Administration of protection of data accessible by a mobile device
First Claim
1. A method for detecting a network location of a mobile computing device for use in protecting data accessible to the mobile device, the method comprising:
- setting a plurality of predefined network parameters corresponding to possible locations of a networked environment in which the mobile computing device may be operating;
by the mobile computing device, obtaining a set N of actual network parameters corresponding to the networked environment in which the mobile computing device is actually presently operating, the set N of actual network parameters corresponding to the predefined network parameters;
setting per each of the possible locations of the networked environment in which the mobile computing device may be operating a minimum subset M of the set N of actual network parameters that may be used to correctly identify the location of the mobile computing device, wherein M≦
N, N>
3 and M≧
2;
comparing the obtained said set N of actual network parameters to the plurality of predefined network parameters; and
only by the mobile computing device, determining a present location of the mobile computing device based on the comparing such that if the minimum subset M of the set N of actual parameters match a corresponding number of any of the network parameters of the predefined network parameters, concluding the present location of the mobile computing device has been successfully determined, and changing a security policy based on the determined present location; and
if the minimum subset M of the set N of actual parameters do not match the corresponding number of the any of the network parameters of the predefined network parameters, concluding the present location of the mobile computing device has not been successfully determined and setting the present location to a default location and a default security policy.
7 Assignments
0 Petitions
Accused Products
Abstract
The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
-
Citations
3 Claims
-
1. A method for detecting a network location of a mobile computing device for use in protecting data accessible to the mobile device, the method comprising:
-
setting a plurality of predefined network parameters corresponding to possible locations of a networked environment in which the mobile computing device may be operating; by the mobile computing device, obtaining a set N of actual network parameters corresponding to the networked environment in which the mobile computing device is actually presently operating, the set N of actual network parameters corresponding to the predefined network parameters; setting per each of the possible locations of the networked environment in which the mobile computing device may be operating a minimum subset M of the set N of actual network parameters that may be used to correctly identify the location of the mobile computing device, wherein M≦
N, N>
3 and M≧
2;comparing the obtained said set N of actual network parameters to the plurality of predefined network parameters; and only by the mobile computing device, determining a present location of the mobile computing device based on the comparing such that if the minimum subset M of the set N of actual parameters match a corresponding number of any of the network parameters of the predefined network parameters, concluding the present location of the mobile computing device has been successfully determined, and changing a security policy based on the determined present location; and if the minimum subset M of the set N of actual parameters do not match the corresponding number of the any of the network parameters of the predefined network parameters, concluding the present location of the mobile computing device has not been successfully determined and setting the present location to a default location and a default security policy. - View Dependent Claims (2, 3)
-
Specification