Providing security in mobile devices via a virtualization software layer
First Claim
1. A method of providing security in a mobile device comprised of a virtualization software layer that supports one or more virtual machines, the method comprising:
- receiving a security policy at the mobile device via the virtualization software layer to have the security policy installed on a virtual machine, wherein the security policy includes location-based information to determine whether to curtail or enable a functionality on the mobile device;
collecting location-based information through the virtualization software layer based on a location of the mobile device;
comparing, by the virtual machine, the collected location-based information and the location-based information in the security policy;
identifying, by the virtual machine, a security action to perform when the comparing of the collected location-based information and the location-based information in the security policy indicates the security action should be taken; and
curtailing or enabling, via the virtualization software layer upon a command from the virtual machine, the functionality identified in the security policy on the mobile device.
2 Assignments
0 Petitions
Accused Products
Abstract
One embodiment is a method of providing security in a virtualized mobile device including virtualization software that supports one or more virtual machines, the method including: (a) receiving a security policy at the virtualized mobile device, which security policy includes one or more location or location-time scenarios for the virtualized mobile device, which scenarios identify applications to be curtailed, and how they are to be curtailed and applications that are to be enabled, and how they are to be enabled; (b) collecting one or more of mobile device location information or information related to time spent at the location; identifying a scenario that pertaining to the one or more of the location and time information; and (c) curtailing or enabling applications in accordance with the identified scenario.
-
Citations
20 Claims
-
1. A method of providing security in a mobile device comprised of a virtualization software layer that supports one or more virtual machines, the method comprising:
-
receiving a security policy at the mobile device via the virtualization software layer to have the security policy installed on a virtual machine, wherein the security policy includes location-based information to determine whether to curtail or enable a functionality on the mobile device; collecting location-based information through the virtualization software layer based on a location of the mobile device; comparing, by the virtual machine, the collected location-based information and the location-based information in the security policy; identifying, by the virtual machine, a security action to perform when the comparing of the collected location-based information and the location-based information in the security policy indicates the security action should be taken; and curtailing or enabling, via the virtualization software layer upon a command from the virtual machine, the functionality identified in the security policy on the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable storage medium containing instructions for providing security in a mobile device comprised of a virtualization software layer that supports one or more virtual machines, the instructions for controlling a computer system to be operable to:
-
receive a security policy at the mobile device via the virtualization software layer to have the security policy installed on a virtual machine, wherein the security policy includes location-based information to determine whether to curtail or enable a functionality on the mobile device; collect location-based information through the virtualization software layer based on a location of the mobile device; compare, by the virtual machine, the collected location-based information and the location-based information in the security policy; identify, by the virtual machine, a security action to perform when the comparing of the collected location-based information and the location-based information in the security policy indicates the security action should be taken; and curtail or enable, via the virtualization software layer upon a command from the virtual machine, the functionality identified in the security policy on the mobile device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An apparatus configured to provide security in a mobile device comprised of a virtualization software layer that supports one or more virtual machines, the apparatus comprising:
-
one or more computer processors; and a computer-readable storage medium comprising instructions for controlling the one or more computer processors to be operable to; receive a security policy at the mobile device via the virtualization software layer to have the security policy installed on a virtual machine, wherein the security policy includes location-based information to determine whether to curtail or enable a functionality on the mobile device; collect location-based information through the virtualization software layer based on a location of the mobile device; compare, by the virtual machine, the collected location-based information and the location-based information in the security policy; identify, by the virtual machine, a security action to perform when the comparing of the collected location-based information and the location-based information in the security policy indicates the security action should be taken; and curtail or enable, via the virtualization software layer upon a command from the virtual machine, the functionality identified in the security policy on the mobile device.
-
Specification