ADAPTIVE SECURITY INDICATOR FOR WIRELESS DEVICES
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus, including computer program products, are provided for adaptive security. In one aspect there is provided a method. The method may include receiving, at a user equipment, at least one policy update representative of a rule defining at least one of a security level and an operation allowed to be performed at the security level; monitoring a configuration of the user equipment to determine whether the configuration of the user equipment violates the at least one policy update; and adapting, based on the monitoring, at least one of a security indicator at the user equipment and the operation at the user equipment. Related apparatus, systems, methods, and articles are also described.
46 Citations
38 Claims
-
1-21. -21. (canceled)
-
22. A method comprising:
-
receiving, at a user equipment, at least one policy update representative of a rule defining at least one of a security level and an operation allowed to be performed at the security level, wherein the at least one policy update indicates a vulnerability of an encryption algorithm; monitoring a configuration of the user equipment to determine whether the configuration of the user equipment violates the at least one policy update; and adapting, based on the monitoring, at least one of a security indicator at the user equipment and the operation at the user equipment. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29)
-
-
30. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code, the at least one processor, the at least one memory, and the computer program code configured to cause the apparatus to at least; receive at least one policy update representative of a rule defining at least one of a security level and an operation allowed to be performed at the security level, wherein the at least one policy update indicates a vulnerability of an encryption algorithm; monitor a configuration of the apparatus to determine whether the configuration of the apparatus violates the at least one policy update; and adapt, based on the monitoring, at least one of a security indicator at the apparatus and the operation at the apparatus. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37)
-
-
38. A non-transitory computer-readable storage medium including computer code which when executed by at least one processor causes operations comprising:
-
receiving at least one policy update representative of a rule defining at least one of a security level and an operation allowed to be performed at the security level, wherein the at least one policy update indicates a vulnerability of an encryption algorithm; monitoring a configuration to determine whether the configuration of the violates the at least one policy update; and adapting, based on the monitoring, at least one of a security indicator and the operation.
-
Specification