发明名称 Validating the identity of a mobile application for mobile application management
摘要 A method of managing access to enterprise resources is provided. An access manager may operate at a mobile device to validate a mobile application installed at that mobile device. If the access manager does not successfully validate the mobile application, the access manager may prevent the mobile application from accessing computing resource. If the access manager does successfully validate the mobile application, then the access manager may identify the mobile application as a trusted mobile application. The access manager may thus permit the trusted mobile application to access the computing resource.
申请公布号 US9270674(B2) 申请公布日期 2016.02.23
申请号 US201313898167 申请日期 2013.05.20
申请人 Citrix Systems, Inc. 发明人 Lang Zhongmin;Barton Gary;Walker James Robert
分类号 G06F21/00;H04L29/06;G06F21/44;H04W12/06;H04W12/08 主分类号 G06F21/00
代理机构 Banner & Witcoff, Ltd. 代理人 Banner & Witcoff, Ltd.
主权项 1. A method of managing access to enterprise resources comprising: operating an access manager at a mobile computing device; storing, at the mobile computing device, identification information corresponding to an identification token embedded in a mobile application installed at the mobile computing device; validating, using the access manager, the mobile application based, at least in part, on the identification token and the identification information stored wherein validating the mobile application comprises challenging the mobile application to provide a response that is based, at least in part, on the identification token,generating an expected response based, at least in part, on the identification information stored,comparing the expected response to the response provided by the mobile application, anddetermining that the mobile application is either valid or invalid based on whether the expected response matches the response provided by the mobile application; preventing the mobile application from accessing a computing resource upon unsuccessful validation of the mobile application by the access manager; identifying the mobile application as a trusted mobile application upon successful validation of the mobile application by the access manager; and permitting the trusted mobile application to access the computing resource.
地址 Fort Lauderdale FL US