Administration of protection of data accessible by a mobile device
First Claim
1. In a mobile computing device, a computer-implemented system for providing protection of data accessible by a mobile computing device comprising:
- a location detection module for detecting a location associated with the network environment in which the mobile device is operating;
a policy setting module being communicatively coupled with the location detection module for communication of the detected location and being communicatively coupled over a network to a policy management module, the policy setting module configured to determine at least a connection type, a network class, and a hardware brand of a network adapter on the mobile device and a current security policy from one or more security policies received from the policy management module, the current policy being set as a function of which of a plurality of pre-defined locations the detected location appears, the pre-defined locations being set by the policy management module, and further being set as a function of the connection type, the network class, and the hardware brand of the network adapter on the mobile device; and
a policy enforcement control module being communicatively coupled with the policy setting module for communication of the current security policy to be enforced, the enforcement control module comprising one or more enforcement mechanism modules for enforcing the current security policy.
8 Assignments
0 Petitions
Accused Products
Abstract
The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
223 Citations
18 Claims
-
1. In a mobile computing device, a computer-implemented system for providing protection of data accessible by a mobile computing device comprising:
-
a location detection module for detecting a location associated with the network environment in which the mobile device is operating; a policy setting module being communicatively coupled with the location detection module for communication of the detected location and being communicatively coupled over a network to a policy management module, the policy setting module configured to determine at least a connection type, a network class, and a hardware brand of a network adapter on the mobile device and a current security policy from one or more security policies received from the policy management module, the current policy being set as a function of which of a plurality of pre-defined locations the detected location appears, the pre-defined locations being set by the policy management module, and further being set as a function of the connection type, the network class, and the hardware brand of the network adapter on the mobile device; and a policy enforcement control module being communicatively coupled with the policy setting module for communication of the current security policy to be enforced, the enforcement control module comprising one or more enforcement mechanism modules for enforcing the current security policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification