ESTABLISHING CONNECTIVITY BETWEEN AN ENTERPRISE SECURITY PERIMETER OF A DEVICE AND AN ENTERPRISE
First Claim
Patent Images
1. A method in a computing device, the method comprising:
- establishing a communications channel with a mobile communications device;
establishing one or more communications sessions over the communications channel, including at least a first communications session associated with an enterprise proxy of the mobile communications device;
attempting to establish a connection with a service at an enterprise network via the first communications session; and
selectively providing an access privilege to a first security perimeter of the computing device, the access privilege allowing applications of the first security perimeter to utilize the first communications session for further communications, said providing based upon whether the attempted connection with the service at the enterprise network was established via the first communications session.
4 Assignments
0 Petitions
Accused Products
Abstract
A first device establishes a connection with a second device and attempts access, via the connection to an enterprise server of an enterprise. The first device may have a number of security perimeters, ones of which are allowed to use various communications proxies provided by the second device. If the first device and the second device are associated with a same common enterprise, an enterprise perimeter of the first device may be enabled to access the enterprise using an enterprise proxy of the second device.
-
Citations
16 Claims
-
1. A method in a computing device, the method comprising:
-
establishing a communications channel with a mobile communications device; establishing one or more communications sessions over the communications channel, including at least a first communications session associated with an enterprise proxy of the mobile communications device; attempting to establish a connection with a service at an enterprise network via the first communications session; and selectively providing an access privilege to a first security perimeter of the computing device, the access privilege allowing applications of the first security perimeter to utilize the first communications session for further communications, said providing based upon whether the attempted connection with the service at the enterprise network was established via the first communications session. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A first computing device comprising:
-
a network interface configured to establish a communications channel with a mobile communications device; a perimeter manager configured to manage at least one security perimeter established on the first computing device, the security perimeter having associated applications and security policies; and a bridge manager configured to establish a communications socket in the security perimeter, the communications socket associated with a first communications session over the communications channel with the mobile communications device, wherein the bridge manager selectively enables or disables the communications socket in the security perimeter based upon whether an enterprise management application is able to establish a connection via the first communications session to a service at an enterprise network. - View Dependent Claims (13, 14, 15)
-
-
16. A method in a mobile communications device, the method comprising:
-
establishing a communications channel with a computing device; establishing one or more communications sessions over the communications channel, including at least a first communications session associated with an enterprise proxy of the mobile communications device, the enterprise proxy communicatively coupled to an enterprise network; receiving from the computing device a request to establish a connection with a service at the enterprise network via the first communications session; and attempting to establish the connection with the service at the enterprise network on behalf of the computing device; and providing information to the computing device regarding the attempted communication.
-
Specification