System and method for enforcing a security policy on mobile devices using dynamically generated security profiles
First Claim
1. A method for enforcing security parameters in a system that includes one or more mobile devices and one or more computing nodes, comprising:
- collecting information from a source relating to a mobile device;
based on the collected information, determining an identity status for the mobile device that is unique to the mobile device and distinguishes it from other mobile devices;
generating a security profile based on the identity status of the mobile device; and
applying the security profile to the mobile device.
13 Assignments
0 Petitions
Accused Products
Abstract
A system and method for enforcing security parameters that collects information from a source relating to a mobile device (104). Based on the collected information, an identity status for the mobile device (104) is determined that uniquely identifies the mobile device (104) and distinguishes it from other mobile devices. The identity status of the mobile device (104) can be determined when the mobile device (104) connects to a computing node source (102) or when the mobile device (104) accesses a resource (124) within the network. A security profile based on the identity status of the mobile device (104) is generated and the security profile is applied to the mobile device (104).
-
Citations
35 Claims
-
1. A method for enforcing security parameters in a system that includes one or more mobile devices and one or more computing nodes, comprising:
-
collecting information from a source relating to a mobile device;
based on the collected information, determining an identity status for the mobile device that is unique to the mobile device and distinguishes it from other mobile devices;
generating a security profile based on the identity status of the mobile device; and
applying the security profile to the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for unlocking a password protected mobile device associated with a security station, comprising:
-
authenticating a user of the mobile device;
authenticating the mobile device according to a device authentication code that is generated based on an identity status of the mobile device that uniquely characterizes the mobile device; and
generating an unlock code for unlocking the password protected mobile device. - View Dependent Claims (18, 19, 20, 30)
-
-
21. A method for protecting a mobile device, comprising:
-
transmitting a request from the mobile device in response to a security threat;
creating a device security profile in response to the request based on the security threat; and
transmitting the device security profile to the mobile device. - View Dependent Claims (22, 23, 24, 25, 26)
-
-
27. A method for protecting a mobile device that connects to a computing node, comprising:
-
transmitting a new computing node login information to the mobile device in a device security profile;
retrieving the new computing node login information from the device security profile at the mobile device; and
setting the new computing node login information as the new login information for the mobile device. - View Dependent Claims (28, 29)
-
-
31. A method for protecting a network comprising, comprising:
-
detecting access by a mobile device to one or more resources within the network;
authenticating the mobile device for access to the one or more resources; and
transmitting a device security profile to the mobile device upon authentication, said security profile comprising rules for accessing the one or more resources. - View Dependent Claims (32, 33)
-
-
34. A method for securing a computing node that connects to different mobile devices, comprises:
-
applying security rules to the different mobile devices in accordance with corresponding device parameters contained in a security signature file;
detecting a change in at least one of the device parameters of a mobile device; and
modifying the security rules applied to the mobile device at the computing node in accordance with one or more device parameters of an updated security signature file. - View Dependent Claims (35)
-
Specification