SYSTEM AND METHOD FOR CONFIGURING DEVICES FOR SECURE OPERATIONS
First Claim
Patent Images
1. A wireless mobile device, comprising:
- a processor configured to be placed in a first security mode of operation, responsive to receiving first instructions;
the processor further configured to be placed in a second security mode of operation, responsive to receiving second instructions, wherein at least one of the first and second security modes of operation causes the processor to use one or more security algorithms; and
a display configured to visually indicate a current security mode of operation to a user of the wireless mobile device.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for establishing a security-related mode of operation for computing devices. A policy data store contains security mode configuration data related to the computing devices. Security mode configuration data is used in establishing a security-related mode of operation for the computing devices.
13 Citations
20 Claims
-
1. A wireless mobile device, comprising:
-
a processor configured to be placed in a first security mode of operation, responsive to receiving first instructions; the processor further configured to be placed in a second security mode of operation, responsive to receiving second instructions, wherein at least one of the first and second security modes of operation causes the processor to use one or more security algorithms; and a display configured to visually indicate a current security mode of operation to a user of the wireless mobile device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for operating a wireless mobile device, the method comprising:
-
placing a processor in a first security mode of operation, responsive to receiving first instructions; placing the processor in a second security mode of operation, responsive to receiving second instructions, wherein at least one of the first and second security modes of operation causes the processor to use one or more security algorithms; and visually indicating a current security mode of operation to a user of the wireless mobile device using a display of the wireless mobile device. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer readable storage medium having computer readable instructions stored thereon that, when executed, implement method for operating a wireless mobile device, the method comprising:
-
placing a processor in a first security mode of operation, responsive to receiving first instructions; placing the processor in a second security mode of operation, responsive to receiving second instructions, wherein at least one of the first and second security modes of operation causes the processor to use one or more security algorithms; and visually indicating a current security mode of operation to a user of the wireless mobile device using a display of the wireless mobile device. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A system, comprising:
-
at least one wireless mobile device; a host system in communication with the at least one wireless mobile device, the host system configured to place the at least one wireless mobile device in a first security mode of operation responsive to first instructions; the host system configured to place the at least one wireless mobile device in a second security mode of operation, responsive to second instructions, wherein at least one of the first and second security modes of operation causes the processor to use one or more security algorithms; and the at least one wireless mobile device having a display configured to visually indicate a current security mode of operation to a user of the wireless mobile device. - View Dependent Claims (17, 18, 19, 20)
-
Specification