Enterprise-wide security system for computer devices
First Claim
Patent Images
1. A method for securing a computer system that includes one or more mobile devices and one or more a computing node, comprising:
- executing a node security program in the computing node for interpreting a node security profile;
determining at least one security parameter from the interpretation of the node security profile; and
managing at least one security process between the computing node and one or more mobile devices based on the at least one security parameter determined by interpreting the node security profile.
17 Assignments
0 Petitions
Accused Products
Abstract
A system and method for securing data in mobile devices includes a computing node and a plurality of mobile devices. A node security program executed in the computing node interfaces with a device security program executed at a mobile device. The computing node is responsible for managing the security based on a node security profile interpreted by a node security program executed in the computing node. A device discovery method and arrangement also detects and locates various information about the mobile devices based on a scan profile.
-
Citations
40 Claims
-
1. A method for securing a computer system that includes one or more mobile devices and one or more a computing node, comprising:
-
executing a node security program in the computing node for interpreting a node security profile;
determining at least one security parameter from the interpretation of the node security profile; and
managing at least one security process between the computing node and one or more mobile devices based on the at least one security parameter determined by interpreting the node security profile. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A method for managing a computer system including a computing node and one or more mobile devices, comprising:
-
running a discovery program to detect one or more mobile devices or resources;
determining information regarding one or more mobile devices or resources based on at least one of a registry resource, a file resource, a process resource, a network management parameter, a data format, a packet format, a synchronization log entry, a directory structure, a database entry, the presence of an executable program and attributes associated with a mobile device or resource; and
using the determined mobile device information for managing security of the computer system. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40)
-
Specification