Server, computer memory, and method to support security policy maintenance and distribution
First Claim
Patent Images
1. A method of selectively providing a mobile computing device with access to a software application on a server, the method comprising:
- generating at the server a mobile security policy for a user from data received from a LDAP directory communicably coupled to the server;
transmitting the mobile security policy and key materials from the server to a gatekeeper device;
receiving at the gatekeeper device a request to access the software application from the mobile computing device;
determining at the gatekeeper device whether to grant access to the software application by checking whether the mobile computing device has an installed security program;
automatically initiating by the gatekeeper device installation of the security program onto the mobile computer device if the mobile computer device does not have the installed security program;
authenticating at the gatekeeper device the user;
transmitting the mobile security policy from the gatekeeper device to the mobile device; and
enforcing on the mobile device a rule encoded in the mobile security policy.
18 Assignments
0 Petitions
Accused Products
Abstract
In a particular embodiment, a server module deployed on a server is disclosed. The server module is connected to a wireless network access node. The server module includes a database containing user information for multiple wireless devices. Each element in the database is attributable to at least one authorized wireless device and contains at least one type of data file from the following group: (i) wireless connectivity permissions, (ii) authorized wireless device identification, and (iii) authorized network access node information.
171 Citations
8 Claims
-
1. A method of selectively providing a mobile computing device with access to a software application on a server, the method comprising:
-
generating at the server a mobile security policy for a user from data received from a LDAP directory communicably coupled to the server; transmitting the mobile security policy and key materials from the server to a gatekeeper device; receiving at the gatekeeper device a request to access the software application from the mobile computing device; determining at the gatekeeper device whether to grant access to the software application by checking whether the mobile computing device has an installed security program; automatically initiating by the gatekeeper device installation of the security program onto the mobile computer device if the mobile computer device does not have the installed security program; authenticating at the gatekeeper device the user; transmitting the mobile security policy from the gatekeeper device to the mobile device; and enforcing on the mobile device a rule encoded in the mobile security policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification