Securing a network connection by way of an endpoint computing device
First Claim
1. In a computing system environment, a method of securing a network by way of a mobile, endpoint computing device, comprising:
- pre-defining a security policy for the endpoint computing device;
establishing a computing connection from the endpoint computing device to another computing device;
determining whether enforcement of the security policy jeopardizes a continued computing connection between the endpoint and the another computing devices; and
if so, altering the security policy.
16 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus involve securing a network connection by way of mobile, endpoint computing assets. The endpoints have one or more pre-defined security policies governing the connection that are balanced against competing interests of actually maintaining connections between devices, especially in WiMAX, MANET, MESH, or other ad hoc computing environments where poor security, signal strength, fragile connections or mobility issues are of traditional concern. In this manner, connections will not be lost over security enforcement in an otherwise hostile environment. The security policies are enforced in a variety of ways, but may be altered to lesser policies or not-so-strictly enforced so as to maintain satisfactory connections between devices. Other embodiments contemplate analyzing connectivity components before connection and selecting only those components that enable full or best compliance with the policies. Still other embodiments contemplate altering connections in order to maintain full enforcement of policies. Computer program products are also disclosed.
-
Citations
20 Claims
-
1. In a computing system environment, a method of securing a network by way of a mobile, endpoint computing device, comprising:
-
pre-defining a security policy for the endpoint computing device; establishing a computing connection from the endpoint computing device to another computing device; determining whether enforcement of the security policy jeopardizes a continued computing connection between the endpoint and the another computing devices; and if so, altering the security policy. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. In a computing system environment, a method of securing a network by way of a mobile, endpoint computing device, comprising:
-
pre-defining a security policy for the endpoint computing device; establishing a computing connection from the endpoint computing device to another computing device; determining whether compliance with the security policy implicates a lost computing connection between the endpoint and the another computing devices; and if so, altering the computing connection to comply with the security policy.
-
-
8. In a computing system environment, a method of securing a network by way of a mobile, endpoint computing device, comprising:
-
pre-defining a security policy for the endpoint computing device; determining which connectivity components of the endpoint computing device and the network will satisfactorily allow a computing connection to comply with the security policy; and configuring the computing connection using said determined connectivity components, the network including a WiMAX, MESH, MANET or ad hoc computing connection from the endpoint computing device to another computing device. - View Dependent Claims (9, 10)
-
-
11. In a computing system environment, a method of securing a network by way of a mobile, endpoint computing device, comprising:
-
pre-defining a security policy for the endpoint computing device; determining whether any connectivity components of the endpoint computing device and the network will satisfactorily allow a computing connection between the endpoint computing device and another computing device to comply with the security policy; and if so, configuring the computing connection using only said determined connectivity components, the network including a WiMAX, MESH, MANET or ad hoc computing connection from the endpoint computing device to another computing device. - View Dependent Claims (12)
-
-
13. A network computing system, comprising:
first and second computing devices, the first computing device having a control module to enforce a pre-defined security policy regarding computing connections with the second computing device and at least one connectivity component that is used to establish the computing connection in a network, wherein the control module enforces a different security policy on the at least one connectivity component upon determination that the computing connection will be compromised if the pre-defined security policy is strictly enforced.
-
14. A network computing system, comprising:
first and second computing devices, the first computing device having a control module to enforce a pre-defined security policy regarding computing connections with the second computing device and at least one connectivity component that is used to establish the computing connection in a network having other connectivity components, wherein the control module determines whether the connectivity component of the first computing device and the other connectivity components of the network will allow the computing connection to comply with the pre-defined security policy.
-
15. A network computing system, comprising:
first and second computing devices, the first computing device having a control module to enforce a pre-defined security policy regarding computing connections with the second computing device and a plurality of connectivity components that can be used to establish the computing connection in a network having other connectivity components, wherein the control module determines which of the plurality of connectivity components will allow the computing connection to comply with the pre-defined security policy and enables configuring the computing connection with only said determined connectivity components.
-
16. A computer program product for loading on a computing device to secure a network connection between a mobile, endpoint computing device and another computing device, the computer program product having executable instructions that enforce a pre-defined security policy regarding computing connections between the computing devices and enforce a different security policy upon determination that the computing connections will be compromised if the pre-defined security policy is strictly enforced.
-
17. A computer program product for loading on a computing device to secure a network connection between a mobile, endpoint computing device and another computing device, the computer program product having executable instructions that enforce a pre-defined security policy regarding computing connections between the computing devices and determine whether connectivity components of the endpoint computing device and other connectivity components of the network will actually allow the computing connection to comply with the pre-defined security policy.
- 18. A computer program product for loading on a mobile, endpoint computing device to secure a network connection between the endpoint computing device and another computing device, the computer program product having executable instructions that enforce a pre-defined security policy regarding computing connections between the computing devices and determine which of a plurality of connectivity components of the endpoint computing device will allow the computing connection to comply with the pre-defined security policy.
Specification