CONNECTIVITY DEPENDENT APPLICATION SECURITY FOR REMOTE DEVICES
First Claim
1. A method for providing conditional access to a security-sensitive application in a remote device where access to connectivity is used to affect the security of the security-sensitive application, comprising:
- receiving a request to access a security-sensitive application in the remote device;
ascertaining a history of access to connectivity for the remote device;
applying a first security level in providing access to the security-sensitive application if a first history of access to connectivity is ascertained; and
applying a second security level in providing access to the security-sensitive application if a second history of access lo connectivity is ascertained, where the second security level is more stringent then the first security level.
1 Assignment
0 Petitions
Accused Products
Abstract
Conditional access to security-sensitive applications and/or content in a remote device may be granted based on a history of access to connectivity (e.g., access to a communication network) for the remote device. A remote device may monitor access to connectivity. If it is determined that the remote device has a first history to access to connectivity (e.g., a recent access to connectivity), a first security level is applied in providing access to the security-sensitive application. Otherwise, if a second history of access to connectivity is ascertained (e.g., no recent access to connectivity), a second security level is applied in providing access to the security-sensitive application, where the second security level is more stringent then the first security level. If the remote device is lost, a remote server may send a request to the remote device to restrict or disable access to the security-sensitive applications and/or content
67 Citations
38 Claims
-
1. A method for providing conditional access to a security-sensitive application in a remote device where access to connectivity is used to affect the security of the security-sensitive application, comprising:
-
receiving a request to access a security-sensitive application in the remote device; ascertaining a history of access to connectivity for the remote device; applying a first security level in providing access to the security-sensitive application if a first history of access to connectivity is ascertained; and applying a second security level in providing access to the security-sensitive application if a second history of access lo connectivity is ascertained, where the second security level is more stringent then the first security level. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A remote device adapted to provide conditional access to a security-sensitive application in the remote device where access to connectivity is used to affect the security of the security-sensitive application, the remote device comprising:
-
a memory device; a transceiver coupled to the memory device, the transceiver for providing connectivity to the remote device; and a processing circuit coupled to the memory device and the transceiver, the processing circuit configured to receive a request to access the security-sensitive application in the remote device, ascertain a history of access to connectivity for the remote device, apply applying a first security level in providing access to the security-sensitive application if a first history of access to connectivity is ascertained, and apply a second security level in providing access to the security-sensitive application if a second history of access to connectivity is ascertained, where the second security level is more stringent then the first security level. - View Dependent Claims (22, 23, 24, 25)
-
-
26. A remote device, comprising:
-
means for receiving a request to access a security-sensitive application in the remote device; means for ascertaining a history of access to connectivity for the remote device; means for applying a first security level in providing access to the security-sensitive application if a first history of access to connectivity is ascertained; and means for applying a second security level in providing access to the security-sensitive application if a second history of access to connectivity is ascertained, where the second security level is more stringent then the first security level. - View Dependent Claims (27, 28, 29, 30, 31)
-
-
32. A circuit for providing conditional access to a security-sensitive application in a remote device, wherein the circuit is adapted to:
-
receive a request to access a security-sensitive application in the remote device; ascertain a history of access to connectivity for the remote device; apply a first security level in providing access to the security-sensitive application if a first history of access to connectivity is ascertained; and apply a second security level in providing access to the security-sensitive application if a second history of access to connectivity is ascertained, where the second security level is more stringent then the first security level.
-
-
33. A computer-readable medium comprising instructions for providing conditional access to a security-sensitive application in a remote device, which when executed by a processor causes the processor to:
-
receive a request to access a security-sensitive application in the remote device; ascertain a history of access to connectivity for the remote device; apply a first security level in providing access to the security-sensitive application if a first history of access to connectivity is ascertained; and apply a second security level in providing access to the security-sensitive application if a second history of access to connectivity is ascertained, where the second security level is more stringent then the first security level. - View Dependent Claims (34, 35, 36)
-
-
37. A method for restricting access to a security-sensitive application on a remote device, comprising:
-
receiving a request at a remote server to restrict access to a security-sensitive application in a remote device; sending a request from the remote server to the security-sensitive application to restrict access to the security-sensitive; and upon receiving the restriction request from the remote server, the remote device restricts access to the security-sensitive application. - View Dependent Claims (38)
-
Specification