Methods and systems for providing secure network connections to mobile communications devices
First Claim
Patent Images
1. A method for providing a first secure network connection to a mobile communications device, the method comprising:
- receiving, at a server, a request for a first secure network account from the mobile communications device;
generating, at the server in response to the received request and for the mobile communications device, the first secure network account for the first secure network connection, the generated first secure network account including first credentials for the first secure network connection;
transmitting, by the server, the first credentials to the mobile communications device;
receiving, by the server, the first credentials from the mobile communications device;
in response to receiving the first credentials from the mobile communications device, establishing, by the server, the first secure network connection between the server and the mobile communications device;
identifying, by the server, a trigger based on an analysis of network traffic over the first secure network connection; and
when a first level of security offered by the first secure network connection does not match a second level of security associated with the trigger in a secure network connection policy;
terminating the first secure network connection;
deleting the first credentials and the first secure network account;
generating at the server a second secure network account for a second secure network connection, the generated second secure network account including second credentials for the second secure network connection;
transmitting, by the server, the second credentials to the mobile communications device; and
establishing, by the server in response to receiving the second credentials from the mobile communications device, the second secure network connection between the server and the mobile communications device.
8 Assignments
0 Petitions
Accused Products
Abstract
A secure network connection is established between a server and a mobile communications device after the creation of a secure network account. The server, while analyzing traffic over the secure network connection identifies a triggering event or condition. In response the server modifies the secure network connection.
-
Citations
32 Claims
-
1. A method for providing a first secure network connection to a mobile communications device, the method comprising:
-
receiving, at a server, a request for a first secure network account from the mobile communications device; generating, at the server in response to the received request and for the mobile communications device, the first secure network account for the first secure network connection, the generated first secure network account including first credentials for the first secure network connection; transmitting, by the server, the first credentials to the mobile communications device; receiving, by the server, the first credentials from the mobile communications device; in response to receiving the first credentials from the mobile communications device, establishing, by the server, the first secure network connection between the server and the mobile communications device; identifying, by the server, a trigger based on an analysis of network traffic over the first secure network connection; and when a first level of security offered by the first secure network connection does not match a second level of security associated with the trigger in a secure network connection policy; terminating the first secure network connection; deleting the first credentials and the first secure network account; generating at the server a second secure network account for a second secure network connection, the generated second secure network account including second credentials for the second secure network connection; transmitting, by the server, the second credentials to the mobile communications device; and establishing, by the server in response to receiving the second credentials from the mobile communications device, the second secure network connection between the server and the mobile communications device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for providing a first secure network connection to a mobile communications device, the method comprising:
-
receiving, by the mobile communications device, first credentials for the first secure network connection, the first credentials generated, at a server, with a corresponding first secure network account for the first secure network connection and the first credentials transmitted, by the server, to the mobile communications device, wherein the first credentials and first secure network account are generated based on a request received by the server from the mobile communication device; and sending, by the mobile communications device, the first credentials to the server, wherein upon receiving the first credentials the server; establishes the first secure network connection between the server and the mobile communications device, identifies a trigger based on an analysis of network traffic over the first secure network connection; and
;when a first level of security offered by the first secure network connection does not match a second level of security associated with the trigger in a secure network connection policy; terminates the first secure network connection; deletes the first credentials and the first secure network account; generates a second secure network account for a second secure network connection, the generated second secure network account including second credentials for the second secure network connection; transmits the second credentials to the mobile communications device, and establishes, in response to receiving the second credentials from the mobile communications device, the second secure network connection with the second level of security between the mobile communications device and the server. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory, computer-readable storage medium having stored thereon a plurality of instructions, which, when executed by a processor of a server, cause the server to:
-
receive a request for a first secure network account from a mobile communications device; generate, in response to the received request and for the mobile communications device, the first secure network account for the first secure network connection, the generated first secure network account including first credentials for the first secure network connection; transmit the first credentials to the mobile communications device; receive the first credentials from the mobile communications device; in response to receiving the first credentials from the mobile communications device, establish the first secure network connection between the server and the mobile communications device; identify a trigger based on an analysis of network traffic over the first secure network connection; and when a first level of security offered by the first secure network connection does not match a second level of security associated with the trigger in a secure network connection policy; terminate the first secure network connection; delete the first credentials and the first secure network account; generate a second secure network account for a second secure network connection, the generated second secure network account including second credentials for the second secure network connection; transmit the second credentials to the mobile communications device; and establish, in response to receiving the second credentials from the mobile communications device, the second secure network connection between the server and the mobile communications device. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. A system, comprising a server with at least one processor and memory and instructions that when executed by the at least one processor cause the server to:
-
receive a request for a first secure network account from a mobile communications device; generate, in response to the received request and for the mobile communications device, the first secure network account for the first secure network connection, the generated first secure network account including first credentials for the first secure network connection; transmit the first credentials to the mobile communications device; receive the first credentials from the mobile communications device; in response to receiving the first credentials from the mobile communications device, establish the first secure network connection between the server and the mobile communications device; identify a trigger based on an analysis of network traffic over the first secure network connection; and when a first level of security offered by the first secure network connection does not match a second level of security associated with the trigger in a secure network connection policy; terminate the first secure network connection; delete the first credentials and the first secure network account; generate a second secure network account for a second secure network connection, the generated second secure network account including second credentials for the second secure network connection; transmit the second credentials to the mobile communications device; and establish, in response to receiving the second credentials from the mobile communications device, the second secure network connection between the server and the mobile communications device. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32)
-
Specification