System and method for distribution of security policies for mobile devices
First Claim
1. A wireless security system, comprising:
- a client module deployed on a wireless device;
a network module selectively coupled to the client module during synchronization; and
a server module coupled to the network module, wherein the client module is adapted to authenticate use of a wireless computing device independent of the network module and the server module.
18 Assignments
0 Petitions
Accused Products
Abstract
In a particular embodiment, a wireless security system is disclosed. The wireless security system includes a client module deployed on a wireless device, a network module, and a server module. The client module is adapted to authenticate a wireless device while the wireless device is operating independently from the network module and the server module. In another embodiment, a method of distributing security policy information from a server to a mobile computing device is disclosed. The method includes authentication of a connection between the server and a gatekeeper, sending a policy package to the gatekeeper, initiating data synchronization between the mobile computing device and the gatekeeper, authenticating the mobile computing device, and sending the policy package from the gatekeeper to the mobile computing device.
-
Citations
13 Claims
-
1. A wireless security system, comprising:
-
a client module deployed on a wireless device;
a network module selectively coupled to the client module during synchronization; and
a server module coupled to the network module, wherein the client module is adapted to authenticate use of a wireless computing device independent of the network module and the server module. - View Dependent Claims (2, 3)
-
-
4. A method of installing a security software application from a network module to a mobile computing device, the method comprising:
-
providing a network module, the network module including security policies and key material, the security policies and key material communicated to the network module from a server;
when the mobile device is synchronizing with the network module, initiating installation of a security software program onto the mobile security device;
requesting a one-time password;
receiving the one-time password at the mobile computing device; and
using the one-time password to decrypt a root key associated with the key materials. - View Dependent Claims (5, 6, 7, 8)
-
-
9. A method of distributing security policy information from a server to a mobile computing device, the method comprising:
-
authenticating a connection between the server and a gatekeeper;
sending a policy package to the gatekeeper;
initiating data synchronization between the mobile computing device and the gatekeeper;
authenticating the mobile computing device; and
sending the policy package from the gatekeeper to the mobile computing device. - View Dependent Claims (10, 11, 12, 13)
-
Specification