SELF-DELEGATING SECURITY ARRANGEMENT FOR PORTABLE INFORMATION DEVICES
First Claim
1. A portable information device having a dynamically configurable security arrangement, the device comprising:
- computer circuitry, including a processor operatively coupled to a data store;
wireless communications circuitry; and
a power supply that provides power to the computer circuitry, user interface, and wireless communications circuitry, the power supply including an on-board energy source;
wherein the computer circuitry includes a security arrangement comprising;
a configurable security module that facilitates security services in the portable information device, wherein the configurable security module is capable of selectively executing certain ones of the security services locally on the portable information device, and is capable of selectively utilizing least one computing device that is distinct from the portable information device to remotely execute certain ones of the security services;
a risk profiling module adapted to dynamically re-assess a current set of security risks to which the information device is exposed; and
a security configuration module that is adapted to;
(i) dynamically generate a selection of which of the security services are to be executed locally by the security module on the portable information device, and which of the security services are to be executed remotely on the at least one computing device that is distinct from the portable information device, the selection being made in response to a re-assessment of the current set of security risks to which the portable information device is exposed by the risk profiling module; and
(ii) dynamically reconfigure operational settings of the configurable security module such that security services are facilitated based on the selection that is generated in (i).
2 Assignments
0 Petitions
Accused Products
Abstract
A portable information device includes a dynamically configurable security arrangement in which operational settings are automatically and dynamically configured based on a current set of security risks to which the device is exposed, on a current computing capacity of the portable information device, or both. The operational settings can be adjusted to control which security services or functions are to be executed locally by portable information device, and which of the security services or functions are to be executed remotely on at least one computing device that is distinct from the portable information device.
116 Citations
22 Claims
-
1. A portable information device having a dynamically configurable security arrangement, the device comprising:
-
computer circuitry, including a processor operatively coupled to a data store; wireless communications circuitry; and a power supply that provides power to the computer circuitry, user interface, and wireless communications circuitry, the power supply including an on-board energy source; wherein the computer circuitry includes a security arrangement comprising; a configurable security module that facilitates security services in the portable information device, wherein the configurable security module is capable of selectively executing certain ones of the security services locally on the portable information device, and is capable of selectively utilizing least one computing device that is distinct from the portable information device to remotely execute certain ones of the security services; a risk profiling module adapted to dynamically re-assess a current set of security risks to which the information device is exposed; and a security configuration module that is adapted to; (i) dynamically generate a selection of which of the security services are to be executed locally by the security module on the portable information device, and which of the security services are to be executed remotely on the at least one computing device that is distinct from the portable information device, the selection being made in response to a re-assessment of the current set of security risks to which the portable information device is exposed by the risk profiling module; and (ii) dynamically reconfigure operational settings of the configurable security module such that security services are facilitated based on the selection that is generated in (i). - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A portable information device having a dynamically configurable security arrangement, the device comprising:
-
computer circuitry, including a processor operatively coupled to a data store; wireless communications circuitry; and a power supply that provides power to the computer circuitry, user interface, and wireless communications circuitry, the power supply including an on-board energy source; wherein the computer circuitry includes a security arrangement comprising; a configurable security module that facilitates security services in the portable information device, wherein the configurable security module is capable of selectively executing certain ones of the security services locally on the portable information device, and is capable of selectively utilizing least one computing device that is distinct from the portable information device to remotely execute certain ones of the security services; a computing capacity determining module adapted to re-assess computing capacity availability relating to usage and performance expectations for operation of the information device; and a security configuration module that is adapted to; (i) dynamically generate a selection of which of the security services are to be executed locally by the security module on the portable information device, and which of the security services are to be executed remotely on the at least one computing device that is distinct from the portable information device, the selection being made in response to a change in the computing capacity availability based on a re-assessment of the computing capacity availability by the computing capacity determining module; and (ii) dynamically reconfigure operational settings of the configurable security module such that security services are facilitated based on the selection that is generated in (i). - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method for automatically configuring a portable information device to facilitate usability while providing security protection for the information device, the method comprising:
-
dynamically determining, by the portable information device, a set of current security risks to which the information device is exposed based on a current usage of the portable information device; dynamically determining, by the portable information device, a set of security functionality with which a security module is to be configured in the portable information device to protect the portable information device in response to a result of the dynamically determining of the set of current security risks; dynamically re-assessing, by the portable information device, from among the set of security functionality, a subset of more essential security functionality and a subset of less essential security functionality relevant to the set of current security risks; dynamically re-assessing, by the portable information device, current computing capacity availability relating to usage and performance expectations for operation of the portable information device; and dynamically configuring, by the portable information device, the security arrangement to run on the portable information device based on a result of the dynamically determining of the current set of security risks and on a result of the dynamically re-assessing of the current computing capacity availability, including; in response to the result of the re-assessing of the current computing capacity availability being indicative of a reduction of computing capacity availability from a previous computing capacity availability, disabling the subset of less essential security functionality to an extent that computational loading on the information device attributable to operation of the configurable security module is reduced to facilitate operation of the information device corresponding to the usage and performance expectations while the information device executes the subset of more essential security functionality. - View Dependent Claims (13, 14)
-
-
15. A method for automatically configuring a security arrangement of a portable information device, the method comprising:
-
dynamically re-assessing, by the portable information device, current computing capacity availability relating to usage and performance expectations for operation of the portable information device; and dynamically reconfiguring, by the portable information device, the security arrangement to run on the portable information device based a result of the dynamically re-assessing of the current computing capacity availability, including; in response to the result of the re-assessing of the current computing capacity availability being indicative of a reduction of computing capacity availability from a previous level of computing capacity availability, dynamically reconfiguring operational settings of the security arrangement such that certain security functionality that was previously executed locally by the portable information device, is executed remotely on at least one computing device that is distinct from the portable information device. - View Dependent Claims (16, 17, 18)
-
-
19. A method for automatically configuring a security arrangement of a portable information device, the method comprising:
-
dynamically determining, by the portable information device, a set of current security risks to which the information device is exposed based on a current usage of the portable information device; and dynamically reconfiguring, by the portable information device, the security arrangement to run on the portable information device based a result of the dynamically determining of the set of current security risks, including; in response to the result of the dynamically determining of the set of current security risks being indicative of an increase in security risk to which the portable information device is currently exposed from a previous level of security risk, dynamically reconfiguring operational settings of the security arrangement such that certain security functionality that was previously executable locally by the portable information device is executed remotely on at least one computing device that is distinct from the portable information device. - View Dependent Claims (20, 21, 22)
-
Specification