SYSTEMS AND METHODS FOR APPLYING A SECURITY POLICY TO A DEVICE BASED ON LOCATION
First Claim
1. A method comprising:
- obtaining, by a mobile communications device, a first location associated with a current location of the mobile communications device;
applying a first security policy to the mobile communications device based on the first location;
determining, by the mobile communications device, a change in the current location of the mobile communications device from the first location to a second location associated with the current location of the mobile communications device;
at the mobile communication device, applying a second security policy to replace the first security policy to the mobile communications device based on the change from the first location to the second location.
10 Assignments
0 Petitions
Accused Products
Abstract
A security policy may be applied to a mobile communications device based on a location of the mobile communications device. For example, a first location of the mobile communications device may be obtained and a first security policy may be applied to the mobile communications device based on the first location. Furthermore, a change in the location of the mobile communications device may be detected. For example, the location of the mobile communications device may change from the first location to a second location. In response to the mobile communications device now being located at the second location, a second security policy may be applied to the mobile communications device. Thus, different security policies may be applied to a mobile communications device as the current location of the mobile communications device changes.
5 Citations
20 Claims
-
1. A method comprising:
-
obtaining, by a mobile communications device, a first location associated with a current location of the mobile communications device; applying a first security policy to the mobile communications device based on the first location; determining, by the mobile communications device, a change in the current location of the mobile communications device from the first location to a second location associated with the current location of the mobile communications device; at the mobile communication device, applying a second security policy to replace the first security policy to the mobile communications device based on the change from the first location to the second location. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium carrying one or more sequences of instructions which, when executed by one or more processors, cause the one or more processors to perform operations comprising:
-
obtaining, by a mobile communications device, a first location associated with a current location of the mobile communications device; applying a first security policy to the mobile communications device based on the first location; determining, by the mobile communications device, a change in the current location of the mobile communications device from the first location to a second location associated with the current location of the mobile communications device; at the mobile communication device, applying a second security policy to replace the first security policy to the mobile communications device based on the change from the first location to the second location. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system, comprising at least one processor and memory, comprising:
-
a module to obtain, by a mobile communications device, a first location associated with a current location of the mobile communications device; a module to apply a first security policy to the mobile communications device based on the first location; a module to determine, by the mobile communications device, a change in the current location of the mobile communications device from the first location to a second location; a module to apply, at the mobile communication device, a second security policy to replace the first security policy to the mobile communications device based on the change from the first location to the second location. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification