System and method for automatically configuring a mobile device
First Claim
1. A wireless agent for configuring and securing wireless access to a network, wherein the wireless agent comprises at least one processing device configured to:
- provide a request from a mobile device to wirelessly communicate with a network, wherein the request includes one or more characteristics dynamically describing the mobile device, and wherein the characteristics describing the mobile device include at least one physical characteristic and at least one logical characteristic describing a location of the mobile device;
implement a security profile on the mobile device based on the characteristics describing the mobile device, wherein the security profile includes one or more security parameters defining an access zone for the network;
implement at least one connection profile on the mobile device based on the characteristics describing the mobile device, wherein the connection profile configures one or more of the characteristics describing the mobile device to enforce the security parameters defining the access zone;
authorize the mobile device to wirelessly communicate with the network from within the access zone, wherein the security parameters include one or more in-house security parameters in effect in response to the location of the mobile device being within the network and one or more on-the-road security parameters in effect in response to the location of the mobile device being remote from the network, wherein the connection profile enforces the security parameters defining the access zone by instructing the mobile device to;
automatically collect security information on the mobile device; and
encrypt the collected security information for storage on the mobile device.
3 Assignments
0 Petitions
Accused Products
Abstract
The disclosure provides a wireless agent for a mobile device. In one embodiment, the example wireless agent is operable to dynamically determine an access point for wireless communications from a mobile device through a network. The wireless agent is further operable to automatically select one of a plurality of security profiles associated with a mobile device based, at least in part, on the determined access point, with each security profile including a plurality of security parameters for accessing at least one wireless network. The wireless agent then modifies at least one of plurality of network configuration options of the mobile device based on the selected security profile and automatically attempts to communicably connect the mobile device to the access point using the network configuration options.
279 Citations
36 Claims
-
1. A wireless agent for configuring and securing wireless access to a network, wherein the wireless agent comprises at least one processing device configured to:
-
provide a request from a mobile device to wirelessly communicate with a network, wherein the request includes one or more characteristics dynamically describing the mobile device, and wherein the characteristics describing the mobile device include at least one physical characteristic and at least one logical characteristic describing a location of the mobile device; implement a security profile on the mobile device based on the characteristics describing the mobile device, wherein the security profile includes one or more security parameters defining an access zone for the network; implement at least one connection profile on the mobile device based on the characteristics describing the mobile device, wherein the connection profile configures one or more of the characteristics describing the mobile device to enforce the security parameters defining the access zone; authorize the mobile device to wirelessly communicate with the network from within the access zone, wherein the security parameters include one or more in-house security parameters in effect in response to the location of the mobile device being within the network and one or more on-the-road security parameters in effect in response to the location of the mobile device being remote from the network, wherein the connection profile enforces the security parameters defining the access zone by instructing the mobile device to; automatically collect security information on the mobile device; and encrypt the collected security information for storage on the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for configuring and securing wireless access to a network, comprising:
-
providing a request from a mobile device to wirelessly communicate with a network, wherein the request includes one or more characteristics dynamically describing the mobile device, and wherein the characteristics describing the mobile device include at least one physical characteristic and at least one logical characteristic describing a location of the mobile device; implementing a security profile on the mobile device based on the characteristics describing the mobile device, wherein the security profile includes one or more security parameters defining an access zone for the network; implementing at least one connection profile on the mobile device based on the characteristics describing the mobile device, wherein the connection profile configures one or more of the characteristics describing the mobile device to enforce the security parameters defining the access zone; authorizing the mobile device to wirelessly communicate with the network from within the access zone, wherein the security parameters include one or more in-house security parameters in effect in response to the location of the mobile device being within the network and one or more on-the-road security parameters in effect in response to the location of the mobile device being remote from the network, wherein the connection profile enforces the security parameters defining the access zone by instructing the mobile device to; automatically collect security information on the mobile device; and encrypt the collected security information for storage on the mobile device. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A system for configuring and securing wireless access to a network, comprising:
-
a memory configured to store a security profile, wherein the security profile includes one or more security parameters defining an access zone for a network; and at least one processing device configured to; provide a request from a mobile device to wirelessly communicate with the network, wherein the request includes one or more characteristics dynamically describing the mobile device, and wherein the characteristics describing the mobile device include at least one physical characteristic and at least one logical characteristic describing a location of the mobile device; implement the security profile on the mobile device based on the characteristics describing the mobile device; implement at least one connection profile on the mobile device based on the characteristics describing the mobile device, wherein the connection profile configures one or more of the characteristics describing the mobile device to enforce the security parameters defining the access zone; and authorize the mobile device to wirelessly communicate with the network from within the access zone, wherein the security parameters include one or more in-house security parameters in effect in response to the location of the mobile device being within the network and one or more on-the-road security parameters in effect in response to the location of the mobile device being remote from the network, wherein the connection profile enforces the security parameters defining the access zone by instructing the mobile device to; automatically collect security information on the mobile device; and encrypt the collected security information for storage on the mobile device. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification