SYSTEM AND METHOD FOR IMPLEMENTING SECURITY FEATURES AND POLICIES BETWEEN PAIRED COMPUTING DEVICES
First Claim
1. A method, performed on a roaming device, for directing policy implementation on a paired computing device, the method comprising:
- on the roaming device, communicating with a policy node using a wireless network to receive one or more policy directives; and
transmitting an instruction based on the one or more policy directives to the paired computing device, in order to cause the paired computing device to implement or configure a policy, wherein transmitting the instruction is performed using a local communication port.
9 Assignments
0 Petitions
Accused Products
Abstract
A roaming device to secure data and/or resources on an associated computing device. The roaming device may communicate with a remote policy node or station to receive one or more policy directives. The roaming device may use a wireless wide area network (WAN) to communicate with the policy node, such as provided by cellular networks. The roaming device may cause the paired computing device to implement or configure a policy by communicating an instruction to the paired computing device. This instruction may be based on the policy directives that the roaming device receives from the policy node. The communication exchanged between the roaming device and the paired computing device may be over a local wireless communication port, such as provided by short-range wireless communication ports. The roaming device may also act as a key for the associated computing device, using communications over short range wireless communication ports to bypass user security features if the roaming device is in close proximity to the associated computing device.
68 Citations
46 Claims
-
1. A method, performed on a roaming device, for directing policy implementation on a paired computing device, the method comprising:
-
on the roaming device, communicating with a policy node using a wireless network to receive one or more policy directives; and transmitting an instruction based on the one or more policy directives to the paired computing device, in order to cause the paired computing device to implement or configure a policy, wherein transmitting the instruction is performed using a local communication port. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14-34. -34. (canceled)
-
35. A method for securing data, the method comprising:
-
receiving, on a first computing device, a wireless communication from a policy node that includes a first policy directive; identifying a second computing device that is paired with the first computing device and in position to receive communications from the first computing device over a local communication port; and communicating a second policy directive to the second computing device using the local communication port, wherein the second policy directive is based at least in part on the first policy directive and instructs the second computing device to implement a particular policy. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
Specification