CONTEXT-AWARE RISK MEASUREMENT MOBILE DEVICE MANAGEMENT SYSTEM
First Claim
Patent Images
1. A method for determining security risk of a mobile device, the method comprising:
- receiving risk measurements from at least one mobile device;
calculating a risk score by evaluating the risk measurements based on rules;
determining whether the calculated risk score exceeds a threshold; and
taking a protective action upon the risk score exceeding the threshold.
3 Assignments
0 Petitions
Accused Products
Abstract
A mobile device management server and method are provided for determining the security risk for deployed mobile devices. The mobile device management server receives risk measurements from mobile devices that are used to calculate a risk score based on rules. The risk score can also be adjusted by correlating the received risk measurements with past security breaches or typical usage measurements. The calculated risk score is compared to a one or more thresholds to determine whether to take a protective action that is associated with exceeding a threshold.
103 Citations
22 Claims
-
1. A method for determining security risk of a mobile device, the method comprising:
-
receiving risk measurements from at least one mobile device; calculating a risk score by evaluating the risk measurements based on rules; determining whether the calculated risk score exceeds a threshold; and taking a protective action upon the risk score exceeding the threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. The method of claim 13, wherein the portion of the risk measurements comprises a job title of a user of the at least one mobile device.
-
14. A method for determining security risk of a mobile device, the method comprising:
-
obtaining risk measurements from mobile device sensors; and transmitting the risk measurements to a mobile device management server. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
-
21. A method for providing mobile device security, the method comprising:
-
receiving a timeout rule that specifies a timeout period and a protective action from a mobile device management server; attempt to contact the mobile device management server within the timeout period; and perform the protective action upon failure to contact the mobile device management server within the timeout period. - View Dependent Claims (22)
-
Specification