Enterprise-wide security system for computer devices
First Claim
1. A method for securing a computer system that includes one or more mobile devices and one or more computing nodes, comprising:
- executing a node security program in one of the computing nodes to implement a node security profile;
determining at least one security parameter from the implementation of the node security profile;
transferring a device security profile from the computing node to at least one of the mobile devices, the device security profile being based on the at least one security parameter;
executing a device security program in the at least one mobile device to implement the device security profile; and
managing at least one security process between the computing node and the at least one mobile device in accordance with the device security profile.
14 Assignments
0 Petitions
Accused Products
Abstract
A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program (202) executed in the computing node (102) interfaces with a device security program (204) executed at a mobile device (104). The computing node (102) is responsible for managing the security based on a node security profile (208) interpreted by a node security program (202) executed in the computing node (102). A device discovery method and arrangement (106) also detects and locates various information (120) about the mobile devices (104) based on a scan profile (206).
99 Citations
25 Claims
-
1. A method for securing a computer system that includes one or more mobile devices and one or more computing nodes, comprising:
-
executing a node security program in one of the computing nodes to implement a node security profile;
determining at least one security parameter from the implementation of the node security profile;
transferring a device security profile from the computing node to at least one of the mobile devices, the device security profile being based on the at least one security parameter;
executing a device security program in the at least one mobile device to implement the device security profile; and
managing at least one security process between the computing node and the at least one mobile device in accordance with the device security profile. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
Specification