Server, computer memory, and method to support security policy maintenance and distribution
First Claim
1. A server module deployed on a server that is connected to a wireless network access node, comprising:
- a database containing user information for multiple wireless devices, each element in the database attributable to at least one authorized wireless device and containing at least one type of data file from the group consisting of;
(i) wireless connectivity permissions, (ii) authorized wireless device identification, and (iii) authorized network access node information.
18 Assignments
0 Petitions
Accused Products
Abstract
In a particular embodiment, a server module deployed on a server is disclosed. The server module is connected to a wireless network access node. The server module includes a database containing user information for multiple wireless devices. Each element in the database is attributable to at least one authorized wireless device and contains at least one type of data file from the following group: (i) wireless connectivity permissions, (ii) authorized wireless device identification, and (iii) authorized network access node information. In another embodiment, a computer memory is disclosed. The computer memory includes a plurality of operating keys for use in connection with security features of a mobile computing device and a root key. The root key is to encrypt the plurality of operating keys. In another embodiment, a method of enforcing security policies at a mobile computing device is provided. The method includes receiving a policy at the mobile computing device and enforcing the policy at the mobile computing device by disallowing a user of the mobile computing device from engaging in the use precluded by the use limitation. The policy includes at least one device use limitation.
241 Citations
18 Claims
-
1. A server module deployed on a server that is connected to a wireless network access node, comprising:
a database containing user information for multiple wireless devices, each element in the database attributable to at least one authorized wireless device and containing at least one type of data file from the group consisting of;
(i) wireless connectivity permissions, (ii) authorized wireless device identification, and (iii) authorized network access node information.- View Dependent Claims (2)
-
3. A computer memory comprising:
-
a plurality of operating keys for use in connection with security features of a mobile computing device; and
a root key, the root key to encrypt the plurality of operating keys. - View Dependent Claims (4, 5)
-
-
6. A method of enforcing security policies at a mobile computing device, the method comprising:
-
receiving a policy at the mobile computing device, the policy including at least one device use limitation;
enforcing the policy at the mobile computing device by disallowing a user of the mobile computing device from engaging in the use precluded by the use limitation. - View Dependent Claims (7)
-
-
8. A security method comprising:
-
receiving a password from a user of a mobile computing device;
deriving a security code from the password by applying a non-linear function; and
encrypting the security code using the password as an encryption key. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A method of selectively providing a mobile computing device with access to a software application on a server, the method comprising:
-
receiving a request to access the software application from the mobile computing device;
determining whether to grant access to the software application by checking whether the mobile computing device has an installed security program. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A method of updating policies and key materials, the method comprising:
-
providing a shared encryption key that is shared by a server and a client module;
encrypting data on the client using the shared encryption key;
authenticating a user of a mobile computing device by receiving a password, the client resident at the mobile computing device;
decrypting the shared key using the password;
using the shared key to decrypt updated policies and key materials; and
replacing policies and key materials at the mobile computing device with the updated and decrypted policies and key materials.
-
Specification