Zscaler, Inc.
Quarantining fake, counterfeit, jailbroke, or rooted mobile devices in the cloud

Last updated:

Abstract:

Systems and methods include, in a cloud node executing a security service, causing a mobile device to perform a validation check to determine if the mobile device is any of fake, counterfeit, jailbroken, and rooted; responsive to successful validation, allowing traffic to and from the mobile device through the security service; and responsive to unsuccessful validation, preventing traffic to and from the mobile device through the security service. The systems and methods can further include, prior to the causing, requiring the mobile device to install and launch an application, wherein registration with the security service requires the application; and performing the validation check via the application and a fake check service.

Status:
Application
Type:

Utility

Filling date:

30 May 2019

Issue date:

22 Oct 2020