Administration of protection of data accessible by a mobile device
First Claim
1. In a computing environment, a method for detecting a current location from a set of possible locations for a mobile computing device for use in protecting data accessible to the mobile device, the method comprising the steps of:
- by a layer manager module, obtaining at least one current network environment parameter;
by a location module, determining whether the obtained current network environment parameter matches a predefined parameter for a first location;
by the location module, performing a location detection test using valid historical parameters to verify the first location;
setting the verified first location as the location of the mobile device; and
by the location module, updating the valid historical parameters by determining whether a parameter has been previously detected and marking the parameter as a valid historical parameter for determining location, wherein the marking comprises;
maintaining a first count of the number of times a parameter has been previously detected;
maintaining a second count of the number of times the parameter has been previously detected as valid; and
marking the parameter as a valid historical parameter for determining location when the first count is less than the second count.
7 Assignments
0 Petitions
Accused Products
Abstract
The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
-
Citations
6 Claims
-
1. In a computing environment, a method for detecting a current location from a set of possible locations for a mobile computing device for use in protecting data accessible to the mobile device, the method comprising the steps of:
-
by a layer manager module, obtaining at least one current network environment parameter; by a location module, determining whether the obtained current network environment parameter matches a predefined parameter for a first location; by the location module, performing a location detection test using valid historical parameters to verify the first location; setting the verified first location as the location of the mobile device; and by the location module, updating the valid historical parameters by determining whether a parameter has been previously detected and marking the parameter as a valid historical parameter for determining location, wherein the marking comprises; maintaining a first count of the number of times a parameter has been previously detected; maintaining a second count of the number of times the parameter has been previously detected as valid; and marking the parameter as a valid historical parameter for determining location when the first count is less than the second count. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification