Administration of protection of data accessible by a mobile device
First Claim
1. A computer-implemented method for administering protection of data accessible by a mobile computing device, comprising:
- pre-defining one or more security policies by a server computer system for the mobile computing device based upon a plurality of pre-configured locations associated with a network environment in which the mobile computing device may be operating;
upon the mobile computing device detecting a location in which it is operating during use, the server computer system configured for receiving a query from the mobile computing device to verify whether the detected location corresponds to one of the plurality of pre-configured locations;
comparing the detected location to the plurality of pre-configured locations; and
if the detected location corresponds to one of the plurality of pre-configured locations, sending over a network the one or more security policies to the mobile computing device as a function of the detected location, wherein the server computer system sends the one or more security policies and responds to the received query using a cryptographic authentication protocol.
8 Assignments
0 Petitions
Accused Products
Abstract
The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
-
Citations
15 Claims
-
1. A computer-implemented method for administering protection of data accessible by a mobile computing device, comprising:
-
pre-defining one or more security policies by a server computer system for the mobile computing device based upon a plurality of pre-configured locations associated with a network environment in which the mobile computing device may be operating; upon the mobile computing device detecting a location in which it is operating during use, the server computer system configured for receiving a query from the mobile computing device to verify whether the detected location corresponds to one of the plurality of pre-configured locations; comparing the detected location to the plurality of pre-configured locations; and if the detected location corresponds to one of the plurality of pre-configured locations, sending over a network the one or more security policies to the mobile computing device as a function of the detected location, wherein the server computer system sends the one or more security policies and responds to the received query using a cryptographic authentication protocol. - View Dependent Claims (2, 3, 4)
-
-
5. A computer-implemented method for providing protection of data accessible by a mobile computing device comprising:
-
pre-defining one or more security policies by a server computer system for the mobile computing device based upon a plurality of pre-configured security features associated with a network environment in which the mobile device may be operating; monitoring whether security features of the mobile computing device have been activated or deactivated as the mobile computing device operates in one or more locations to-be-detected during use by the mobile computing device relative to a plurality of pre-configured locations corresponding to the plurality of pre-configured security features, the server computer system configured for receiving and verifying a query from the mobile computing device regarding Pie one or more locations to-be-detected and a corresponding activated or deactivated security feature; and if the corresponding activated or deactivated security feature does not comply with Pie plurality of pre-configured security features associated with a network environment in which the mobile device may be operating, sending over a network the one or more security policies to the mobile device to force compliance. - View Dependent Claims (6)
-
-
7. A computer-implemented system for providing protection of data accessible by a client mobile computing device comprising:
-
a policy management module for managing one or more security policies for execution on the client mobile device, the security policies being pre-defined based upon criteria, the criteria including a plurality of pre-configured locations associated with a network environment in which the mobile device may be operating; an authorization module for communicating with a location detection module of the client mobile device such that upon the location detection module detecting a location in which the client mobile device is operating during use, the authorization module configured for receiving and responding to a query from the mobile computing device verifying whether the detected location corresponds to one of the plurality of pre-configured locations; and if the detected location corresponds to one of the plurality of pre-configured locations, a policy distribution module for sending over the network the one or more security policies to the client mobile device, the policy distribution module having a communication interface with the policy management module for receiving information regarding policies. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15)
-
Specification