Enterprise-wide security system for computer devices
First Claim
1. A method for controlling synchronization of a mobile device configured to communicate with a computing node over a network, the method comprising:
- defining at least one security parameter, wherein the at least one security parameter specifies at least one access rights for synchronizing the mobile device with a network resource;
storing a device security profile in the mobile device, the device security profile specifying the at least one security parameter specifying the at least one access right;
executing a device security program at the mobile device to implement the device security profile based on said defined at least one security parameter, on the mobile device;
transmitting locking instructions to the mobile device to lock the mobile device if not authorized to access the network resources;
updating the device security profile periodically by checking one or more designated web sites, accessing the computing node, accessing a central station or accessing a server station,wherein the device security profile is created dynamically based on time or location of the device having a validation life span indicating a time frame that the device security profile can be used;
ascertaining the location of the mobile device; and
managing, with the mobile device, synchronization with the at least one network resource by the mobile device in accordance with the at least one access right specified by the at least one security parameter,wherein said managing including using the device security profile to determine and enforce allowable synchronization activities of the mobile device at least in part in response to the ascertained location.
14 Assignments
0 Petitions
Accused Products
Abstract
A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program (202) executed in the computing node (102) interfaces with a device security program (204) executed at a mobile device (104). The computing node (102) is responsible for managing the security based on a node security profile (208) interpreted by a node security program (202) executed in the computing node (102). A device discovery method and arrangement (106) also detects and locates various information (120) about the mobile devices (104) based on a scan profile (206).
-
Citations
45 Claims
-
1. A method for controlling synchronization of a mobile device configured to communicate with a computing node over a network, the method comprising:
-
defining at least one security parameter, wherein the at least one security parameter specifies at least one access rights for synchronizing the mobile device with a network resource; storing a device security profile in the mobile device, the device security profile specifying the at least one security parameter specifying the at least one access right; executing a device security program at the mobile device to implement the device security profile based on said defined at least one security parameter, on the mobile device; transmitting locking instructions to the mobile device to lock the mobile device if not authorized to access the network resources; updating the device security profile periodically by checking one or more designated web sites, accessing the computing node, accessing a central station or accessing a server station, wherein the device security profile is created dynamically based on time or location of the device having a validation life span indicating a time frame that the device security profile can be used; ascertaining the location of the mobile device; and managing, with the mobile device, synchronization with the at least one network resource by the mobile device in accordance with the at least one access right specified by the at least one security parameter, wherein said managing including using the device security profile to determine and enforce allowable synchronization activities of the mobile device at least in part in response to the ascertained location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. An arrangement for controlling synchronization of mobile devices with a computing node on a network, the arrangement comprising:
-
a mobile device configured to communicate with the computing node by connecting with the computing node over the network, wherein the mobile device including a processor configured to execute a stored security program to access and use a stored security profile that defines at least one security parameter, wherein the at least one security parameter specifies at least one criterion for controlling synchronization of at least one resource of the mobile device; a memory device coupled to the processor, said memory device storing said device security profile, the device security profile being based on the at least one security parameter specifying at least one criterion for controlling synchronization of the at least one device resource; a locking arrangement that locks the mobile device if not authorized to access the network resources by transmitting locking instructions to the mobile device; an updating arrangement that updates the device security profile periodically by checking one or more designated web sites, accessing the computing node, accessing a central station or accessing a server station, wherein the device security profile is created dynamically based on time or location of the device having a validation life span indicating a time frame that the device security profile can be used; a locator that determines the position of the mobile device; and a synchronizing arrangement that controllably synchronizes the at least one device resource in accordance with the at least one criterion for controlling synchronization of the at least one device resource specified by the at least one security parameter and in response at least in part to said determined device position. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45)
-
Specification