ENTERPRISE-WIDE SECURITY SYSTEM FOR COMPUTER DEVICES
11 Assignments
0 Petitions
Accused Products
Abstract
A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program (202) executed in the computing node (102) interfaces with a device security program (204) executed at a mobile device (104). The computing node (102) is responsible for managing the security based on a node security profile (208) interpreted by a node security program (202) executed in the computing node (102). A device discovery method and arrangement (106) also detects and locates various information (120) about the mobile devices (104) based on a scan profile (206).
129 Citations
45 Claims
-
1-25. -25. (canceled)
-
26. A method, comprising:
-
communicating with a mobile device from a computing node, which includes a node security program configured to interpret a security profile; and determining at least one security parameter in order to manage a process involving the mobile device; and determining that the process is not authorized such that activities are restricted on the mobile device. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. Logic encoded in non-transitory tangible media that includes code for execution and when executed by a processor is operable to perform operations comprising:
-
communicating with a mobile device from a computing node, which includes a node security program configured to interpret a security profile; and determining at least one security parameter in order to manage a process involving the mobile device; and determining that the process is not authorized such that activities are restricted on the mobile device. - View Dependent Claims (37, 38, 39, 40, 41)
-
-
42. An apparatus, comprising:
a computing node that includes a node security program configured to interpret a security profile, the apparatus being configured for; communicating with a mobile device, which; and determining at least one security parameter in order to manage a process involving the mobile device; and determining that the process is not authorized such that activities are restricted on the mobile device, wherein the process is associated with a data transfer associated with the mobile device. - View Dependent Claims (43, 44, 45)
Specification