which have authorization to do so.
The secure document container 336 can serve as a temporary repository for documents and other files sent to the mobile device 120. Remote applications can be configured to send documents to the container 336 (e.g., via application tunnels) on a one-time or periodic basis. For example, a sales-related enterprise resource 130 can be programmed to send sales-related documents (e.g., most recent price sheets) every morning to the containers 336 of a team of users 115 having sales-related roles 206 (e.g., sales persons). The sales-related documents can have document access policies such that the documents will “self-destruct” (e.g., be automatically deleted from the container 336—the deletion being performed by, e.g., the container 336 itself or the enterprise agent 320) at a certain time or at the expiration of a time period beginning at a defined event (e.g., the user's opening of a document). Document distribution policies (e.g., encoded rules) can be provided (e.g., within the mobile device management system 126) to control when and how remote applications (e.g., enterprise resources 130) send documents to the containers 336, to which users 115 the documents are sent, what restrictions (e.g., temporal or geographic restrictions) are placed on the use and availability of the documents (e.g., in the form of document access policies as described above), etc.
Remote applications that send documents to one or more secure document containers 336 of mobile devices 120 can be configured to integrate with other repositories, for the purpose of sending documents from such repositories to the containers 336. Such other repositories can be stored, for example, within the enterprise system 110 (e.g., enterprise document repositories such as a Microsoft Sharepoint™ repository) or in a cloud-computing system (e.g., a Box.net™ repository).
Software Development Kit for Mobile Device Applications
Another aspect of certain embodiments involves a software development kit (SDK) that enables an application developer to embed one or more of the functionalities described herein into a mobile device software application, such as a software application 318. As used herein, “embed” can include the modification of an application's source code.
The SDK 2404 can comprise a library of development tools 2408 providing different functionalities. The development tools 2408 can comprise code snippets, data structures, protocols, routines, and the like. The SDK 2404 can provide an application programming interface (API) 2410 that enables an application 2406 to interface with the development tools 2408. The SDK 2404 can include a program editor 2412 for generating the code for an application 2406, and a compiler 2414 for converting the code into a machine-readable format. The SDK 2404 can include a debugging tool 2416 for debugging developed code. It will be appreciated that the SDK 2404 can include other features in addition to these. It will also be appreciated that the SDK 2404 need not include all of the illustrated features.
The development tools 2408 can include tools for embedding one or more of the functionalities described herein into a mobile device software application 2406. It will be appreciated that any sub-combination of these functionalities can be embedded into the application 2406, and that other functionalities not described herein can also be so embedded. Different development tools 2408 are now described.
In certain embodiments, the SDK 2404 includes a development tool 2408 that allows an application developer to embed, within an application 2406, functionality for forming and maintaining an application tunnel (for example, as described above) with a network resource, and communicating with the network resource by sending and receiving communications through the tunnel. The network resource can comprise, for example, an enterprise resource 130. The tool 2408 can be configured to add application tunnel functionality that participates with an enterprise agent 320. As described above in the application tunnels section, the enterprise agent 320 can receive network communications from the application 2406, encapsulate them according to an encapsulation protocol, send the encapsulated communications to a tunneling mediator, receive similar communications from the tunneling mediator (which came from a tunnel endpoint resource), unpack encapsulated communications received from the tunneling mediator, and send the unpacked communications to the application 2406. Alternatively, the tool 2408 can provide functionality for forming an application tunnel without the participation of the enterprise agent 320, wherein the application 2406 itself performs these actions using an encapsulation protocol as described above.
In certain embodiments, the SDK 2404 includes a development tool 2408 that allows an application developer to embed, within an application 2406, functionality for improving the communication experience between a mobile device 120 and a network resource, such as an enterprise resource 130, particularly for application tunnel communications. Such functionality can include caching user-inputted data locally on the mobile device 120 in the event of a lost connection to a network, as described above. Such functionality can likewise include compression of data to be sent to a network resource, and decompression of data received from the network resource, as described above. Again, such embedded functionality can participate with an enterprise agent 320 to enable these features, or can provide these features separate from an enterprise agent 320.
In certain embodiments, the SDK 2404 includes a development tool 2408 that allows an application developer to embed, within an application 2406, functionality for participating in a remote control session between a mobile device 120 and a helpdesk operator, as described above. Such functionality can allow a helpdesk operator to view data about the application 2406 installed on the mobile device 120, and/or to control aspects of the application 2406 and possibly other features of the mobile device 120. Such functionality can include sending user interface emulation data to the helpdesk operator's computer, as described above. Such functionality can include receiving commands from the helpdesk operator for executing actions on the mobile device 120. Again, such embedded functionality can participate with an enterprise agent 320 to enable these features, or can provide these features separate from an enterprise agent 320.
In certain embodiments, the SDK 2404 includes a development tool 2408 that allows an application developer to embed, within an application 2406, functionality for finding, providing credentials to, reading from, and/or writing to a secure document container 336 as described above. This can allow the application 2406 to access and update information within the container 336. This can also allow the application 2406 to access documents securely received by the mobile device 120 from a network resource, such as an enterprise resource 130 or other application or component of an enterprise system 110. The development tool 2408 can be configured to modify the source code of an application 2406 so that the application 2406 can find the container 336 by its resource name on the device 120. The development tool 2408 can be configured to modify the source code of an application 2406 so that the application 2406 writes all data (or perhaps just data relating to the enterprise 110) into the container. For example, the development tool 2408 can be configured to parse the application's source code to find commands for writing data to a memory (e.g., application state data for allowing the user to stop using the application and than later restart the application in the exact state in which the user left it) or reading data from the memory, and to adjust one or more of those portions of the source code to write data into the container 336 and read data from the container 336.
In some embodiments, the SDK's development tool 2408 can embed within the application 2406 the ability to encrypt documents to be stored within the container 336, and/or the ability to decrypt documents obtained from the container 336. The development tool 2408 can embed within the application 2406 an editor for allowing a user 115 of a mobile device 120 to view and/or edit documents obtained from the container 336. The editor can also allow the user 115 to upload edited or newly created documents to the container 336 or to a network resource (e.g., an enterprise resource 130 of the enterprise system 110).
In certain embodiments, the SDK 2404 includes a development tool 2408 that allows an application developer to embed, within an application 2406, mobile device rules such as the rules 214 described above. Further, the development tool 2408 can allow the developer to embed functionality for evaluating the mobile device rules, including querying the device 120 or other network resources for data needed for the evaluation. The embedded functionality can also include remedial actions associated with the mobile device rules, such as the remedial actions 216 described above. The embedded functionality can further include a remedy agent for automatically executing remedial actions on the mobile device, as described above. Compared to the aforementioned mobile device rules 218 (which are described above predominantly as user-specific and device-specific rules), a software developer can embed rules and remedial actions that are customized to a specific application 2406. In certain embodiments, the SDK 2404 includes tools for creating and editing mobile device rules and remedial actions, such as the tools 221 described above. A software developer can use the creating/editing tools to create mobile device rules and remedial actions, and to embed them into an application 2406. Certain embodiments provide an online library of mobile device rules and remedial actions that a software developer can use, with or without modification, and embed within an application 2406.
In certain embodiments, the SDK 2404 includes a development tool 2408 that allows an application developer to embed, within an application 2406, functionality for application fault detection (e.g., using mobile device rules as described above), application performance measurement, and the detection of related events. The embedded functionality can include the logging of detected faults, performance measurements, related events, event times, event locations, and other data within a local storage of a mobile device 120. The development tool 2408 can allow an application 2406 to be configured to report such data to a network resource, such as a component of an enterprise system 110, and/or an analytics service such as the analytics service 414 described above. This embedded functionality can give IT administrators visibility into what is happening on the mobile device, at least as it pertains to the specific application 2406 installed thereon. Further, an analytics service can analyze data across multiple different mobile devices 120 that run the specific application 2406. The embedded functionality can include encrypting the data logged on the mobile device 120 and/or reported to other components via network communications.
In certain embodiments, the SDK 2404 includes a development tool 2408 that allows an application developer to embed, within an application 2406, functionality for cooperating with a meta-application, such as an enterprise system-based meta-application portion 150 and/or a cloud-based meta-application portion 151. The embedded functionality can include discovery procedures for discovering information about the installed application 2406 or a mobile device 120 on which it is installed, and sending the discovered information to the meta-application for use in, e.g., constructing a queriable model (similar to the enterprise model 814 of
Secure Web Browser
Another aspect of certain embodiments involves a web browser within which other mobile device software applications can run. The web browser can be provided with some or all of the enterprise security and other features described herein, and can extend those features for use with the mobile device applications that run within the browser. In this way, the browser can be used to implement BYOD policies while maintaining a desired level of control over applications running on a mobile device 120 of an enterprise user 115. An enterprise can require some or all of its users 115 to install and use this web browser, to reduce enterprise security risks associated with the use of such mobile device applications. Further, in some circumstances, such a web browser can make it unnecessary for application developers to develop different versions of a mobile device application for different mobile device platforms. As mentioned above, the secure browser can also be used to enable mobile device users to access a corporate intranet without the need for a virtual private network (VPN).
Referring to
The web browser 332 can provide some or all of the functionalities described herein. For example, the web browser 332 can include some or all of the functionalities provided by the SDK 2404 and/or enterprise agent 320 described above. Thus, the web browser 332 can be configured to use application tunnels for communications with network resources (such as enterprise resources 130). The web browser 332 can receive (or have embedded) mobile device rules 214 and remedial actions 216 from the mobile device management system 126 or another component of an enterprise system 110. The web browser 332 can alternatively have embedded mobile device rules and remedial actions. The web browser 332 can employ caching and/or compression methods within application tunnels, to improve the user's communication experience as described above. The web browser 332 can be configured to provide credentials to, read from, write to, and/or provide an editor for displaying and editing documents obtained from a secure document container 336 of the mobile device 120, as described above. In certain embodiments, the web browser 332 can implement the secure document container 336. The web browser 332 can prompt a user 115 to supply access credentials prior and verify the access credentials prior to exposing functionality of an application 318 running within the browser 332 to the user 115. Alternatively or additionally, the web browser 332 can cause data stored to the mobile device 120 by an application 318 running in the web browser 332 to be encrypted. The web browser 332 can be configured to participate in a remote control session with a helpdesk operator, as described above. The web browser 332 can be configured to log fault detections, performance measurements, related events, event times, event locations, and other data, and to provide such data to an analytics service as described above in connection with the SDK 2404. The web browser 332 can be configured to engage in communications with a meta-application, again as described above. By providing at least some of these and/or other functionalities, the web browser 332 can make it unnecessary for mobile device application developers to embed such functions within the mobile device applications 318.
In some embodiments, the web browser 332 is configurable so that one or more of these functionalities can be activated or deactivated under defined conditions that can be configured, e.g., remotely by a remote computer system such as the enterprise system 110. Definable conditions include temporal conditions, location conditions, mobile device properties, user properties (e.g., roles 206), and others. A temporal condition can be the time of day. For example, the web browser 332 can be configured to force all mobile traffic (at least for applications 318 configured to launch the browser 332) through application tunnels only during working hours (e.g., 8 am to 5 pm on Monday through Friday), and to send the traffic conventionally outside of those hours. A location condition can be the location of the mobile device 120. For example, the browser 332 can be configured to activate the aforementioned compression and caching features when the device 120 is in a geographical area known to have bad wireless connectivity.
Different web browsers 332 can be created for different mobile device platforms, with each of the browser versions using a single standard for running mobile device applications. This can advantageously allow mobile device application developers to develop mobile device applications 318 in just one programming language, as opposed to creating different versions for the various mobile device platforms. This can substantially reduce the application development workload for developers.
An enterprise can require its users 115 to install the web browser 332 onto their mobile devices 120, and can prohibit the use of other web browsers. The required browser 332 can be configured to direct at least some of the mobile device traffic through application tunnels to an enterprise-controlled tunneling mediator, such as the mediator 224 described above. This gives the enterprise greater control over the traffic, reducing security risks. An enterprise can deploy a mobile device rule 214 that enables a device-resident enterprise agent 320 or the web browser 332 itself to detect the installation and/or use of a prohibited web browser on the mobile device 120. An associated remedial action 216 can prevent the usage of the prohibited web browser according to methods described above, such as by uninstalling it, preventing it from running, etc.
In some embodiments, the secure web browser 332 can be configured to direct some or all web surfing requests to a content-filtering server as described above.
Modifying Behaviors of Pre-Existing Mobile Applications
A system and process will now be described for enabling non-developers, such as members of a company's IT department, to add to or otherwise modify the behaviors of an existing mobile application, such as an Android, IOS, or Windows Mobile application. The system and process can be used, as one example, to create different versions of a mobile application (with different privileges, access rights, etc.) based on a user's role within the enterprise. For instance, different versions of the mobile application can be created for different job categories (e.g., executive, non-executive employee, intern, etc.) and/or different departments (sales, IT, human resources, etc.). The processes described in this section can be implemented in an application modification or “wrapping” tool or utility that is made available to enterprises that use the disclosed system. This utility may, for example, be hosted on a server (e.g., as a web service) that is accessible to enterprises, or may be provided to the enterprises (e.g., as a PC application).
In a typical use case scenario, the mobile application to be modified is a custom application developed for a particular enterprise. However, this need not be the case. For example, the disclosed system and process are also applicable to commercially available mobile applications available in app stores. The mobile applications can be modified without being specially written to support or enable such modifications. For example, the developer need not include any special code or functionality in the application to enable or facilitate the modifications, and need not be involved in the disclosed process of modifying the application.
The behaviors that are modified typically include or consist of behaviors that involve standard API calls or classes. The following are examples of some of the types of behaviors that can be added or modified via the disclosed process:
1. The cut-and-paste capability commonly provided through mobile device operating systems, such as Android and IOS, can be disabled within a particular mobile application, such as an application that provides access to confidential corporate data. This behavioral change may be desirable to inhibit employees (or a certain class of employees) from accidentally or maliciously sending or moving confidential data to an unauthorized location.
2. A mobile application that stores its output in a non-encrypted format can be modified to store its output in an encrypted format. In one embodiment, this is accomplished in-part by modifying the mobile application's input/output references to cause the application to use an encryption library to encrypt and decrypt the data it write to or reads from memory. Code may also be injected that causes the mobile application to obtain a key from the enterprise agent for use in encrypting and decrypting the data.
3. A mobile application that uses a certain level or type of encryption can be modified to use a different level or type of encryption. For example, if the Federal Government requires the enterprise to begin using a particular encryption library, an existing mobile application can be modified to effectively replace the existing encryption library with the new one.
4. An enterprise can modify a mobile application to cause it to use a special secure connection to the enterprise's network or enterprise system. For example, the mobile application can be configured to use a secure application tunnel as described above.
5. A mobile application can be modified to add a log-in or other authentication prompt or screen.
6. A mobile application can be configured to log and/or report data regarding its usage. This data may include, for example, the time and duration of use, the location (based, e.g., on GPS coordinates) of use, the application features invoked, the access points accessed, etc. (Existing mobile device operating systems such as Android and IOS provide functionality for enabling applications to obtain these and other types of usage parameters). This usage data may be used by an enterprise to, for example, monitor employee compliance with the enterprise's usage restriction policies, to identify and correct problems with particular enterprise mobile applications, or to determine whether to continue paying for application licenses for particular users. The application usage data collected on a mobile device 120 may, for example, be reported by the enterprise agent 320 to the mobile device management system 126, or some other system, for analysis.
7. A mobile application can be modified to enable an enterprise to remotely initiate deletion of the application's data on a particular mobile device 120 of a particular employee, without affecting other users of the application. As mentioned above, such selective wipe operations may also be executed when, for example, a user fails to enter a valid enterprise passcode a threshold number of times.
8. A mobile application can be modified such that it can only be launched in by a secure launcher 350B (
9. A mobile application can be modified to cause it to launch in a secure virtual machine 350C (
Other examples include disabling offline access, adding URL filtering, adding API filtering, disabling writes to local storage, and preventing documents from being opened in new applications.
As shown in
In a typical use case scenario, a member of a company's IT department uses the control interface 2904 to: select a mobile application to be modified, select the policy or policies to be applied, and initiate the transformation process. The modified application is then distributed to the relevant employees or other users (e.g., through a special application store that is accessible through the enterprise agent, as described above). This process may be repeated with different policy selections to create different versions of the application for different users. The policy library 2902 may, for example, include policy files for implementing some or all of the types of policies described above (and various others).
In block 3004, the analyzer/mapper 2900B analyzes and maps the application code (in smali format) to generate information regarding API calls that will potentially be replaced. In block 3006, the relevant API calls are replaced with new API calls for implementing the selected policy or policies. In addition, the associated code from the policy library 2902 is added. For example, if the cut-and-paste functionality is being disabled, any API calls that are used by the application to access the operating system's cut-and-paste functionality may be removed or replaced.
As one example, a new version of the Java I/O File Input Stream (Java.io.FileInputStream) class may be generated, and all references to the original class may be modified to point to this new version. The new version may, for example, include code for encrypting and decrypting data on file write and read operations, respectively.
In block 3008 of
To provide an additional layer of security, the portions of the code that are modified in the preceding blocks may be obfuscated using obfuscation methods and functions that are known in the art. The use of obfuscation impairs the ability of others to reverse engineer the security functions added to the application. Obfuscation may be applied to the disassembled code (e.g., smali code), or may be applied at a different level.
In block 3010 of
Mobile applications written for the IOS operating system may be modified in a similar manner. Typically, such an application is distributed as an IPA file that includes an executable in Mach-0 format, a P-list, and resources. Once the executable has been disassembled to produce ARM assembly code, it is mapped to identify classes to potentially be replaced, and is then modified by: (1) identifying one or more specific classes to be replaced, (2) adding/modifying the code to replace such class(es), (3) adjusting the class structure to reflect the modifications, so that each new class is a subclass of the original code, and (4) updating the references to point to the new class or classes.
In some embodiments, the above-described process may be augmented with one or more tests for verifying that the mobile application to be modified does not contain malware, or does not otherwise present a risk to enterprise security. One such test involves generating a hash of some or all of the application files, and then comparing this hash to library of hashes that are associated with known malware. If a match is found (indicating that the application likely includes malware), the application modification process may be terminated.
Another such test involves inspecting the API calls and URL requests made by the application to check for suspicious activity. Examples of suspicious activity include reading the personal contacts stored on the device, sending an email to a cloud storage service, and sending location information without first requesting user permission. Based on this analysis, a score (e.g., on a scale of 1 to 100) may be generated that represents the level of risk posed by the mobile application. The modification process may be terminated if this score exceeds a threshold. The score may additionally or alternatively be included in a report that details the suspicious activity detected. The application modification tool may, for example, output this report for review, and may prompt the administrator-user to confirm or indicate whether the modification process should proceed.
The application modification system shown in
The components 2900, 2902, 2904 of the system shown in
Secure Virtual Machine
As mentioned above, one approach for effectively adding a security layer to the enterprise mobile applications is to configure or force such applications to run within a secure VM 350C (
The secure VM 350C can be loaded with its own set of private libraries for storage, networking, policy management, etc. For example, some or all of the data stored by an application running in the secure VM 350C can use a certain encryption library. The secure VM 350C can implement a set of policies (such as authentication, disabling of cut/paste, prevention of access to certain URLs, prevention of access to certain APIs etc.) to control execution of the application within the secure VM 350C.
The secure VM 350C can block the execution of an application running therein based on detecting certain conditions, such as conditions indicative of the application having a virus or being malware. Hooks can be added to the secure VM 350C to prevent programs from being executed when certain conditions are detected. The secure VM 350C can observe the execution characteristics of an application running therein to determine that the application does not have exhibit malicious behavior.
By using a custom VM, all corporate content can essentially be separated from other content stored on the device. Such a custom VM can prevent data or applications from being shared with applications that are executed in the default VM of the mobile device 120. Moreover, the data accessed and/or manipulated by an application running in the custom VM can be stored in the secure data container 336 as described above.
In one embodiment, a single secure VM is provided on the mobile device 120 for running enterprise applications, and can be used to concurrently run multiple enterprise applications concurrently. In another embodiment, multiple secure VMs are provided on the mobile device, such that each enterprise application runs within a separate secure VM. A hybrid of these two approaches is also possible.
A variety of methods can be used to force or configure a pre-existing mobile application to use a secure VM. One such approach involves modifying the mobile application to cause it to use a secure launcher 350B, as described in the preceding section. When the application is launched, the secure launcher launches the secure VM, and then effectively passes the mobile application to the secure VM for execution. Another approach involves modifying the mobile application by replacing references to the operating system's default virtual machine with references to the secure VM. Another approach involves instructing the mobile device's operating system, at the time of installation of the application, to execute the mobile application in the secure VM.
In one embodiment, whenever a mobile application running in the secure VM performs a file read or write operation, the secure VM uses an encryption library to process the data being read or written. The secure VM thereby applies encryption to the enterprise data stored locally by enterprise applications.
Library files used by the secure VM may, in some embodiments, be incorporated into the operating system or otherwise installed on the mobile device with the cooperation of the OS developer, device manufacture/seller, or other party that has the appropriate permission levels for making such additions. The ability to add such library files generally increases the security capabilities of the secure VM, but is not essential.
One benefit of running an application in a secure VM is that the secure VM can be loaded with an alternate set of private libraries for storage, networking, policy management, etc. For example, a library can be loaded that causes all data stored by the application to be encrypted using a certain encryption library. Libraries can also be loaded that, for example, disable cut/copy/paste operations, require user authentication, prevent access to certain URLs, prevent access to certain APIs, etc. The particular libraries that are loaded may, for example, depend on the role or position of the user within the enterprise, the particular application being launched, and/or other criteria.
Another benefit of running an application in a secure or custom VM is that the application's execution can be blocked if the application exhibits suspicious behaviors of the type present in malware or viruses. This may be accomplished by adding hooks to the secure VM to enable an application's execution to be monitored and/or blocked.
The secure or custom VM also provides a mechanism for keeping enterprise content separate from other content stored on the device. For example, through the use of the secure VM, the data stored by an enterprise can be stored in a secure container as described above. This data advantageously is not accessible in unencrypted form to the device's default VM or the applications that run within it.
In the context of the Android OS, one method that can be used to launch an application in the secure VM involves the use of the app_process command to modify the standard launch sequence. For example, a command of the following format may be used once Zygote initializes a child process: execvp(“/system/bin/app_process”, . . . <args> . . . ). (Zygote is a special process that is created when Android boots; once created, it opens a server socket to listen for process creation requests.) This call replaces the old executable image with a fresh one, and enables the secure VM to be loaded with some existing libraries/jars, and with some new libraries/jars that implement, e.g., enterprise policy push, secure storage, and secure networking features. The new instance is not a share of Zygote or any other parent process, but rather is a completely new process with its own execution environment and added set of behaviors. Once the secure VM is loaded, the following steps can be performed to launch the application in the secure VM: (1) the newly created process performs an “attachment” operation; (2) once the ActivityManagerService receives the attach request from the newly created process, it sends the stored intent to it so that ActivityThread will look for the intent in the application's Manifest and will create that Activity; and (3) it then starts running the application. These three steps are the same as the last three steps ordinarily performed when an application is launched in Android. Android Runtime or any other compatible runtime can be loaded in the secure VM such that the application is compatible with the secure VM. This above process can be varied for use with other operating systems by those skilled in the art.
An application can be configured or “marked” to use the secure/custom VM in various ways. For example, in the context of Android, the standard command “adb shell pm enable (package name)” can be used to set the “enabled” state or flag of the application package. As another example, the enterprise agent installed on the device can, upon installation, make a call to this API and specify all of the applications that will run in the secure/custom VM. When such an application is later launched, the “enabled” flag can be checked (before Zygote is asked to create/fork a new process), and a new secure VM instance can be created based on the state of this flag. This process can be varied for use with other operating systems by those skilled in the art.
Conclusion
The secure mobile gateway 128 and the mobile device management system 126 may each be implemented by a computer system made up of one or more computing devices (e.g., physical servers, workstations, etc.), which may, but need not, be co-located.
Each such computing device typically includes a processor (or multiple processors) that executes program instructions or modules stored in a memory or other non-transitory computer-readable storage medium or device. The secure mobile gateway 128 and mobile device management system 126 may be implemented on common hardware or on separate and distinct hardware.
All of the methods and processes described above may be embodied in, and fully automated via, software code modules executed by one or more computing devices (e.g., smartphones, tablets, other types of mobile devices, physical servers, etc). Each such computing device typically includes a processor (or multiple processors) that executes program instructions or modules stored in a memory or other non-transitory computer-readable storage medium or device. The code modules may be stored in any type of computer-readable storage medium or other computer storage device. Some or all of the methods may alternatively be embodied in specialized computer hardware (e.g., ASICs or FPGAs). Where a given software component (such as the enterprise agent or secure launcher) is herein described as performing or implementing a given function, it should be understood that the component, through executable instructions, instructs one or more processors (e.g., the processor of a mobile device) to perform or implement the function.
Various modifications to the implementations described in this disclosure may be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other implementations without departing from the spirit or scope of this disclosure. Thus, nothing in this specification is intended to imply that any feature, characteristic, or attribute of the disclosed systems and processes is essential.
Certain features that are described in this specification in the context of separate implementations also can be implemented in combination in a single implementation. Conversely, various features that are described in the context of a single implementation also can be implemented in multiple implementations separately or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the implementations described above should not be understood as requiring such separation in all implementations, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
This application is a continuation of U.S. patent application Ser. No. 16/267,357, filed Feb. 4, 2019, which is a continuation of U.S. patent application Ser. No. 15/946,692, filed Apr. 5, 2018, which is a continuation of U.S. patent application Ser. No. 14/875,450, entitled “Secure Execution of Enterprise Applications on Mobile Devices,” filed Oct. 5, 2015, now U.S. Pat. No. 10,044,757, which is a continuation of U.S. patent application Ser. No. 13/649,024, filed Oct. 10, 2012, now U.S. Pat. No. 9,183,380, which claims the benefit of and priority to U.S. Provisional Patent Application No. 61/546,021; U.S. Provisional Patent Application No. 61/546,922; U.S. Provisional Patent Application No. 61/649,134; and U.S. Provisional Patent Application No. 61/702,671. U.S. patent application Ser. No. 13/649,024 also incorporates by reference the entire technical disclosure of U.S. Pat. No. 7,788,536 to Qureshi et al. (“Qureshi '536”). Each of the above-identified patents and patent applications is also incorporated by reference herein in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
5369702 | Shanton | Nov 1994 | A |
5805803 | Birrell et al. | Sep 1998 | A |
6151606 | Mendez | Nov 2000 | A |
6154172 | Piccionelli et al. | Nov 2000 | A |
6314409 | Schneck et al. | Nov 2001 | B2 |
6480096 | Gutman et al. | Nov 2002 | B1 |
6609198 | Wood et al. | Aug 2003 | B1 |
6621766 | Brewer et al. | Sep 2003 | B2 |
6751738 | Wesinger, Jr. et al. | Jun 2004 | B2 |
6859879 | Henn et al. | Feb 2005 | B2 |
6883098 | Roman et al. | Apr 2005 | B1 |
6901588 | Krapf et al. | May 2005 | B1 |
6987906 | Nakama et al. | Jan 2006 | B2 |
7043453 | Stefik et al. | May 2006 | B2 |
7065652 | Xu et al. | Jun 2006 | B1 |
7103915 | Redlich et al. | Sep 2006 | B2 |
7110629 | Bjorkman et al. | Sep 2006 | B2 |
7159120 | Muratov et al. | Jan 2007 | B2 |
7240015 | Karmouch et al. | Jul 2007 | B1 |
7254831 | Saunders et al. | Aug 2007 | B2 |
7263256 | Kim et al. | Aug 2007 | B2 |
7269605 | Nguyen et al. | Sep 2007 | B1 |
7340772 | Panasyuk et al. | Mar 2008 | B2 |
7349913 | Clark et al. | Mar 2008 | B2 |
7350085 | Johnson et al. | Mar 2008 | B2 |
7415498 | Russo et al. | Aug 2008 | B2 |
7437752 | Heard et al. | Oct 2008 | B2 |
7437755 | Farino et al. | Oct 2008 | B2 |
7454102 | Keyser et al. | Nov 2008 | B2 |
7490073 | Qureshi et al. | Feb 2009 | B1 |
7490352 | Kramer et al. | Feb 2009 | B2 |
7496954 | Himawan et al. | Feb 2009 | B1 |
7502861 | Protassov et al. | Mar 2009 | B1 |
7509672 | Horwitz et al. | Mar 2009 | B1 |
7515717 | Doyle et al. | Apr 2009 | B2 |
7526170 | Kishima | Apr 2009 | B2 |
7526800 | Wright et al. | Apr 2009 | B2 |
7529923 | Chartrand et al. | May 2009 | B2 |
7574090 | Shimooka | Aug 2009 | B2 |
7590684 | Herrmann | Sep 2009 | B2 |
7596593 | Mitchell et al. | Sep 2009 | B2 |
7599991 | Vargas et al. | Oct 2009 | B2 |
7600007 | Lewis | Oct 2009 | B1 |
7623846 | Hybre et al. | Nov 2009 | B2 |
7631297 | Childress et al. | Dec 2009 | B2 |
7644377 | Saxe et al. | Jan 2010 | B1 |
7665125 | Heard et al. | Feb 2010 | B2 |
7697737 | Aull et al. | Apr 2010 | B2 |
7716240 | Lim | May 2010 | B2 |
7743260 | Fetik | Jun 2010 | B2 |
7761523 | May et al. | Jul 2010 | B2 |
7765374 | Field et al. | Jul 2010 | B2 |
7774323 | Helfman | Aug 2010 | B2 |
7779408 | Papineau | Aug 2010 | B1 |
7779458 | Heiderscheit et al. | Aug 2010 | B1 |
7788535 | Bussa et al. | Aug 2010 | B2 |
7788536 | Qureshi et al. | Aug 2010 | B1 |
7793333 | Goh et al. | Sep 2010 | B2 |
7865888 | Qureshi et al. | Jan 2011 | B1 |
7890612 | Todd et al. | Feb 2011 | B2 |
7904468 | Neil et al. | Mar 2011 | B2 |
7921182 | Hamasaki, Jr. et al. | Apr 2011 | B2 |
7921303 | Mauro, II | Apr 2011 | B2 |
7945788 | Roberts et al. | May 2011 | B2 |
7950066 | Zuili | May 2011 | B1 |
7966323 | Bocking et al. | Jun 2011 | B2 |
7966652 | Ganesan | Jun 2011 | B2 |
7970386 | Bhat et al. | Jun 2011 | B2 |
7970923 | Pedersen et al. | Jun 2011 | B2 |
8001278 | Huggahalli et al. | Aug 2011 | B2 |
8012219 | Mendez et al. | Sep 2011 | B2 |
8020192 | Wright et al. | Sep 2011 | B2 |
8037421 | Scott et al. | Oct 2011 | B2 |
8037453 | Zawadzki | Oct 2011 | B1 |
8051180 | Mazzaferri et al. | Nov 2011 | B2 |
8060074 | Danford et al. | Nov 2011 | B2 |
8060596 | Wootton et al. | Nov 2011 | B1 |
8078713 | Kim | Dec 2011 | B1 |
8085891 | Owen | Dec 2011 | B2 |
8087062 | Koeda | Dec 2011 | B2 |
8095517 | Sandoval et al. | Jan 2012 | B2 |
8095786 | Kshirsagar et al. | Jan 2012 | B1 |
8103765 | Greifeneder et al. | Jan 2012 | B2 |
8108456 | Chen et al. | Jan 2012 | B2 |
8112601 | Al-Azzawi | Feb 2012 | B2 |
8117589 | Christensen et al. | Feb 2012 | B2 |
8126128 | Hicks, III et al. | Feb 2012 | B1 |
8126506 | Roundtree | Feb 2012 | B2 |
8132242 | Wu | Mar 2012 | B1 |
8179886 | Hume et al. | May 2012 | B2 |
8181010 | Uchil et al. | May 2012 | B1 |
8199507 | Shohet et al. | Jun 2012 | B2 |
8200626 | Katzer et al. | Jun 2012 | B1 |
8214887 | Clark et al. | Jul 2012 | B2 |
8233882 | Rogel | Jul 2012 | B2 |
8237068 | Szaikowski | Aug 2012 | B2 |
8238256 | Nugent | Aug 2012 | B2 |
8239918 | Cohen | Aug 2012 | B1 |
8245285 | Ravishankar et al. | Aug 2012 | B1 |
8259705 | Hume | Sep 2012 | B2 |
8261231 | Hirsch et al. | Sep 2012 | B1 |
8272030 | Annan et al. | Sep 2012 | B1 |
8285681 | Prahlad et al. | Oct 2012 | B2 |
8286233 | Boland | Oct 2012 | B1 |
8296239 | Nonaka | Oct 2012 | B2 |
8296821 | Nakae | Oct 2012 | B2 |
8312518 | Ezell | Nov 2012 | B1 |
8321953 | Jevans | Nov 2012 | B2 |
8332464 | Dispensa et al. | Dec 2012 | B2 |
8359016 | Lindeman et al. | Jan 2013 | B2 |
8365258 | Dispensa | Jan 2013 | B2 |
8365266 | Bogner | Jan 2013 | B2 |
8387110 | Cooper | Feb 2013 | B1 |
8402011 | Bodenhamer | Mar 2013 | B1 |
8406748 | Raleigh et al. | Mar 2013 | B2 |
8418238 | Platt et al. | Apr 2013 | B2 |
8443456 | van der Linden | May 2013 | B2 |
8463128 | Perret-Gentil | Jun 2013 | B2 |
8463253 | Chipalkatti et al. | Jun 2013 | B2 |
8463946 | Ferguson et al. | Jun 2013 | B2 |
8468090 | Lesandro et al. | Jun 2013 | B2 |
8468455 | Jorgensen et al. | Jun 2013 | B2 |
8489685 | Bharadhwaj et al. | Jul 2013 | B2 |
8495746 | Fissel et al. | Jul 2013 | B2 |
8528059 | Labana et al. | Sep 2013 | B1 |
8549656 | Blaisdell et al. | Oct 2013 | B2 |
8560709 | Shokhor et al. | Oct 2013 | B1 |
8578443 | Narain et al. | Nov 2013 | B2 |
8584114 | Rabinovich et al. | Nov 2013 | B2 |
8601562 | Milas | Dec 2013 | B2 |
8612582 | Dare et al. | Dec 2013 | B2 |
8612947 | LeRoux et al. | Dec 2013 | B2 |
8613070 | Borzycki et al. | Dec 2013 | B1 |
8615581 | Dare et al. | Dec 2013 | B2 |
8621620 | Sallam | Dec 2013 | B2 |
8650290 | Dare et al. | Feb 2014 | B2 |
8650303 | Lang et al. | Feb 2014 | B1 |
8650620 | Chawla et al. | Feb 2014 | B2 |
8660530 | Sharp et al. | Feb 2014 | B2 |
8676183 | Sesto | Mar 2014 | B2 |
8687814 | Nord et al. | Apr 2014 | B2 |
8688583 | Boccon-Gibod et al. | Apr 2014 | B2 |
8695060 | Wade et al. | Apr 2014 | B2 |
8713633 | Thomas | Apr 2014 | B2 |
8719898 | Barton et al. | May 2014 | B1 |
8745213 | Dare et al. | Jun 2014 | B2 |
8756311 | Dare et al. | Jun 2014 | B2 |
8782744 | Fuller et al. | Jul 2014 | B1 |
8788655 | Dare et al. | Jul 2014 | B2 |
8793758 | Raleigh et al. | Jul 2014 | B2 |
8799994 | Barton et al. | Aug 2014 | B2 |
8806570 | Barton et al. | Aug 2014 | B2 |
8819772 | Bettini et al. | Aug 2014 | B2 |
8825863 | Hansson et al. | Sep 2014 | B2 |
8843734 | Lim | Sep 2014 | B2 |
8849348 | Xiao et al. | Sep 2014 | B2 |
8850010 | Qureshi | Sep 2014 | B1 |
8850049 | Qureshi | Sep 2014 | B1 |
8850177 | Brown et al. | Sep 2014 | B2 |
8850423 | Barkie et al. | Sep 2014 | B2 |
8850434 | Butikofer et al. | Sep 2014 | B1 |
8856322 | Dare et al. | Oct 2014 | B2 |
8856909 | Chickering | Oct 2014 | B1 |
8856950 | Kim et al. | Oct 2014 | B2 |
8863297 | Sharma et al. | Oct 2014 | B2 |
8863298 | Akella et al. | Oct 2014 | B2 |
8863299 | Sharma et al. | Oct 2014 | B2 |
8868901 | Kim et al. | Oct 2014 | B2 |
8869235 | Qureshi et al. | Oct 2014 | B2 |
8869262 | Mullick et al. | Oct 2014 | B2 |
8881228 | Qureshi | Nov 2014 | B2 |
8881229 | Barton et al. | Nov 2014 | B2 |
8885096 | Vakil | Nov 2014 | B2 |
8918834 | Samuelsson | Dec 2014 | B1 |
8931038 | Pulier et al. | Jan 2015 | B2 |
8931042 | Weiss | Jan 2015 | B1 |
8949929 | Kelly et al. | Feb 2015 | B2 |
8972980 | Banga et al. | Mar 2015 | B2 |
8973088 | Leung | Mar 2015 | B1 |
9003387 | Van Camp et al. | Apr 2015 | B2 |
9043242 | Kuriya et al. | May 2015 | B2 |
9077796 | Gittleman et al. | Jul 2015 | B2 |
9098715 | Spear, Jr. et al. | Aug 2015 | B1 |
9135418 | Wade et al. | Sep 2015 | B2 |
9143943 | Draluk et al. | Sep 2015 | B2 |
9165139 | Wade et al. | Oct 2015 | B2 |
9171139 | Newell | Oct 2015 | B2 |
9178981 | Cho et al. | Nov 2015 | B2 |
9183380 | Qureshi | Nov 2015 | B2 |
9197672 | Dobson et al. | Nov 2015 | B2 |
9213850 | Barton et al. | Dec 2015 | B2 |
9256758 | Draluk et al. | Feb 2016 | B2 |
9280377 | Lang et al. | Mar 2016 | B2 |
9311509 | Casper et al. | Apr 2016 | B2 |
9355253 | Kellerman et al. | May 2016 | B2 |
9356895 | Chiu | May 2016 | B2 |
9367692 | Brown et al. | Jun 2016 | B2 |
9509592 | Draluk et al. | Nov 2016 | B2 |
9521147 | Barton et al. | Dec 2016 | B2 |
9577985 | Deasy et al. | Feb 2017 | B2 |
9659169 | Weiss | May 2017 | B2 |
9712530 | White et al. | Jul 2017 | B2 |
9716689 | Andress et al. | Jul 2017 | B2 |
9753746 | Krzyzanowski et al. | Sep 2017 | B2 |
9754092 | Newell | Sep 2017 | B2 |
9772875 | Draluk et al. | Sep 2017 | B2 |
9779250 | Hui et al. | Oct 2017 | B1 |
9781594 | Hailpern | Oct 2017 | B2 |
9971585 | Walker et al. | May 2018 | B2 |
9973489 | Barton et al. | May 2018 | B2 |
10044757 | Qureshi | Aug 2018 | B2 |
10402546 | Qureshi | Sep 2019 | B1 |
10469534 | Qureshi | Nov 2019 | B2 |
10476885 | Lang et al. | Nov 2019 | B2 |
20010027383 | Maliszewski | Oct 2001 | A1 |
20010042045 | Howard et al. | Nov 2001 | A1 |
20010044786 | Ishibashi | Nov 2001 | A1 |
20010053223 | Ishibashi | Dec 2001 | A1 |
20020112047 | Kushwaha | Aug 2002 | A1 |
20020112076 | Rueda | Aug 2002 | A1 |
20020120607 | Price et al. | Aug 2002 | A1 |
20020138287 | Chen | Sep 2002 | A1 |
20020180790 | Broussard | Dec 2002 | A1 |
20030031319 | Abe et al. | Feb 2003 | A1 |
20030037103 | Salmi et al. | Feb 2003 | A1 |
20030046366 | Pardikar et al. | Mar 2003 | A1 |
20030055735 | Cameron | Mar 2003 | A1 |
20030065947 | Song et al. | Apr 2003 | A1 |
20030083954 | Namba | May 2003 | A1 |
20030103075 | Rosselot | Jun 2003 | A1 |
20030120928 | Cato | Jun 2003 | A1 |
20030131245 | Linderman | Jul 2003 | A1 |
20030157947 | Fiatal et al. | Aug 2003 | A1 |
20030188193 | Venkataramappa | Oct 2003 | A1 |
20030221184 | Gunjal et al. | Nov 2003 | A1 |
20030229623 | Chang et al. | Dec 2003 | A1 |
20030229786 | Hollis et al. | Dec 2003 | A1 |
20030236861 | Johnson et al. | Dec 2003 | A1 |
20040006706 | Erlingsson | Jan 2004 | A1 |
20040010575 | Wookey | Jan 2004 | A1 |
20040010579 | Freese | Jan 2004 | A1 |
20040012041 | West et al. | Jan 2004 | A1 |
20040083273 | Madison et al. | Apr 2004 | A1 |
20040096152 | Nakama et al. | May 2004 | A1 |
20040107342 | Pham et al. | Jun 2004 | A1 |
20040111640 | Baum | Jun 2004 | A1 |
20040114853 | Bjorkman et al. | Jun 2004 | A1 |
20040117651 | Little et al. | Jun 2004 | A1 |
20040123153 | Wright et al. | Jun 2004 | A1 |
20040205233 | Dunk | Oct 2004 | A1 |
20040230807 | Baird et al. | Nov 2004 | A1 |
20040243349 | Greifeneder et al. | Dec 2004 | A1 |
20040243699 | Koclanes et al. | Dec 2004 | A1 |
20050027843 | Bozak et al. | Feb 2005 | A1 |
20050027862 | Nguyen et al. | Feb 2005 | A1 |
20050055578 | Wright et al. | Mar 2005 | A1 |
20050063637 | Mershon et al. | Mar 2005 | A1 |
20050076082 | Le Pennec et al. | Apr 2005 | A1 |
20050076085 | Budd et al. | Apr 2005 | A1 |
20050086328 | Landram et al. | Apr 2005 | A1 |
20050097608 | Penke et al. | May 2005 | A1 |
20050111354 | Asano et al. | May 2005 | A1 |
20050120101 | Nocera | Jun 2005 | A1 |
20050149340 | Murakami et al. | Jul 2005 | A1 |
20050166264 | Yamada et al. | Jul 2005 | A1 |
20050172241 | Daniels et al. | Aug 2005 | A1 |
20050193222 | Greene | Sep 2005 | A1 |
20050197859 | Wilson | Sep 2005 | A1 |
20050210252 | Freeman et al. | Sep 2005 | A1 |
20050210289 | Brown | Sep 2005 | A1 |
20050255838 | Adams et al. | Nov 2005 | A1 |
20050262429 | Elder et al. | Nov 2005 | A1 |
20050265548 | Tsuchimura | Dec 2005 | A1 |
20050273592 | Pryor et al. | Dec 2005 | A1 |
20060005250 | Chu et al. | Jan 2006 | A1 |
20060031679 | Soltis et al. | Feb 2006 | A1 |
20060048142 | Roese et al. | Mar 2006 | A1 |
20060052395 | Johnson | Mar 2006 | A1 |
20060070114 | Wood et al. | Mar 2006 | A1 |
20060075036 | Malik | Apr 2006 | A1 |
20060075123 | Burr et al. | Apr 2006 | A1 |
20060080432 | Spataro et al. | Apr 2006 | A1 |
20060085826 | Funk et al. | Apr 2006 | A1 |
20060094400 | Beachem et al. | May 2006 | A1 |
20060105479 | Cave et al. | May 2006 | A1 |
20060112428 | Etelapera | May 2006 | A1 |
20060117104 | Taniguchi et al. | Jun 2006 | A1 |
20060120526 | Boucher et al. | Jun 2006 | A1 |
20060123101 | Buccella | Jun 2006 | A1 |
20060141985 | Patel et al. | Jun 2006 | A1 |
20060147043 | Mann et al. | Jul 2006 | A1 |
20060161635 | Lamkin et al. | Jul 2006 | A1 |
20060161783 | Aiken et al. | Jul 2006 | A1 |
20060185004 | Song et al. | Aug 2006 | A1 |
20060200814 | Kontinen et al. | Sep 2006 | A1 |
20060224742 | Shahbazi | Oct 2006 | A1 |
20060225033 | Ye | Oct 2006 | A1 |
20060225142 | Moon | Oct 2006 | A1 |
20060242685 | Heard et al. | Oct 2006 | A1 |
20060248577 | Beghian et al. | Nov 2006 | A1 |
20060253508 | Colton et al. | Nov 2006 | A1 |
20060256739 | Seier et al. | Nov 2006 | A1 |
20060259755 | Kenoyer | Nov 2006 | A1 |
20060277590 | Limont et al. | Dec 2006 | A1 |
20060282876 | Shelest et al. | Dec 2006 | A1 |
20060282889 | Brown et al. | Dec 2006 | A1 |
20070005713 | LeVasseur et al. | Jan 2007 | A1 |
20070006289 | Limont et al. | Jan 2007 | A1 |
20070006327 | Lal et al. | Jan 2007 | A1 |
20070011749 | Allison et al. | Jan 2007 | A1 |
20070016771 | Allison et al. | Jan 2007 | A1 |
20070016907 | Benedetti et al. | Jan 2007 | A1 |
20070024646 | Saarinen et al. | Feb 2007 | A1 |
20070038571 | Meyer | Feb 2007 | A1 |
20070038764 | Maillard | Feb 2007 | A1 |
20070049297 | Gopalan et al. | Mar 2007 | A1 |
20070054627 | Wormald | Mar 2007 | A1 |
20070056043 | Onyon et al. | Mar 2007 | A1 |
20070072598 | Coleman et al. | Mar 2007 | A1 |
20070074033 | Adams et al. | Mar 2007 | A1 |
20070079249 | Pall et al. | Apr 2007 | A1 |
20070088825 | Hodul | Apr 2007 | A1 |
20070094220 | McCaffrey | Apr 2007 | A1 |
20070100938 | Bagley et al. | May 2007 | A1 |
20070109983 | Shankar et al. | May 2007 | A1 |
20070112574 | Greene | May 2007 | A1 |
20070118558 | Kahandaliyanage | May 2007 | A1 |
20070136471 | Jardin | Jun 2007 | A1 |
20070143515 | Kershaw et al. | Jun 2007 | A1 |
20070156659 | Lim | Jul 2007 | A1 |
20070156897 | Lim | Jul 2007 | A1 |
20070162359 | Gokhale | Jul 2007 | A1 |
20070180447 | Mazzaferri et al. | Aug 2007 | A1 |
20070180450 | Croft et al. | Aug 2007 | A1 |
20070180509 | Swartz et al. | Aug 2007 | A1 |
20070186106 | Ting et al. | Aug 2007 | A1 |
20070198656 | Mazzaferri et al. | Aug 2007 | A1 |
20070199051 | Parikh et al. | Aug 2007 | A1 |
20070204153 | Tome et al. | Aug 2007 | A1 |
20070204166 | Tome et al. | Aug 2007 | A1 |
20070208936 | Ramos Robles | Sep 2007 | A1 |
20070214272 | Isaacson | Sep 2007 | A1 |
20070220061 | Tirosh | Sep 2007 | A1 |
20070226034 | Khan | Sep 2007 | A1 |
20070226225 | Yiu et al. | Sep 2007 | A1 |
20070226227 | Helfman | Sep 2007 | A1 |
20070226773 | Pouliot | Sep 2007 | A1 |
20070244987 | Pedersen et al. | Oct 2007 | A1 |
20070245409 | Harris | Oct 2007 | A1 |
20070248085 | Volpano | Oct 2007 | A1 |
20070250904 | Waller | Oct 2007 | A1 |
20070253663 | Keyser et al. | Nov 2007 | A1 |
20070262327 | Shimooka | Nov 2007 | A1 |
20070266421 | Vaidya et al. | Nov 2007 | A1 |
20070266422 | Germano et al. | Nov 2007 | A1 |
20070283324 | Geisinger | Dec 2007 | A1 |
20080016504 | Cheng | Jan 2008 | A1 |
20080027871 | Seo | Jan 2008 | A1 |
20080027982 | Subramanian et al. | Jan 2008 | A1 |
20080040775 | Hoff et al. | Feb 2008 | A1 |
20080046580 | Lafuente et al. | Feb 2008 | A1 |
20080047006 | Jeong et al. | Feb 2008 | A1 |
20080047015 | Cornwall et al. | Feb 2008 | A1 |
20080052395 | Wright et al. | Feb 2008 | A1 |
20080066020 | Boss et al. | Mar 2008 | A1 |
20080066177 | Bender | Mar 2008 | A1 |
20080070495 | Stricklen et al. | Mar 2008 | A1 |
20080085075 | Kishima | Apr 2008 | A1 |
20080092215 | Soukup et al. | Apr 2008 | A1 |
20080127292 | Cooper et al. | May 2008 | A1 |
20080127327 | Carrasco | May 2008 | A1 |
20080133729 | Fridman et al. | Jun 2008 | A1 |
20080134292 | Ariel et al. | Jun 2008 | A1 |
20080141335 | Thomas | Jun 2008 | A1 |
20080163188 | Siskind et al. | Jul 2008 | A1 |
20080163286 | Rudolph et al. | Jul 2008 | A1 |
20080167002 | Kim et al. | Jul 2008 | A1 |
20080178169 | Grossner et al. | Jul 2008 | A1 |
20080178300 | Brown et al. | Jul 2008 | A1 |
20080183820 | Golovchinsky et al. | Jul 2008 | A1 |
20080183996 | Field et al. | Jul 2008 | A1 |
20080192739 | Carrasco | Aug 2008 | A1 |
20080194296 | Roundtree | Aug 2008 | A1 |
20080196038 | Antonio et al. | Aug 2008 | A1 |
20080196082 | Sandoval et al. | Aug 2008 | A1 |
20080209224 | Lord | Aug 2008 | A1 |
20080209506 | Ghai et al. | Aug 2008 | A1 |
20080209564 | Gayde et al. | Aug 2008 | A1 |
20080214300 | Williams et al. | Sep 2008 | A1 |
20080222707 | Pathuri | Sep 2008 | A1 |
20080229117 | Shin et al. | Sep 2008 | A1 |
20080235760 | Broussard et al. | Sep 2008 | A1 |
20080263224 | Gilhuly et al. | Oct 2008 | A1 |
20080270240 | Chu | Oct 2008 | A1 |
20080271111 | Cox et al. | Oct 2008 | A1 |
20080276302 | Touboul | Nov 2008 | A1 |
20080282314 | Abzarian et al. | Nov 2008 | A1 |
20080282355 | Nemazi | Nov 2008 | A1 |
20080301639 | Bell et al. | Dec 2008 | A1 |
20080304665 | Ma et al. | Dec 2008 | A1 |
20080310623 | Phillips, II et al. | Dec 2008 | A1 |
20080313257 | Allen et al. | Dec 2008 | A1 |
20080313527 | Chen | Dec 2008 | A1 |
20080313648 | Wang et al. | Dec 2008 | A1 |
20080317292 | Baker et al. | Dec 2008 | A1 |
20080318616 | Chipalkatti et al. | Dec 2008 | A1 |
20090006232 | Gallagher et al. | Jan 2009 | A1 |
20090028049 | Boudreau et al. | Jan 2009 | A1 |
20090030968 | Boudreau et al. | Jan 2009 | A1 |
20090037686 | Mendonca | Feb 2009 | A1 |
20090037976 | Teo et al. | Feb 2009 | A1 |
20090049425 | Liepert et al. | Feb 2009 | A1 |
20090051755 | Toya et al. | Feb 2009 | A1 |
20090064292 | Carter et al. | Mar 2009 | A1 |
20090067079 | Al-Azzawi | Mar 2009 | A1 |
20090075630 | McLean | Mar 2009 | A1 |
20090077638 | Norman et al. | Mar 2009 | A1 |
20090083374 | Saint Clair | Mar 2009 | A1 |
20090100060 | Livnat et al. | Apr 2009 | A1 |
20090119773 | D'Amore et al. | May 2009 | A1 |
20090121890 | Brown et al. | May 2009 | A1 |
20090170532 | Lee et al. | Jul 2009 | A1 |
20090172657 | Makelainen et al. | Jul 2009 | A1 |
20090172789 | Band et al. | Jul 2009 | A1 |
20090178111 | Moriconi et al. | Jul 2009 | A1 |
20090183227 | Isaacs et al. | Jul 2009 | A1 |
20090187763 | Freericks et al. | Jul 2009 | A1 |
20090199178 | Keller et al. | Aug 2009 | A1 |
20090199277 | Norman et al. | Aug 2009 | A1 |
20090210360 | Sankar | Aug 2009 | A1 |
20090210934 | Innes | Aug 2009 | A1 |
20090221278 | Spelta et al. | Sep 2009 | A1 |
20090222880 | Mayer et al. | Sep 2009 | A1 |
20090228714 | Fiske et al. | Sep 2009 | A1 |
20090228954 | Hu et al. | Sep 2009 | A1 |
20090228963 | Pearce et al. | Sep 2009 | A1 |
20090249359 | Caunter et al. | Oct 2009 | A1 |
20090253410 | Fitzgerald et al. | Oct 2009 | A1 |
20090253412 | Sigmund et al. | Oct 2009 | A1 |
20090263923 | Shimooka | Oct 2009 | A1 |
20090265554 | Robles et al. | Oct 2009 | A1 |
20090271355 | Sekiguchi | Oct 2009 | A1 |
20090282127 | Leblanc et al. | Nov 2009 | A1 |
20090282403 | Poole | Nov 2009 | A1 |
20090282473 | Karlson et al. | Nov 2009 | A1 |
20090319772 | Singh et al. | Dec 2009 | A1 |
20090323916 | O'Sullivan et al. | Dec 2009 | A1 |
20090325615 | McKay et al. | Dec 2009 | A1 |
20090327885 | Aoki et al. | Dec 2009 | A1 |
20090327994 | Christensen et al. | Dec 2009 | A1 |
20100049874 | Chene et al. | Feb 2010 | A1 |
20100050092 | Williams et al. | Feb 2010 | A1 |
20100054463 | Tsan | Mar 2010 | A1 |
20100058352 | Esfahany et al. | Mar 2010 | A1 |
20100064341 | Aldera | Mar 2010 | A1 |
20100064354 | Irvine | Mar 2010 | A1 |
20100077445 | Schneider et al. | Mar 2010 | A1 |
20100077469 | Furman et al. | Mar 2010 | A1 |
20100083358 | Govindarajan et al. | Apr 2010 | A1 |
20100100825 | Sharoni | Apr 2010 | A1 |
20100100925 | Hinton | Apr 2010 | A1 |
20100124196 | Bonar et al. | May 2010 | A1 |
20100125730 | Dodgson et al. | May 2010 | A1 |
20100146523 | Brigaut et al. | Jun 2010 | A1 |
20100146582 | Jaber et al. | Jun 2010 | A1 |
20100150341 | Dodgson et al. | Jun 2010 | A1 |
20100153739 | Guymon, Jr. | Jun 2010 | A1 |
20100154025 | Esteve Balducci et al. | Jun 2010 | A1 |
20100162232 | Bhatia et al. | Jun 2010 | A1 |
20100173607 | Thornton et al. | Jul 2010 | A1 |
20100180346 | Nicolson et al. | Jul 2010 | A1 |
20100192212 | Raleigh | Jul 2010 | A1 |
20100218167 | Turner et al. | Aug 2010 | A1 |
20100228825 | Hegde et al. | Sep 2010 | A1 |
20100228961 | Burns et al. | Sep 2010 | A1 |
20100229197 | Yi et al. | Sep 2010 | A1 |
20100235216 | Hehmeyer et al. | Sep 2010 | A1 |
20100235881 | Liu et al. | Sep 2010 | A1 |
20100242037 | Xie | Sep 2010 | A1 |
20100248699 | Dumais | Sep 2010 | A1 |
20100257261 | Wallis | Oct 2010 | A1 |
20100257580 | Zhao et al. | Oct 2010 | A1 |
20100262959 | Bruno et al. | Oct 2010 | A1 |
20100269156 | Hohlfeld et al. | Oct 2010 | A1 |
20100279652 | Sharp et al. | Nov 2010 | A1 |
20100281528 | Hayton et al. | Nov 2010 | A1 |
20100287619 | Chase | Nov 2010 | A1 |
20100299152 | Batchu et al. | Nov 2010 | A1 |
20100299376 | Batchu et al. | Nov 2010 | A1 |
20100317336 | Ferren et al. | Dec 2010 | A1 |
20100318992 | Kushwaha et al. | Dec 2010 | A1 |
20100319053 | Gharabally | Dec 2010 | A1 |
20100325097 | Er et al. | Dec 2010 | A1 |
20100331017 | Ariga | Dec 2010 | A1 |
20100333165 | Basak et al. | Dec 2010 | A1 |
20110030044 | Kranendonk et al. | Feb 2011 | A1 |
20110072492 | Mohler et al. | Mar 2011 | A1 |
20110078675 | Van Camp et al. | Mar 2011 | A1 |
20110082900 | Nagpal et al. | Apr 2011 | A1 |
20110099602 | Apparao | Apr 2011 | A1 |
20110103374 | Lajoie | May 2011 | A1 |
20110145360 | Sheshagiri et al. | Jun 2011 | A1 |
20110145833 | De Los Reyes et al. | Jun 2011 | A1 |
20110154266 | Friend et al. | Jun 2011 | A1 |
20110154305 | LeRoux et al. | Jun 2011 | A1 |
20110154477 | Parla et al. | Jun 2011 | A1 |
20110154498 | Fissel et al. | Jun 2011 | A1 |
20110167492 | Ghosh et al. | Jul 2011 | A1 |
20110179484 | Tuvell et al. | Jul 2011 | A1 |
20110208797 | Kim | Aug 2011 | A1 |
20110208838 | Thomas et al. | Aug 2011 | A1 |
20110209064 | Jorgensen et al. | Aug 2011 | A1 |
20110209194 | Kennedy | Aug 2011 | A1 |
20110219124 | Allen et al. | Sep 2011 | A1 |
20110225417 | Maharajh et al. | Sep 2011 | A1 |
20110230211 | Kim et al. | Sep 2011 | A1 |
20110239125 | Kristensen et al. | Sep 2011 | A1 |
20110252230 | Segre | Oct 2011 | A1 |
20110252232 | De Atley et al. | Oct 2011 | A1 |
20110252459 | Walsh et al. | Oct 2011 | A1 |
20110258301 | McCormick et al. | Oct 2011 | A1 |
20110264530 | Santangelo | Oct 2011 | A1 |
20110270963 | Saito et al. | Nov 2011 | A1 |
20110271279 | Pate | Nov 2011 | A1 |
20110276683 | Goldschlag | Nov 2011 | A1 |
20110276699 | Pedersen | Nov 2011 | A1 |
20110277026 | Agarwal et al. | Nov 2011 | A1 |
20110277027 | Hayton | Nov 2011 | A1 |
20110283347 | Bhuta et al. | Nov 2011 | A1 |
20110295970 | Miyazawa | Dec 2011 | A1 |
20110296333 | Bateman et al. | Dec 2011 | A1 |
20110314467 | Pearson | Dec 2011 | A1 |
20110314534 | James | Dec 2011 | A1 |
20120002813 | Wei et al. | Jan 2012 | A1 |
20120005476 | Wei et al. | Jan 2012 | A1 |
20120005724 | Lee | Jan 2012 | A1 |
20120005745 | Wei et al. | Jan 2012 | A1 |
20120005746 | Wei et al. | Jan 2012 | A1 |
20120023378 | Nomura et al. | Jan 2012 | A1 |
20120023506 | Maeckel et al. | Jan 2012 | A1 |
20120023556 | Schultz et al. | Jan 2012 | A1 |
20120030649 | Chapa | Feb 2012 | A1 |
20120036347 | Swanson et al. | Feb 2012 | A1 |
20120036370 | Lim | Feb 2012 | A1 |
20120042036 | Lau et al. | Feb 2012 | A1 |
20120047425 | Ahmed | Feb 2012 | A1 |
20120052954 | Zhu et al. | Mar 2012 | A1 |
20120054853 | Gupta et al. | Mar 2012 | A1 |
20120066691 | Branton | Mar 2012 | A1 |
20120079475 | Hicks, III et al. | Mar 2012 | A1 |
20120079556 | Wahl | Mar 2012 | A1 |
20120079603 | Brown et al. | Mar 2012 | A1 |
20120079609 | Bender et al. | Mar 2012 | A1 |
20120084184 | Raleigh | Apr 2012 | A1 |
20120084792 | Benedek et al. | Apr 2012 | A1 |
20120088540 | Smith et al. | Apr 2012 | A1 |
20120092374 | Sarnoff | Apr 2012 | A1 |
20120096533 | Boulos et al. | Apr 2012 | A1 |
20120096544 | Hosoda | Apr 2012 | A1 |
20120099219 | Al-Azzawi | Apr 2012 | A1 |
20120102195 | Adams et al. | Apr 2012 | A1 |
20120102564 | Schentrup et al. | Apr 2012 | A1 |
20120109384 | Stepanian | May 2012 | A1 |
20120110317 | Scheer et al. | May 2012 | A1 |
20120117622 | Gronholm et al. | May 2012 | A1 |
20120129503 | Lindeman et al. | May 2012 | A1 |
20120131116 | Tu et al. | May 2012 | A1 |
20120131343 | Choi et al. | May 2012 | A1 |
20120131685 | Broch et al. | May 2012 | A1 |
20120137364 | Blaisdell | May 2012 | A1 |
20120151033 | Baliga et al. | Jun 2012 | A1 |
20120154265 | Kim et al. | Jun 2012 | A1 |
20120154413 | Kim et al. | Jun 2012 | A1 |
20120157165 | Kim et al. | Jun 2012 | A1 |
20120157166 | Kim et al. | Jun 2012 | A1 |
20120159139 | Kim et al. | Jun 2012 | A1 |
20120159334 | Messerly et al. | Jun 2012 | A1 |
20120165075 | Kim et al. | Jun 2012 | A1 |
20120166516 | Simmons et al. | Jun 2012 | A1 |
20120166524 | Watakabe et al. | Jun 2012 | A1 |
20120166966 | Wood et al. | Jun 2012 | A1 |
20120166997 | Cho et al. | Jun 2012 | A1 |
20120167118 | Pingili et al. | Jun 2012 | A1 |
20120167159 | Mefford, Jr. et al. | Jun 2012 | A1 |
20120173687 | Brown et al. | Jul 2012 | A1 |
20120174237 | Krzyzanowski | Jul 2012 | A1 |
20120179802 | Narasimhan et al. | Jul 2012 | A1 |
20120179904 | Dunn | Jul 2012 | A1 |
20120179909 | Sagi et al. | Jul 2012 | A1 |
20120185910 | Miettinen et al. | Jul 2012 | A1 |
20120185913 | Martinez et al. | Jul 2012 | A1 |
20120191716 | Omoigui | Jul 2012 | A1 |
20120192181 | Gilbert et al. | Jul 2012 | A1 |
20120198570 | Joa et al. | Aug 2012 | A1 |
20120204220 | Lavi | Aug 2012 | A1 |
20120209949 | Deliyannis et al. | Aug 2012 | A1 |
20120210068 | Joshi et al. | Aug 2012 | A1 |
20120210443 | Blaisdell et al. | Aug 2012 | A1 |
20120214472 | Tadayon et al. | Aug 2012 | A1 |
20120222120 | Rim et al. | Aug 2012 | A1 |
20120233130 | Vedachalam et al. | Sep 2012 | A1 |
20120238206 | Singh et al. | Sep 2012 | A1 |
20120238257 | Anson | Sep 2012 | A1 |
20120240183 | Sinha | Sep 2012 | A1 |
20120246191 | Xiong | Sep 2012 | A1 |
20120246484 | Blaisdell et al. | Sep 2012 | A1 |
20120246731 | Blaisdell et al. | Sep 2012 | A1 |
20120250106 | Kiran Kannambadi et al. | Oct 2012 | A1 |
20120254768 | Aggarwal | Oct 2012 | A1 |
20120255026 | Baca et al. | Oct 2012 | A1 |
20120265528 | Gruber et al. | Oct 2012 | A1 |
20120265792 | Salters | Oct 2012 | A1 |
20120270522 | Laudermilch et al. | Oct 2012 | A1 |
20120272221 | Pessoa et al. | Oct 2012 | A1 |
20120278454 | Stewart et al. | Nov 2012 | A1 |
20120284325 | Erb | Nov 2012 | A1 |
20120284529 | Crowe | Nov 2012 | A1 |
20120284779 | Ingrassia, Jr. et al. | Nov 2012 | A1 |
20120290694 | Marl et al. | Nov 2012 | A9 |
20120291114 | Poliashenko et al. | Nov 2012 | A1 |
20120303476 | Krzyzanowski et al. | Nov 2012 | A1 |
20120303778 | Ahiska et al. | Nov 2012 | A1 |
20120304310 | Blaisdell | Nov 2012 | A1 |
20120311154 | Morgan | Dec 2012 | A1 |
20120311659 | Narain et al. | Dec 2012 | A1 |
20120317185 | Shah et al. | Dec 2012 | A1 |
20120321087 | Fleischman et al. | Dec 2012 | A1 |
20120324568 | Wyatt et al. | Dec 2012 | A1 |
20120331088 | O'Hare et al. | Dec 2012 | A1 |
20120331527 | Walters et al. | Dec 2012 | A1 |
20120331528 | Fu et al. | Dec 2012 | A1 |
20130002725 | Kim et al. | Jan 2013 | A1 |
20130007245 | Malik et al. | Jan 2013 | A1 |
20130007842 | Park et al. | Jan 2013 | A1 |
20130013653 | Thompson | Jan 2013 | A1 |
20130013688 | Wang et al. | Jan 2013 | A1 |
20130013727 | Walker | Jan 2013 | A1 |
20130013932 | Kong et al. | Jan 2013 | A1 |
20130014239 | Pieczul et al. | Jan 2013 | A1 |
20130014267 | Farrugia et al. | Jan 2013 | A1 |
20130019013 | Rice et al. | Jan 2013 | A1 |
20130019018 | Rice | Jan 2013 | A1 |
20130019282 | Rice et al. | Jan 2013 | A1 |
20130024424 | Prahlad et al. | Jan 2013 | A1 |
20130024928 | Burke et al. | Jan 2013 | A1 |
20130031544 | Sridharan et al. | Jan 2013 | A1 |
20130035063 | Fisk et al. | Feb 2013 | A1 |
20130042294 | Colvin et al. | Feb 2013 | A1 |
20130042295 | Kelly et al. | Feb 2013 | A1 |
20130054674 | Myers et al. | Feb 2013 | A1 |
20130054895 | Tuch et al. | Feb 2013 | A1 |
20130054922 | Tuch et al. | Feb 2013 | A1 |
20130054962 | Chawla et al. | Feb 2013 | A1 |
20130055378 | Chang et al. | Feb 2013 | A1 |
20130059284 | Giedgowd, Jr. et al. | Mar 2013 | A1 |
20130066960 | Fieremans et al. | Mar 2013 | A1 |
20130066978 | Bentley et al. | Mar 2013 | A1 |
20130067229 | German et al. | Mar 2013 | A1 |
20130067564 | Fok Ah Chuen | Mar 2013 | A1 |
20130074142 | Brennan et al. | Mar 2013 | A1 |
20130078949 | Pecen et al. | Mar 2013 | A1 |
20130081104 | Jung et al. | Mar 2013 | A1 |
20130084847 | Tibbitts et al. | Apr 2013 | A1 |
20130086151 | Guo-Boynton | Apr 2013 | A1 |
20130086479 | Brown | Apr 2013 | A1 |
20130086684 | Mohler | Apr 2013 | A1 |
20130088605 | Quarfordt et al. | Apr 2013 | A1 |
20130091205 | Kotler et al. | Apr 2013 | A1 |
20130091440 | Kotler et al. | Apr 2013 | A1 |
20130091543 | Wade et al. | Apr 2013 | A1 |
20130095785 | Sadana et al. | Apr 2013 | A1 |
20130097296 | Gehrmann et al. | Apr 2013 | A1 |
20130097421 | Lim | Apr 2013 | A1 |
20130097660 | Das et al. | Apr 2013 | A1 |
20130103797 | Park et al. | Apr 2013 | A1 |
20130111540 | Sabin | May 2013 | A1 |
20130117240 | Taylor et al. | May 2013 | A1 |
20130117563 | Grabelkovsky | May 2013 | A1 |
20130117742 | Newell | May 2013 | A1 |
20130117805 | Kent et al. | May 2013 | A1 |
20130117840 | Roesner et al. | May 2013 | A1 |
20130124673 | Hjelm et al. | May 2013 | A1 |
20130130651 | Deasy et al. | May 2013 | A1 |
20130130652 | Deasy et al. | May 2013 | A1 |
20130130653 | Deasy et al. | May 2013 | A1 |
20130130669 | Xiao et al. | May 2013 | A1 |
20130132457 | Diwakar | May 2013 | A1 |
20130132941 | Lindeman et al. | May 2013 | A1 |
20130133043 | Barkie et al. | May 2013 | A1 |
20130133061 | Fainkichen et al. | May 2013 | A1 |
20130138766 | Draluk et al. | May 2013 | A1 |
20130138810 | Binyamin et al. | May 2013 | A1 |
20130138932 | Draluk et al. | May 2013 | A1 |
20130138954 | Draluk et al. | May 2013 | A1 |
20130139241 | Leeder | May 2013 | A1 |
20130142043 | Tapia et al. | Jun 2013 | A1 |
20130144934 | Swett et al. | Jun 2013 | A1 |
20130145448 | Newell | Jun 2013 | A1 |
20130151598 | Fu et al. | Jun 2013 | A1 |
20130151681 | Dournov et al. | Jun 2013 | A1 |
20130167247 | Brown et al. | Jun 2013 | A1 |
20130171967 | Ashour et al. | Jul 2013 | A1 |
20130212212 | Addepalli et al. | Aug 2013 | A1 |
20130219022 | Manivel et al. | Aug 2013 | A1 |
20130219176 | Akella et al. | Aug 2013 | A1 |
20130219211 | Gopinath et al. | Aug 2013 | A1 |
20130219456 | Sharma et al. | Aug 2013 | A1 |
20130219465 | Tse et al. | Aug 2013 | A1 |
20130227551 | Tsirkin | Aug 2013 | A1 |
20130227561 | Walsh et al. | Aug 2013 | A1 |
20130227636 | Bettini et al. | Aug 2013 | A1 |
20130227659 | Raleigh | Aug 2013 | A1 |
20130232541 | Kapadia et al. | Sep 2013 | A1 |
20130237152 | Taggar et al. | Sep 2013 | A1 |
20130239192 | Linga et al. | Sep 2013 | A1 |
20130254262 | Udall | Sep 2013 | A1 |
20130254660 | Fujioka | Sep 2013 | A1 |
20130254831 | Roach et al. | Sep 2013 | A1 |
20130260730 | Toy et al. | Oct 2013 | A1 |
20130263208 | Challa | Oct 2013 | A1 |
20130263209 | Panuganty | Oct 2013 | A1 |
20130268676 | Martins et al. | Oct 2013 | A1 |
20130283335 | Lakshminarayanan et al. | Oct 2013 | A1 |
20130288656 | Schultz et al. | Oct 2013 | A1 |
20130290709 | Muppidi et al. | Oct 2013 | A1 |
20130291052 | Hadar et al. | Oct 2013 | A1 |
20130291055 | Muppidi et al. | Oct 2013 | A1 |
20130291086 | Pontillo et al. | Oct 2013 | A1 |
20130297604 | Sutedja et al. | Nov 2013 | A1 |
20130297662 | Sharma et al. | Nov 2013 | A1 |
20130298185 | Koneru et al. | Nov 2013 | A1 |
20130298201 | Aravindakshan et al. | Nov 2013 | A1 |
20130298242 | Kumar et al. | Nov 2013 | A1 |
20130303194 | Rowles | Nov 2013 | A1 |
20130305354 | King et al. | Nov 2013 | A1 |
20130311593 | Prince et al. | Nov 2013 | A1 |
20130311597 | Arrouye et al. | Nov 2013 | A1 |
20130317952 | Tomassetti et al. | Nov 2013 | A1 |
20130318345 | Hengeveld | Nov 2013 | A1 |
20130326492 | Hunt et al. | Dec 2013 | A1 |
20130333005 | Kim et al. | Dec 2013 | A1 |
20130346268 | Pereira et al. | Dec 2013 | A1 |
20130347130 | Sima | Dec 2013 | A1 |
20140006347 | Qureshi et al. | Jan 2014 | A1 |
20140006512 | Huang et al. | Jan 2014 | A1 |
20140007183 | Qureshi et al. | Jan 2014 | A1 |
20140007214 | Qureshi et al. | Jan 2014 | A1 |
20140007215 | Romano et al. | Jan 2014 | A1 |
20140007222 | Qureshi et al. | Jan 2014 | A1 |
20140012983 | Brown et al. | Jan 2014 | A1 |
20140020062 | Tumula et al. | Jan 2014 | A1 |
20140020073 | Ronda et al. | Jan 2014 | A1 |
20140026128 | Rocha De la hoz et al. | Jan 2014 | A1 |
20140032691 | Barton et al. | Jan 2014 | A1 |
20140032733 | Barton et al. | Jan 2014 | A1 |
20140032758 | Barton et al. | Jan 2014 | A1 |
20140032759 | Barton et al. | Jan 2014 | A1 |
20140033271 | Barton et al. | Jan 2014 | A1 |
20140040638 | Barton et al. | Feb 2014 | A1 |
20140040656 | Ho et al. | Feb 2014 | A1 |
20140040977 | Barton et al. | Feb 2014 | A1 |
20140040978 | Barton et al. | Feb 2014 | A1 |
20140040979 | Barton et al. | Feb 2014 | A1 |
20140047413 | Sheive et al. | Feb 2014 | A1 |
20140047535 | Parla et al. | Feb 2014 | A1 |
20140049496 | Szalkowski | Feb 2014 | A1 |
20140059640 | Raleigh et al. | Feb 2014 | A9 |
20140059642 | Deasy et al. | Feb 2014 | A1 |
20140096199 | Dave et al. | Apr 2014 | A1 |
20140096227 | Barbara | Apr 2014 | A1 |
20140096230 | Wade | Apr 2014 | A1 |
20140108558 | Borzycki et al. | Apr 2014 | A1 |
20140108649 | Barton et al. | Apr 2014 | A1 |
20140109072 | Lang et al. | Apr 2014 | A1 |
20140109078 | Lang et al. | Apr 2014 | A1 |
20140111316 | Kim | Apr 2014 | A1 |
20140115693 | Schieman et al. | Apr 2014 | A1 |
20140120961 | Buck | May 2014 | A1 |
20140122645 | Brown et al. | May 2014 | A1 |
20140130174 | Celi, Jr. et al. | May 2014 | A1 |
20140137205 | Brown et al. | May 2014 | A1 |
20140149599 | Krishna et al. | May 2014 | A1 |
20140162614 | Lindeman et al. | Jun 2014 | A1 |
20140164946 | Brown | Jun 2014 | A1 |
20140173700 | Awan et al. | Jun 2014 | A1 |
20140181803 | Cooper et al. | Jun 2014 | A1 |
20140181934 | Mayblum et al. | Jun 2014 | A1 |
20140189670 | Clay | Jul 2014 | A1 |
20140189781 | Manickam et al. | Jul 2014 | A1 |
20140189808 | Mahaffey et al. | Jul 2014 | A1 |
20140228014 | Tervo et al. | Aug 2014 | A1 |
20140259178 | Karaa et al. | Sep 2014 | A1 |
20140280962 | Schultz | Sep 2014 | A1 |
20140281475 | Schultz | Sep 2014 | A1 |
20140281499 | Schentrup et al. | Sep 2014 | A1 |
20140282460 | Cai et al. | Sep 2014 | A1 |
20140282876 | Schentrup et al. | Sep 2014 | A1 |
20140283030 | Moore et al. | Sep 2014 | A1 |
20140298401 | Batson et al. | Oct 2014 | A1 |
20140315536 | Chow et al. | Oct 2014 | A1 |
20140317273 | Kruglick | Oct 2014 | A1 |
20140317704 | Schentrup et al. | Oct 2014 | A1 |
20140330990 | Lang et al. | Nov 2014 | A1 |
20140359117 | Dare et al. | Dec 2014 | A1 |
20140366015 | Dobson et al. | Dec 2014 | A1 |
20140379567 | Schentrup et al. | Dec 2014 | A1 |
20150026827 | Kao et al. | Jan 2015 | A1 |
20150074057 | Brown et al. | Mar 2015 | A1 |
20150081644 | Pitts | Mar 2015 | A1 |
20150082191 | Dietz | Mar 2015 | A1 |
20150087270 | Richardson et al. | Mar 2015 | A1 |
20150113502 | Wade | Apr 2015 | A1 |
20150113506 | Wade | Apr 2015 | A1 |
20150135160 | Gauvin et al. | May 2015 | A1 |
20150138945 | Carrillo | May 2015 | A1 |
20150149232 | Dietz | May 2015 | A1 |
20150201417 | Raleigh | Jul 2015 | A1 |
20150205952 | Weiss | Jul 2015 | A1 |
20150206451 | Schultz | Jul 2015 | A1 |
20150227115 | Dietz | Aug 2015 | A1 |
20150277941 | Dobson et al. | Oct 2015 | A1 |
20150341362 | Dobson et al. | Nov 2015 | A1 |
20150378581 | Dietz | Dec 2015 | A1 |
20150379475 | Dietz | Dec 2015 | A1 |
20160057559 | Deasy et al. | Feb 2016 | A1 |
20160156547 | Draluk et al. | Jun 2016 | A1 |
20160219060 | Karunakaran et al. | Jul 2016 | A1 |
20160337844 | Hailpern | Nov 2016 | A1 |
20170063839 | Barton et al. | Mar 2017 | A1 |
20170244724 | Deasy et al. | Aug 2017 | A1 |
20170293760 | Touboul | Oct 2017 | A1 |
Number | Date | Country |
---|---|---|
2011100643 | Jul 2011 | AU |
1313690 | Sep 2001 | CN |
1613040 | May 2005 | CN |
1661610 | Aug 2005 | CN |
1708751 | Dec 2005 | CN |
1713199 | Dec 2005 | CN |
1716303 | Jan 2006 | CN |
1849774 | Oct 2006 | CN |
1894897 | Jan 2007 | CN |
1951060 | Apr 2007 | CN |
101022610 | Aug 2007 | CN |
101026450 | Aug 2007 | CN |
101090400 | Dec 2007 | CN |
101170401 | Apr 2008 | CN |
101217663 | Jul 2008 | CN |
101305378 | Nov 2008 | CN |
101322379 | Dec 2008 | CN |
101350814 | Jan 2009 | CN |
101453708 | Jun 2009 | CN |
101572678 | Nov 2009 | CN |
101588353 | Nov 2009 | CN |
101727274 | Jun 2010 | CN |
101888597 | Nov 2010 | CN |
102037710 | Apr 2011 | CN |
102422553 | Apr 2012 | CN |
102446256 | May 2012 | CN |
102541635 | Jul 2012 | CN |
102591802 | Jul 2012 | CN |
102986190 | Mar 2013 | CN |
103299658 | Sep 2013 | CN |
104854561 | Aug 2015 | CN |
1465039 | Oct 2004 | EP |
2028805 | Feb 2009 | EP |
2028805 | Feb 2009 | EP |
2403211 | Jan 2012 | EP |
2403211 | Jan 2012 | EP |
2428894 | Mar 2012 | EP |
2523107 | Nov 2012 | EP |
2573701 | Mar 2013 | EP |
2411320 | Aug 2005 | GB |
2462442 | Feb 2010 | GB |
2478653 | Sep 2011 | GB |
11-205380 | Jul 1999 | JP |
2003-296210 | Oct 2003 | JP |
2006-094258 | Apr 2006 | JP |
2006155522 | Jun 2006 | JP |
2007215201 | Aug 2007 | JP |
2008-033751 | Feb 2008 | JP |
2008-097419 | Apr 2008 | JP |
2008-160753 | Jul 2008 | JP |
2008-527574 | Jul 2008 | JP |
2009-070073 | Apr 2009 | JP |
2009-520409 | May 2009 | JP |
2009169661 | Jul 2009 | JP |
2009-289164 | Dec 2009 | JP |
2010-015601 | Jan 2010 | JP |
2010-079901 | Apr 2010 | JP |
2011-138446 | Jul 2011 | JP |
2011-191897 | Sep 2011 | JP |
2011-248888 | Dec 2011 | JP |
2013-058223 | Mar 2013 | JP |
10-0806993 | Feb 2008 | KR |
2012-0118819 | Oct 2012 | KR |
10-2012-0128376 | Nov 2012 | KR |
9914652 | Mar 1999 | WO |
02084460 | Oct 2002 | WO |
2004107646 | Dec 2004 | WO |
2006012612 | Feb 2006 | WO |
WO-2006136660 | Dec 2006 | WO |
2007113709 | Oct 2007 | WO |
2008086611 | Jul 2008 | WO |
2009021200 | Feb 2009 | WO |
2009157493 | Dec 2009 | WO |
2010054258 | May 2010 | WO |
2010115289 | Oct 2010 | WO |
2013020177 | Feb 2013 | WO |
WO-2013054296 | Apr 2013 | WO |
2013070813 | May 2013 | WO |
2014032051 | Feb 2014 | WO |
2014179543 | Nov 2014 | WO |
2015023887 | Feb 2015 | WO |
Entry |
---|
Pechoucek, “Expectations and deployment of agent technology in manufacturing and defence: case studies.” In Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems, pp. 100-106. ACM, 2005. (Year: 2005). |
Becvar, “An intelligent telephony interface of multiagent decision support systems.” IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 37, No. 4 (2007): 553-560. (Year: 2007). |
Lischka, Jens, and Holger Karl. “RiaS: overlay topology creation on a PlanetLab infrastructure.” In Proceedings of the second ACM SIGCOMM workshop on Virtualized infrastructure systems and architectures, pp. 9-16. 2010. (Year: 2010). |
Caronni, Germano, Sandeep Kumar, Christoph Schuba, and Glenn Scott. “Virtual enterprise networks: the next generation of secure enterprise networking.” In Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), pp. 42-51. IEEE, 2000. (Year: 2000). |
Jan. 24, 2014 U.S. Non-final Office Action—U.S. Appl. No. 14/041,935. |
Jan. 30, 2014 U.S. Non-final Office Action—U.S. Appl. No. 14/045,014. |
Jan. 6, 2014 U.S. Non-final Office Action—U.S. Appl. No. 14/043,229. |
Jan. 9, 2014 U.S. Non-final Office Action—U.S. Appl. No. 14/032,756. |
Jul. 10, 2014 U.S. Notice of Allowance—U.S. Appl. No. 14/044,972. |
Jul. 11, 2014 (WO) International Search Report and Written Opinion—App PCT/US2013/63261. |
Jul. 11, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 13/649,024. |
Jul. 17, 2014—U.S. Non-Final Office Action—U.S. Appl. No. 13/649,022. |
Jul. 18, 2014 U.S. Final Office Action—U.S. Appl. No. 13/963,833. |
Jul. 21, 2014 U.S. Notice of Allowance—U.S. Appl. No. 14/043,012. |
Jul. 24, 2014 U.S. Final Office Action—U.S. Appl. No. 14/032,643. |
Jul. 28, 2014 U.S. Final Office Action—U.S. Appl. No. 13/649,069. |
Jul. 29, 2014 U.S. Notice of Allowance—U.S. Appl. No. 11/043,164. |
Jul. 3, 2014 U.S. Final Office Action—U.S. Appl. No. 14/045,014. |
Jul. 9, 2014 U.S. Notice of Allowance—U.S. Appl. No. 13/649,064. |
Jun. 2, 2014 U.S. Notice of Allowance—U.S. Appl. No. 14/032,756. |
Jun. 23, 2014 U.S. Final Office Action—U.S. Appl. No. 14/044,946. |
Jun. 24, 2014 U.S. Final Office Action—U.S. Appl. No. 14/043,229. |
Jun. 24, 2014 U.S. Notice of Allowance—U.S. Appl. No. 13/649,063. |
Jun. 26, 2014 U.S. Notice of Allowance—U.S. Appl. No. 14/042,941. |
Jun. 3, 2014 (WO) International Search Report and Written Opinion—App. PCT/US2013/060047. |
Jun. 4, 2014 U.S. Final Office Action—U.S. Appl. No. 14/032,820. |
Jun. 4, 2014 U.S. Notice of Allowance—U.S. Appl. No. 14/032,439. |
Jun. 6, 2014 U.S. Final Office Action—U.S. Appl. No. 14/032,885. |
Mar. 17, 2014 (WO) International Search Report and Written Opinion—App. PCT/US2013/064279. |
Mar. 18, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 13/649,064. |
Mar. 20, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 13/649,071. |
Mar. 25, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 14/043,086. |
Mar. 27, 2014 U.S. Final Office Action—U.S. Appl. No. 13/963,758. |
Mar. 27, 2014 U.S. Non-final Office Action—U.S. Appl. No. 13/649,069. |
Mar. 28, 2014 U.S. Final Office Action—U.S. Appl. No. 14/022,935. |
Mar. 6, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 14/041,946. |
Mar. 6, 2014 (WO) International Search Report and Written Opinion in International Application No. PCT/US2013/064319. |
May 16, 2014 U.S. Final Office Action—U.S. Appl. No. 14/044,998. |
May 16, 2014 U.S. Final Office Action—U.S. Appl. No. 14/096,418. |
May 19, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 13/649,076. |
May 19, 2014 U.S. Notice of Allowance—U.S. Appl. No. 14/044,901. |
May 2, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 14/044,972. |
May 20, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 14/044,989. |
May 27, 2014 U.S. Notice of Allowance—U.S. Appl. No. 14/015,245. |
May 27, 2014 U.S. Notice of Allowance—U.S. Appl. No. 14/042,984. |
May 29, 2014 U.S. Final Office Action—U.S. Appl. No. 14/041,911. |
May 29, 2014 U.S. Notice of Allowance—U.S. Appl. No. 14/043,343. |
May 5, 2014 U.S. Notice of Allowance—U.S. Appl. No. 14/044,928. |
May 7, 2014 U.S. Final Office Action—U.S. Appl. No. 14/029,068. |
May 7, 2014 U.S. Final Office Action—U.S. Appl. No. 14/029,088. |
May 8, 2014 U.S. Final Office Action—U.S. Appl. No. 14/029,096. |
Nov. 5, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 14/045,014. |
Nov. 21, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 14/044,946. |
Nov. 24, 2014 U.S. Notice of Allowance—U.S. Appl. No. 14/043,301. |
Jun. 14, 2017 (KR) Korean Intellectual Property Office Notice to Submit a Response—App. 10-2015-7031148. |
Mar. 3, 2017 (CN) First Office Action—App 201380065897X. |
Mar. 3, 2017 (CN) Second Office Action—App 2014800364260. |
Mar. 2, 2017 U.S. Final Office Action—U.S. Appl. No. 14/733,490. |
May 19, 2017—U.S. Notice of Allowance and Fee(s) Due—U.S. Appl. No. 14/026,442. |
May 22, 2017—U.S. Final Office Action—U.S. Appl. No. 15/057,314. |
May 24, 2017—U.S. Non-final Office Action—U.S. Appl. No. 14/932,293. |
May 3, 2017 (CN) Decision of Rejection—App 2013800573261. |
May 31, 2017 (CN) First Office Action—App. 201380077065.X. |
Nov. 13, 2017—(CN) Decision of Rejection—App No. 2013800641911. |
Nov. 30, 2017—(JP) Notification of Reasons for Refusal—App 2016-226192. |
Oct. 3, 2017—U.S. Non-final Office Action—U.S. Appl. No. 15/057,314. |
Sep. 14, 2017 U.S. Notice of Allowance—U.S. Appl. No. 14/733,490. |
Sep. 22, 2017—U.S. Non-final Office Action—U.S. Appl. No. 14/055,038. |
Apr. 19, 2018—U.S. Non-final Office Action—U.S. Appl. No. 15/863,853. |
Apr. 5, 2018—U.S. Final Office Action—U.S. Appl. No. 14/876,832. |
Aug. 2, 2018 (JP) Decision to Grant—App. 2017-081340. |
Aug. 2, 2018 (JP) Notification of Reasons for Refusal—App. 2017-098391. |
Feb. 5, 2018—(EP)—Examination Report—App 13795021.8. |
Feb. 7, 2018—(CN) Reexamination Decision—App 2013800573261. |
Jan. 11, 2018—U.S. Notice of Allowance—U.S. Appl. No. 14/752,132. |
Jan. 22, 2018—U.S. Final Office Action—U.S. Appl. No. 14/932,293. |
Jan. 25, 2018—(EP) Examination Report—App 13795317.0. |
Jan. 25, 2018—U.S. Notice of Allowance—U.S. Appl. No. 14/025,898. |
Jan. 31, 2018 (EP) Examination Report—App. 13780489.4. |
Jul. 23, 2018—(EP) Examination Report—App 13779976.3. |
Jun. 28, 2018—U.S. Non-final Office Action—U.S. Appl. No. 15/946,692. |
Jun. 8, 2018—U.S. Notice of Allowance—U.S. Appl. No. 15/140,683. |
Jun. 7, 2018—(JP) Decision of Refusal—App. 2016-226192. |
Mar. 27, 2018—U.S. Final Office Action—U.S. Appl. No. 15/057,314. |
Mar. 30, 2018—U.S. Final Office Aciton—U.S. Appl. No. 14/055,038. |
Mar. 9, 2018—U.S. Non-final Office Action—U.S. Appl. No. 14/021,227. |
Nov. 12, 2018 (KR) Office Action—App. 10-2017-7022571. |
Nov. 26, 2018 (EP)—Search Report—App 18186906.6. |
Nov. 27, 2018 (EP)—Search Report—App. 18186904.1. |
Nov. 29, 2018—(EP) Summons to Attend Oral Proceedings—App. 13795317.0. |
Nov. 29, 2018—U.S. Non-final Office Action—U.S. Appl. No. 14/055,038. |
Oct. 23, 2018 (EP) Extended European Search Report and Written Opinion—App. 18185793.9. |
Oct. 25, 2018—U.S. Non-final Office Action—U.S. Appl. No. 15/957,642. |
Oct. 8, 2018 (EP) Examination Report—App. 13780486.0. |
Sep. 14, 2018—U.S. Non-final Office Action—U.S. Appl. No. 15/057,314. |
Sep. 20, 2018—U.S. Final Office Action—U.S. Appl. No. 14/021,227. |
Sep. 21, 2018—U.S. Non-final Office Action—U.S. Appl. No. 14/876,832. |
Feb. 8, 2019—(EP) Examination Report—App 13 779 976.3. |
Jan. 10, 2019—(JP) Notification of Reasons for Refusal—App 2017-550935, Eng Tran. |
Jan. 11, 2019—U.S. Final Office Action—U.S. Appl. No. 15/946,692. |
Jan. 14, 2019—U.S. Notice of Allowance—U.S. Appl. No. 14/021,227. |
Mar. 20, 2019 (KR)—Decision to Grant—App. 10-2017-7010876. |
Mar. 22, 2019—U.S. Non-final Office Action—U.S. Appl. No. 15/960,868. |
General review of latest approaches for BYOD Safely use business apps from personal terminal, Nikkei Communication, Nikkei Business Publications, Inc., Jun. 1, 2012, No. 581, pp. 27-37. |
1998—Peine, H., “Security concepts and implementation in the Ara mobile agent system,” [Online] 1998, Enabling Technologies: Infrastructure for Collaborative Enterprises, Seventh IEEE International Workshops on Jun. 17-19, 1998, [Retrieved from the Internet] <http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=725699&isnumber=15665> pp. 236-242. |
Nov./Dec. 1999—“Conflicts in Policy-Based Distributed Systems Management,” Lupu, Emil et al., pp. 852-869. |
Mar./Apr. 2002—“Simplifying Network Administration Using Policy-Based Management,” Verma, Dinesh C. et al. |
2003—Mysore et al., “The Liquid Media System—a Multi-Device Streaming Media Orchestration Framework”, Ubicomp 2003 Workshop, pp. 1-4. |
2003—Wilson et al., “Unified Security Framework”, in proceedings of the 1st International Symposium on Information and Communication Technologies, pp. 500-505. Trinity College Dublin. |
Apr. 28, 2003—Kate Gregory: “Managed, Unmanaged, Native: What Kind of Code is This?”, Developer.com, pp. 1-3, XP055096991, retrieved from the Internet: <URL:http://www.developer.com/print.php/2197621>, [retrieved on Jan. 17, 2014], the whole document. |
Sep. 2003—“Securing wireless access to mobile applications,” Phifer. |
2004—“Policy Transformation Techniques in Policy-based Systems Management,” Beigi, Mandis S., et al., pp. 1-10. |
Nov. 2004—Skarmeta, A. et al., “Policy-based dynamic provision of IP services in a secure VPN coalition scenario,” in IEEE Communications Magazine, vol. 42, No. 11, pp. 118-124. |
2005—Hamed, H. et al., “Modeling and verification of IPSec and VPN security policies,” 13th IEEE International Conference on Network Protocols (ICNP'05), pp. 10. |
Dec. 13, 2005—Lowe, “Application-Specific VPNs”. |
Oct. 2005—“Policy-Based Management of Networked Computing Systems,” Agrawal, Dakshi et al., pp. 69-75. |
2006—“Middleware Support for Auditing Service Process Flows,” Hacigumus, Hakan, pp. 24-29. |
2006—Shah et al., “Securing Java-Based Mobile Agents through Byte Code Obfuscation Techniques,” [Online] Dec. 23-24, 2006, Multitopic Conference, 2006, INMIC '06. IEEE, [Retrieved from the Internet] <http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=41964258,isnumber=414013> pp. 305-308. |
2007—Symantec Network Access Control Enforcer Implementation Guide; Retrieved from the Internet <URL:ftp.symantec.com/public/english_us_canada/products/symantec_network_access_control/11.0/manuals/enforcer_implementation_guide.pdf>, pp. 1-132. |
2008—Administration Guide for Symantec Endpoint Protection and Symantec Network Access Control; Retrieved from the Internet <<URL:ftp.symantec.com/public/english_us_canada/products/symantec_endpoint_protection/11.0/manuals/administration_guide.pdf>, pp. 1-615. |
Mar. 11, 2008—Vejda, T. et al., “Towards Trust Services for Language-Based Virtual Machines for Grid Computing,” Trusted Computing—Challenges and Applications, ISBN: 978-3-540-68978-2. |
2009—“Policy-Based Security Configuration Management Application to Intrusion Dection and Prevention,” Alsubhi, Khalid et al., pp. 1-6. |
Jan. 12, 2009—“Safeguarding removable-media devices,” Sever. |
2010—Na et al., “Personal Cloud Computing Security Framework,” 2010 IEEE Asia-Pacific Computing Conference, pp. 671-675. |
Oct. 25, 2010—Andreas, “Digging into the Exchange ActiveSync Protocol,” Mobility Dojo.net, http://mobilitydojo.net/2010/03/17/digging-into-the-exchange-activesync-protocol/. |
2011—Laverty, Joseph Packy et al., “Comparative Analysis of Mobile Application Development and Security Models,” Issues in Information Systems vol. XII, No. 1, [Retrieved from the Internet] <http://iacis.org/iis/2011/301-312_AL2011_1694.pdf> pp. 301-312. |
Aug. 25, 2011—“A mobile and portable trusted computing platform,” Nepal et al. |
Jul. 1, 2011—Wright et al., “Your Firm's Mobile Devices: Flow Secure are They?” Journal of Corporate Accounting and Finance, Willey Periodicals. pp. 13-21. |
2012—Potharaju, Rahul et al., “Plagiarizing smartphone applications: attack strategies and defense techniques,” [Online] Engineering Secure Software and Systems, Springer Berlin Heidelberg, [Retrieved from the Internet] <http://link.springer.com/chapter/10.1007/978-3-642-28166-2_11#> pp. 106-120. |
2012—Ranjan et al., “Programming Cloud Resource Orchestration Framework: Operations and Research Challenges”, arvix.org, pp. 1-19. |
Apr. 2012—Xuetao Wei, et al., “Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It?,”? ICDE Workshop on Secure Data Management on Smartphones and Mobiles, 4 pages. |
Aug. 1, 2012—“TPS Development Using the Microsoft .NET Framework”, Teresa P. Lopes, IEEE Instrumentation & Measurement Magazine (vol. 15, No. 4). |
Jul. 31, 2012—“Citrix XenMobile Technology Overview: White Paper,” Citrix White Papers online, pp. 1-14; retrieved from http://insight.com/content/aam/insight/en_US/pdfs/citrix/xenmobile-tech-overview.pdf, retrieved Jan. 27, 2014. |
Dec. 10, 2013 U.S. Non-final Office Action—U.S. Appl. No. 14/015,245. |
Dec. 16, 2013 U.S. Office Action—U.S. Appl. No. 14/041,911. |
Dec. 18, 2013 U.S. Non-final Office Action—U.S. Appl. No. 14/044,928. |
Dec. 19, 2013 U.S. Non-final Office Action—U.S. Appl. No. 13/963,758. |
Dec. 19, 2013 U.S. Non-Final Office Action—U.S. Appl. No. 14/032,706. |
Dec. 19, 2013 U.S. Non-Final Office Action—U.S. Appl. No. 14/032,885. |
Dec. 19, 2013 U.S. Office Action—U.S. Appl. No. 14/029,077. |
Dec. 19, 2013 U.S. Restriction Requirement—U.S. Appl. No. 13/963,833. |
Dec. 20, 2013 U.S. Non-final Office Action—U.S. Appl. No. 14/043,301. |
Dec. 20, 2013 U.S. Non-Final Office Action—U.S. Appl. No. 14/044,998. |
Dec. 20, 2013 (WO) International Search Report and Written Opinion—App PCT/US2013/063363. |
Dec. 23, 2013 U.S. Notice of Allowance—U.S. Appl. No. 14/041,923. |
Dec. 23, 2013 U.S. Non-Final Office Action—U.S. Appl. No. 14/043,343. |
Dec. 24, 2013 U.S. Non-final Office Action—U.S. Appl. No. 14/022,935. |
Dec. 27, 2013 U.S. Non-Final Office Action—U.S. Appl. No. 14/043,012. |
Dec. 27, 2013 U.S. Non-Final Office Action—U.S. Appl. No. 14/042,941. |
Dec. 30, 2013 U.S. Non-Final Office Action—U.S. Appl. No. 14/043,164. |
Dec. 31, 2013 U.S. Non-Final Office Action—U.S. Appl. No. 14/042,984. |
Dec. 5, 2013 U.S. Office Action—U.S. Appl. No. 14/029,068. |
Dec. 5, 2013 U.S. Office Action—U.S. Appl. No. 14/029,088. |
May 13, 2016—U.S. Notice of Allowance—U.S. Appl. No. 13/963,739. |
May 20, 2016—U.S. Notice of Allowance—U.S. Appl. No. 14/032,643. |
Nov. 1, 2016 (KR) Office Action—App. 10-2012-7001062. |
Nov. 10, 2016 (JP) Notification of Reason for Refusal—App. 2016-505457. |
Nov. 16, 2016—U.S. Notice of Allowance—U.S. Appl. No. 14/671,351. |
Nov. 25, 2016—U.S. Non-final Office Action—U.S. Appl. No. 14/055,038. |
Oct. 11, 2016 (WO) International Search Report and Written Opinion—App No. PCT/US2016/039229. |
Oct. 14, 2016—(KR) Office Action—App 10-2015-7031149. |
Oct. 20, 2016—U.S. Final Office Action—U.S. Appl. No. 14/039,651. |
Oct. 25, 2016—U.S. Non-final Office Action—U.S. Appl. No. 15/057,314. |
Oct. 26, 2016—U.S. Non-final Office Action—U.S. Appl. No. 14/026,442. |
Oct. 28, 2016 (JP) Notice of Reasons for Refusal—App. 2016-505458. |
Sep. 9, 2016—U.S. Non-final Office Action—U.S. Appl. No. 14/876,832. |
Apr. 13, 2017—U.S. Final Office Action—U.S. Appl. No. 14/055,038. |
Apr. 18, 2017—(CN) Office Action—App 201380063087.0. |
Apr. 20, 2017—U.S. Non-final Office Action—U.S. Appl. No. 14/039,651. |
Apr. 21, 2017—U.S. Non-final Office Action—U.S. Appl. No. 15/422,761. |
Aug. 10, 2017—U.S. Final Office Action—U.S. Appl. No. 14/039,651. |
Aug. 18, 2017—U.S. Non-final Office Action—U.S. Appl. No. 15/345,584. |
Aug. 22, 2017—U.S. Non-final Office Action—U.S. Appl. No. 15/347,247. |
Aug. 24, 2017—U.S. Final Office Action—U.S. Appl. No. 14/025,898. |
Aug. 3, 2017—(JP) Office Action—App 2016-512957. |
Aug. 30, 2017—U.S. Notice of Allowance—U.S. Appl. No. 15/422,761. |
Aug. 31, 2017—U.S. Non-final Office Action—U.S. Appl. No. 14/932,293. |
Dec. 14, 2017—U.S. Notice of Allowance—U.S. Appl. No. 15/189,197. |
Dec. 15, 2017—U.S. Final Office Action—U.S. Appl. No. 15/345,584. |
Dec. 15, 2017—U.S. Non-final Office Action—U.S. Appl. No. 14/876,832. |
Dec. 21, 2017—U.S. Notice of Allowance—U.S. Appl. No. 15/347,247. |
Dec. 26, 2017—(CN) Notice of First Office Action—App 201380076963.3. |
Dec. 4, 2017 (CN) First Office Action—App. 201380076871.5. |
Dec. 4, 2017—U.S. Notice of Allowance—U.S. Appl. No. 14/875,450. |
Feb. 8, 2017—(CN) First Office Action—App No. 201380064191.1—Eng Trans. |
Feb. 21, 2017—(CN) First Chinese Office Action—App. 2013800657267, Machine Eng Tran. |
Feb. 23, 2017—U.S. Non-final Office Action—U.S. Appl. No. 14/025,898. |
Jan. 11, 2017—U.S. Non-Final Office Action—U.S. Appl. No. 13/963,833. |
Jan. 17, 2017—(CN) Office Action—App 201380063467.4. |
Jan. 17, 2017—U.S. Final Office Action—U.S. Appl. No. 14/876,832. |
Jan. 18, 2017—U.S. Non-final Office Action—U.S. Appl. No. 14/021,227. |
Jan. 19, 2017 (JP) Notification of Reasons for Refusal—App. 2016-505456. |
Jan. 3, 2017—U.S. Notice of Allowance—U.S. Appl. No. 14/508,245. |
Jul. 17, 2017—U.S. Final Office Action—U.S. Appl. No. 14/876,832. |
Jul. 27, 2017—U.S. Final Office Action—U.S. Appl. No. 14/021,227. |
Jul. 7, 2017—U.S. Non-final Office Action—U.S. Appl. No. 14/875,450. |
Jul. 3, 2017 (CN) Second Office Action—App 2013800641911. |
Jun. 5, 2017—U.S. Non-Final Office Action—U.S. Appl. No. 14/733,490. |
Jun. 9, 2017—(CN) First Office Action—App 2013800627647. |
Jun. 1, 2017—U.S. Final Office Action—U.S. Appl. No. 13/963,833. |
Jun. 28, 2017—U.S. Final Office Action—U.S. Appl. No. 14/752,132. |
Jun. 23, 2015—U.S. Notice of Allowance—U.S. Appl. No. 14/043,229. |
Mar. 25, 2015—U.S. Non-Final Office Action—U.S. Appl. No. 14/044,919. |
Mar. 26, 2015—U.S. Non-Final Office Action—U.S. Appl. No. 14/055,038. |
Mar. 5, 2015 U.S. Non-Final Office Action—U.S. Appl. No. 14/039,651. |
May 19, 2015—U.S. Notice of Allowance & Fees Due—U.S. Appl. No. 13/648,993. |
May 20, 2015—Notice of Allowance & Fees Due—U.S. Appl. No. 13/649,022. |
May 20, 2015—Notice of Allowance & Fees Due—U.S. Appl. No. 13/649,069. |
May 22, 2015—Non-Final Office Action—U.S. Appl. No. 14/106,171. |
Nov. 5, 2015—(EP) Office Action—App 13773923.1. |
Nov. 12, 2015—U.S. Final Office Action—U.S. Appl. No. 14/055,038. |
Nov. 13, 2015 (WO) International Search Report and Written Opinion—App. PCT/US2015/026781. |
Nov. 23, 2015—U.S. Non-final Office Action—U.S. Appl. No. 14/032,643. |
Nov. 3, 2015—U.S. Non-Final Office Action—U.S. Appl. No. 14/733,490. |
Oct. 9, 2015—U.S. Notice of Allowance—U.S. Appl. No. 13/886,889. |
Oct. 28, 2015—U.S. Notice of Allowance—U.S. Appl. No. 13/886,889. |
Oct. 8, 2015—U.S. Final Office Action—U.S. Appl. No. 14/015,194. |
Oct. 9, 2015—U.S. Final Office Action—U.S. Appl. No. 14/043,902. |
Sep. 2, 2015—U.S. Notice of Allowance—U.S. Appl. No. 13/649,071. |
Sep. 22, 2015—U.S. Non-final Office Action—U.S. Appl. No. 14/607,593. |
Apr. 25, 2016—U.S. Non-final Office Action—U.S. Appl. No. 14/508,245. |
Apr. 4, 2016—U.S. Notice of Allowance—U.S. Appl. No. 14/607,593. |
Apr. 7, 2016—U.S. Non-final Office Action—U.S. Appl. No. 14/340,096. |
Apr. 8, 2016—U.S. Non-final Office Action—U.S. Appl. No. 14/671,351. |
Aug. 11, 2016—U.S. Notice of Allowance—U.S. Appl. No. 14/340,096. |
Aug. 17, 2016—U.S. Non-Final Office Action—U.S. Appl. No. 14/733,490. |
Aug. 2, 2016—U.S. Notice of Allowance—U.S. Appl. No. 14/535,597. |
Aug. 23, 2016—U.S. Notice of Allowance—U.S. Appl. No. 13/649,073. |
Aug. 8, 2016—U.S. Final Office Action—U.S. Appl. No. 14/022,935. |
Dec. 2, 2016—U.S. Notice of Allowance—U.S. Appl. No. 14/607,593. |
Feb. 3, 2016—U.S. Notice of Allowance—U.S. Appl. No. 14/040,831. |
Feb. 23, 2016—U.S. Non-Final Office Action—U.S. Appl. No. 14/039,651. |
Feb. 24, 2016—U.S. Notice of Allowance—U.S. Appl. No. 14/015,194. |
Feb. 29, 2016—U.S. Ex pane Quayle—U.S. Appl. No. 14/242,011. |
Feb. 29, 2016—U.S. Notice of Allowance—U.S. Appl. No. 13/649,076. |
Jan. 21, 2016—U.S. Non-final Office Action—U.S. Appl. No. 13/649,073. |
Jul. 12, 2016—U.S. Final Office Action—U.S. Appl. No. 14/021,277. |
Jul. 15, 2016—U.S. Non-final Office Action—U.S. Appl. No. 14/932,293. |
Jul. 27, 2016—U.S. Notice of Allowance—U.S. Appl. No. 14/607,593. |
Jul. 28, 2016—U.S. Non-final Office Action—U.S. Appl. No. 14/055,038. |
Jul. 29, 2016—(KR) Office Action—App. 10-2015-7031152. |
Jul. 7, 2016—(EP) Supplementary European Search Report—App 13795317.0. |
Jun. 20, 2016—(EP) Extended European Search Report—App 13795317. |
Jun. 22, 2016—U.S. Final Office Action—U.S. Appl. No. 13/963,833. |
Jun. 22, 2016—U.S. Final Office Action—U.S. Appl. No. 14/025,898. |
Jun. 30, 2016—U.S. Non-final Office Action—U.S. Appl. No. 14/752,132. |
Jun. 7, 2016—U.S. Notice of Allowance—U.S. Appl. No. 14/242,011. |
Mar. 16, 2016—U.S. Notice of Allowance—U.S. Appl. No. 14/106,171. |
Mar. 25, 2016—(CN) Office Action—App 201380057326.1. |
Mar. 30, 2016—U.S. Final Office Action—U.S. Appl. No. 13/963,739. |
May 12, 2016—U.S. Final Office Action—U.S. Appl. No. 14/733,490. |
Dec. 5, 2013 U.S. Office Action—U.S. Appl. No. 14/029,096. |
Dec. 6, 2013 U.S. Notice of Allowance—U.S. Appl. No. 14/022,845. |
Jan. 2013—Apple Inc., iPad User Guide for iOS 6.1 Software, Chapter 26, Accessibility, pp. 107-108. |
Jan. 13, 2013 U.S. Restriction Requirement—U.S. Appl. No. 13/649,076. |
Nov. 15, 2013 U.S. Non-Final Office Action—U.S. Appl. No. 14/015,108. |
Nov. 22, 2013 U.S. Restriction Requirement—U.S. Appl. No. 13/649,071. |
Nov. 26, 2013 (WO) International Search Report and Written Opinion—App. PCT/US2013/060388. |
Nov. 6, 2013 U.S. Office Action—U.S. Appl. No. 13/963,825. |
Nov. 7, 2013 U.S. Non-final Office Action—U.S. Appl. No. 13/649,063. |
Nov. 8, 2013 U.S. Office Action—U.S. Appl. No. 13/963,811. |
Oct. 17, 2013 U.S. Office Action—U.S. Appl. No. 13/963,794. |
Oct. 25, 2013 U.S. Notice of Allowance—U.S. Appl. No. 13/963,825. |
Apr. 4, 2014 (WO) International Search Report and Written Opinion—App. PCT/US2013/063429. |
Apr. 11, 2014 U.S. Final Office Action—U.S. Appl. No. 14/015,108. |
Apr. 14, 2014 U.S. Notice of Allowance—U.S. Appl. No. 14/032,706. |
Apr. 21, 2014 U.S. Final Office Action—U.S. Appl. No. 14/096,380. |
Apr. 7, 2014 U.S. Final Office Action—U.S. Appl. No. 14/029,077. |
Apr. 8, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 13/886,889. |
Aug. 8, 2014 U.S. Notice of Allowance —U.S. Appl. No. 14/032,885. |
Aug. 1, 2014 U.S. Notice of Allowance—U.S. Appl. No. 14/041,946. |
Aug. 21, 2014 U.S. Final Office Action—U.S. Appl. No. 14/043,301. |
Aug. 29, 2014 U.S. Final Office Action—U.S. Appl. No. 13/649,073. |
Aug. 29, 2014 U.S. Final Office Action—U.S. Appl. No. 13/649,076. |
Aug. 30, 2014 U.S. Notice of Allowance—U.S. Appl. No. 14/029,088. |
Aug. 5, 2014 U.S. Notice of Allowance—U.S. Appl. No. 14/029,096. |
Aug. 7, 2014 U.S. Final Office Action—U.S. Appl. No. 13/963,851. |
Aug. 7, 2014 U.S. Final Office Action—U.S. Appl. No. 14/043,086. |
Aug. 7, 2014 U.S. Notice of Allowance—U.S. Appl. No. 14/029,068. |
Dec. 19, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 14/043,331. |
Dec. 22, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 13/649,069. |
Dec. 29, 2014 U.S. Final Office Action—U.S. Appl. No. 13/649,022. |
Feb. 4, 2014 (WO) International Search Report and Written Opinion—App. PCT/US2013/064349. |
Feb. 6, 2014 (WO) International Search Report and Written Opinion—App. PCT/US2013/064076. |
Feb. 10, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 14/96,418. |
Feb. 10, 2014 (WO) International Search Report—App PCT/US/2013/065245. |
Feb. 24, 2014 U.S. Non-final Office Action—U.S. Appl. No. 13/963,833. |
Feb. 24, 2014 U.S. Non-final Office Action—U.S. Appl. No. 14/044,901. |
Feb. 24, 2014 U.S. Non-final Office Action—U.S. Appl. No. 13/649,073. |
Feb. 24, 2014 (WO) International Search Report and Written Opinion—App PCT/US2013/060379. |
Feb. 28, 2014 U.S. Non-final Office Action—U.S. Appl. No. 14/096,380. |
Feb. 3, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 14/032,439. |
Feb. 3, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 14/044,946. |
Feb. 4, 2014 U.S. Non-final Office Action—U.S. Appl. No. 14/032,643. |
Jan. 10, 2014 U.S. Non-final Office Action—U.S. Appl. No. 14/032,820. |
Jan. 10, 2014 (WO) Written Opinion and International Search Report—App. PCT/US2013/062636. |
Jan. 17, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 13/648,993. |
Jan. 17, 2014 U.S. Non-final Office Action—U.S. Appl. No. 14/045,005. |
Jan. 21, 2014 (WO) International Search Report and Written Opinion in International—App. PCT/US2013/063856. |
Jan. 24, 2014 U.S. Non-final Office Action—U.S. Appl. No. 13/963,851. |
Nov. 26, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 13/963,851. |
Nov. 5, 2014 U.S. Non-Final Othe Action—U.S. Appl. No. 13/886,765. |
Oct. 6, 2014 U.S. Notice of Allowance—U.S. Appl. No. 14/041,911. |
Oct. 10, 2014 U.S. Final Office Action—U.S. Appl. No. 14/032,643. |
Oct. 20, 2014 (WO) International Search Report—App PCT/US2014/036382. |
Oct. 22, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 14/055,078. |
Sep. 5, 2014 U.S. Non-Final Office Action—U.S. Appl. No. 13/648,993. |
Sep. 8, 2014 U.S. Final Office Action—U.S. Appl. No. 13/886,889. |
Sep. 18, 2014 U.S. Final Office Action—U.S. Appl. No. 13/649,071. |
Sep. 26, 2014 U.S. Final Office Action—U.S. Appl. No. 14/044,989. |
Sep. 29, 2014 (WO) International Search Report—App PCT/US2014/036326. |
Apr. 2, 2015 U.S. Final Office Action—U.S. Appl. No. 14/022,935. |
Apr. 6, 2015—U.S. Non-Final Office Action—U.S. Appl. No. 14/039,632. |
Apr. 14, 2015—U.S. Notice of Allowance & Fees Due—U.S. Appl. No. 14/043,086. |
Apr. 16, 2015—U.S. Notice of Allowance & Fees Due—U.S. Appl. No. 13/886,765. |
Aug. 4, 2015—U.S. Non-Final Office Action—U.S. Appl. No. 13/963,739. |
Aug. 5, 2015—U.S. Notice of Allowance—U.S. Appl. No. 13/886,765. |
Aug. 7, 2015—U.S. Final Office Action—U.S. Appl. No. 14/043,331. |
Aug. 14, 2015—U.S. Non-final Office Action—U.S. Appl. No. 14/040,831. |
Aug. 14, 2015—U.S. Notice of Allowance—U.S. Appl. No. 14/044,919. |
Aug. 17, 2015—U.S. Final Office Action—U.S. Appl. No. 14/039,632. |
Aug. 20, 2015—U.S. Non-Final Office Action—U.S. Appl. No. 14/242,011. |
Aug. 21, 2015—U.S. Final Office Action—U.S. Appl. No. 14/039,651. |
Aug. 24, 2015—U.S. Non-final Office Action—U.S. Appl. No. 14/535,597. |
Aug. 26, 2015—U.S. Final Office Action—U.S. Appl. No. 14/027,929. |
Dec. 2, 2015—U.S. Non-final Office Action—U.S. Appl. No. 14/021,227. |
Dec. 10, 2015—U.S. Final Office Action—U.S. Appl. No. 14/340,096. |
Dec. 14, 2015—U.S. Non-final Office Action—U.S. Appl. No. 14/022,935. |
Dec. 18, 2015 U.S. Non-final Office Action—U.S. Appl. No. 14/039,632. |
Dec. 22, 2015—U.S. Final Office Action—U.S. Appl. No. 14/106,171. |
Feb. 12, 2015—U.S. Non-Final Office Action—U.S. Appl. No. 13/963,833. |
Feb. 18, 2015—U.S. Non-Final Office Action—U.S. Appl. No. 14/043,229. |
Jan. 5, 2015—U.S. Non-Final Office Action—U.S. Appl. No. 13/649,071. |
Jan. 5, 2015—U.S. Non-Final Office Action—U.S. Appl. No. 14/027,929. |
Jan. 7, 2015—U.S. Notice of Allowance & Fees Due—U.S. Appl. No. 14/045,014. |
Jan. 22, 2015—U.S. Notice of Allowance—U.S. Appl. No. 13/963,851. |
Jan. 26, 2015—U.S. Non-Final Office Action—U.S. Appl. No. 13/886,889. |
Jan. 27, 2015—U.S. Non-Final Office Action—U.S. Appl. No. 13/963,758. |
Jul. 8, 2015—U.S. Non-Final Office Action—U.S. Appl. No. 14/340,096. |
Jul. 22, 2015—U.S. Notice of Allowance—U.S. Appl. No. 13/963,758. |
Jul. 23, 2015—U.S. Non-Final Office Action—U.S. Appl. No. 14/025,898. |
Jul. 29, 2015—U.S. Final Office Action—U.S. Appl. No. 13/886,889. |
Jul. 6, 2015—U.S. Notice of Allowance—U.S. Appl. No. 13/649,024. |
Jul. 9, 2015—U.S. Final Offcie Action—U.S. Appl. No. 13/963,833. |
Jun. 5, 2015—U.S. Final Office Action—U.S. Appl. No. 13/649,071. |
Jun. 9, 2015—U.S. Notice of Allowance—U.S. Appl. No. 14/043,229. |
Jun. 15, 2015—U.S. Non-Final Office Action—U.S. Appl. No. 13/649,076. |
Jun. 17, 2015—U.S. Notice of Allowance—U.S. Appl. No. 14/055,078. |
Jun. 18, 2015—U.S. Non-Final Office Action—U.S. Appl. No. 14/043,902. |
Hana K. Rubinsztejn et al., “Support for Context-Aware Collaboration,” in “Serious Games,” Jan. 1, 2004 , Springer International Publishing, Cham, XP055522503, ISSN: 0302-9743, ISBN: 978-3-030-02761-2, vol. 3284, pp. 37-47, 2004. |
Ikuki Matsuhisa, Telecommunication, RIC Telecom, Sep. 25, 2011, vol. 28, No. 10, p. 66-69. |
Notification of Concurrently Filed Applications in 1 page. |
Symantec: “What are Managed Applications and What is the Difference Between Assigned and Published;” Jan. 7, 2002; pp. 1-5. |
Tilakgovind: “Understanding the Difference Between .exe and .msi: Symantec Connect;” Jan. 15, 2008. |
Vejda et al. “Towards Trust Services for Language-Based Virtual Machines for Grid Computing”, Graze University of Technology, (Mar. 11, 2008), pp. 48-59. |
Apr. 25, 2019—U.S. Final Office Action—U.S. Appl. No. 14/876,832. |
Jan. 7, 2019—(EP) Notice of Allowance—App. 13773923.1. |
Aug. 1, 2019—(EP) Extended European Search Report—App. 19172024.2. |
Sep. 19, 2019 (IN) First Examination Report—App. 2158/CHENP/2015. |
Sep. 18, 2019—U.S. Non-final Office Aciton—U.S. Appl. No. 16/295,273. |
Sep. 26, 2019—U.S. Final Office Action—U.S. Appl. No. 15/960,868. |
Sep. 30, 2019—U.S. Notice of Allowance—U.S. Appl. No. 15/957,642. |
Sep. 12, 2019—(JP) Notice of Allowance—App 2017-550935. |
Oct. 1, 2019—(EP) Notice of Allowance—App 15722806.5. |
Sep. 25, 2019 (EP) Communication pursuant to Article 94(3) EPC—App. 18185793.9. |
Oct. 24, 2019 (IN) First Examination Report—App. 2601/CHENP/2015. |
Oct. 17, 2017—(EP) Examination Report—App 13771691.6-1853. |
Apr. 16, 2019—U.S. Notice of Allowance—U.S. Appl. No. 16/267,357. |
Jul. 10, 2019—U.S. Notice of Allowance—U.S. Appl. No. 15/946,692. |
Jul. 4, 2019 (EP) Extended European Search Report—App. 19168479.4. |
Jun. 13, 2019—U.S. Final Office Action—U.S. Appl. No. 14/055,038. |
Jun 3, 2019—U.S. Notice of Allowance—U.S. Appl. No. 15/057,314. |
May 22, 2019 (EP) Extended European Search Report—App. 19152128.5. |
May 29, 2019—U.S. Final Office Action—U.S. Appl. No. 15/957,642. |
May 3, 2019 (EP) Examination Report—App. 13780486.0. |
Barr et al, ; The VMware mobile virtualization platform: is that a hypervisor in you pocket? Published in: Newsletter ACM SIGOPS Operatng Systems Review archive; vol. 44 Issue 4, Dec. 2010; pp. 124-135; ACM Digital Library (Year: 2010). |
Potega; Advanced Infrared (AIR): Intra-cabin wireless data netwok; Published in: 17th DASC. AAA/IEEE/SAE. Digital Avionics Systems Conference, proceedings (Cat, No. 98CH36267); Date of Conference: Oct. 31-Nov. 7, 1998; IEEE Xplore (Year: 1998). |
Oct. 29, 2019 (IN) First Examination Report—App. 6657/CHENP/2015. |
Nov. 29, 2019—(IN) Examination Report—App 2751/CHENP/2015. |
Nov. 25, 2019—U.S. Non-final Office Action—U.S. Appl. No. 14/876,832. |
Jan. 9, 2020—U.S. Non-final Office Action—U.S. Appl. No. 15/960,868. |
Nov. 25, 2019—(IN) Examination Report—App No. 6632/CHEN/2015. |
Yoshio Itaya, Windows & Linux, Book for complete understanding of dual boot, Sotec Ltd., May 15, 2009, First edition, p. 14 (documents presenting a well-known technique). |
Dynamic control technique of smart device based on policy, NTT Technical Journal, The Telecommunications Association, Oct. 1, 2012, vol. 24, No. 10, pp. 42.45. |
Dec. 11, 2019—(JP) Decision of Refusal—App 2018-189820. |
International Search Report received in PCT/US2014/036326 dated Sep. 29, 2014. |
Dec. 30, 2019—(CN) Office Action—App 201710937723.8. |
Jan. 23, 2020 (IN) First Examination Report—App. 6625/CHENP/2015. |
Jan. 24, 2020 (EP) Examination Report (Communication pursuant to Article 94(3))—App. 19152128.5. |
Jan. 31, 2020 (IN) First Examination Report—App. 6626/CHENP/2015. |
Dec. 31, 2019—(IN) Examination Report—App 2698/CHENP/2015. |
Feb. 20, 2020—U.S. Notice of Allowance—U.S. Appl. No. 16/567,238. |
Mar. 11, 2020—U.S. Final Office Action—U.S. Appl. No. 16/295,273. |
May 26, 2020—U.S. Non-final Office Action—U.S. Appl. No. 14/055,038. |
Jun. 8, 2020—U.S. Advisory Action—U.S. Appl. No. 16/295,273. |
Jun. 9, 2020—U.S. Final Office Action—U.S. Appl. No. 15/960,868. |
Jun. 23, 2020 (EP) Examination Report—App. 18186906.6. |
Jun. 17, 2020 (EP) Examination Report—App EP18186904.1. |
Aug. 19, 2020—U.S. Non-final Office Action—U.S. Appl. No. 16/295,273. |
Dec. 7, 2020—U.S. Notice of Allowance—U.S. Appl. No. 16/295,273. |
Jul. 21, 2020 (EP) Extended European Search Report—App. 20179037.5. |
Nov. 3, 2020 (CN) First Office Action—App. 201810705279.9. |
Sep. 15, 2020—U.S. Final Office Action—U.S. Appl. No. 16/111,328. |
Sep. 30, 2020—(EP) Notice of Allowance—App. 19172024.2. |
Sep. 30, 2020—U.S. Notice of Allowance—U.S. Appl. No. 16/519,243. |
Jan. 7, 2021—U.S. Final Office Action—U.S. Appl. No. 14/055,038. |
Jan. 8, 2021 (CN) First Chinese Office Action—App. 201810422004.7. |
Number | Date | Country | |
---|---|---|---|
20190258781 A1 | Aug 2019 | US |
Number | Date | Country | |
---|---|---|---|
61702671 | Sep 2012 | US | |
61649134 | May 2012 | US | |
61546922 | Oct 2011 | US | |
61546021 | Oct 2011 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16267357 | Feb 2019 | US |
Child | 16401588 | US | |
Parent | 15946692 | Apr 2018 | US |
Child | 16267357 | US | |
Parent | 14875450 | Oct 2015 | US |
Child | 15946692 | US | |
Parent | 13649024 | Oct 2012 | US |
Child | 14875450 | US |