×

System and method for providing network security to mobile devices

DC
  • US 10,089,462 B2
  • Filed: 08/29/2017
  • Issued: 10/02/2018
  • Est. Priority Date: 12/13/2005
  • Status: Active Grant
First Claim
Patent Images

1. A security system, comprising:

  • a mobile device including at least one mobile device processor, mobile device memory and a mobile device data port, the mobile device memory having data transfer code and a data transfer policy thereon,the data transfer code being configured to disable all data transfer via resident devices resident on the mobile device, when the mobile device is outside of any of one or more trusted networks and when a trusted security device is not coupled to the mobile device data port of the mobile device,the data transfer code being configured to determine whether the mobile device is on any of the one or more trusted networks by searching for a predetermined network device on the one or more trusted networks,the data transfer code being configured to enable data transfer via at least one of the resident devices, when the mobile device is outside of any of the one or more trusted networks and only if the trusted security device is coupled to the mobile device data port of the mobile device,at least a portion of the data transfer code configured to enable activation and deactivation by a trusted information technology (IT) person of a trusted enterprise, andthe data transfer policy including information for identifying the one or more trusted networks, anda particular trusted security device including at least one security device processor, security device memory and a security device data port, the security device data port configured to couple to the mobile device data port, the at least one security device processor being different than the at least one mobile device processor, the security device memory including security code and a security policy thereon,the security code configured to receive particular incoming data before the at least one mobile device processor processes the particular incoming data, andthe security code configured to evaluate the particular incoming data for malware to implement the security policy as it relates to the particular incoming data.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×