Enterprise-wide security system for computer devices
First Claim
Patent Images
1. A method, comprising:
- communicating with a mobile device from a computing node, wherein the computing node includes a node security program configured to interpret a node security profile of the computing node, wherein the node security profile sets security parameters for managing security between the computing node, the mobile device, and a network resource, and wherein the computing node is separate from the mobile device and communicates with the mobile device via a communication link;
evaluating the node security profile to determine whether the computing node is authorized to transfer a device security profile to the mobile device, wherein the device security profile sets security parameters for the mobile device;
transferring the device security profile to the mobile device if the computing node is authorized to transfer the device security profile;
evaluating at least one security parameter of the node security profile in order to manage a process involving data being communicated between the computing node and the mobile device and the network resource;
determining that the process is not authorized based on the at least one security parameter, wherein the at least one security parameter includes information, based on a mobile device parameter, identifying the computing node as not being authorized; and
preventing the process from executing when it is determined that the process is not authorized based on the at least one security parameter.
11 Assignments
0 Petitions
Accused Products
Abstract
A system and method for securing data in mobile devices (104) includes a computing mode (102) and a plurality of mobile devices (104). A node security program (202) executed in the computing node (102) interfaces with a device security program (204) executed at a mobile device (104). The computing node (102) is responsible for managing the security based on a node security profile (208) interpreted by a node security program (202) executed in the computing node (102). A device discovery method and arrangement (106) also detects and locates various information (120) about the mobile devices (104) based on a scan profile (206).
-
Citations
20 Claims
-
1. A method, comprising:
-
communicating with a mobile device from a computing node, wherein the computing node includes a node security program configured to interpret a node security profile of the computing node, wherein the node security profile sets security parameters for managing security between the computing node, the mobile device, and a network resource, and wherein the computing node is separate from the mobile device and communicates with the mobile device via a communication link; evaluating the node security profile to determine whether the computing node is authorized to transfer a device security profile to the mobile device, wherein the device security profile sets security parameters for the mobile device; transferring the device security profile to the mobile device if the computing node is authorized to transfer the device security profile; evaluating at least one security parameter of the node security profile in order to manage a process involving data being communicated between the computing node and the mobile device and the network resource; determining that the process is not authorized based on the at least one security parameter, wherein the at least one security parameter includes information, based on a mobile device parameter, identifying the computing node as not being authorized; and preventing the process from executing when it is determined that the process is not authorized based on the at least one security parameter. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. Logic encoded in non-transitory tangible computer readable media that includes code for execution and when executed by a processor is operable to perform operations comprising:
-
communicating with a mobile device from a computing node, wherein the computing node includes a node security program configured to interpret a node security profile of the computing node, wherein the node security profile sets security parameters for managing security between the computing node, the mobile device, and a network resource, and wherein the computing node is separate from the mobile device and communicates with the mobile device via a communication link; evaluating the node security profile to determine whether the computing node is authorized to transfer a device security profile to the mobile device, wherein the device security profile sets security parameters for the mobile device based on at least one of time and a location of the mobile device; transferring the device security profile to the mobile device if the computing node is authorized to transfer the device security profile; evaluating at least one security parameter of the node security profile in order to manage a process involving data being communicated between the computing node and the mobile device and the network resource; determining that the process is not authorized based on the at least one security parameter, wherein the at least one security parameter includes information, based on a mobile device parameter, identifying the computing node as not being authorized; and preventing the process from executing when it is determined that the process is not authorized based on the at least one security parameter. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. An apparatus, comprising:
a computing node that includes a node security program configured to interpret a node security profile, the apparatus being configured for; communicating with a mobile device via a communication link, wherein the computing node is separate from the mobile device, and wherein the node security profile sets security parameters for managing security between the computing node, the mobile device, and a network resource; evaluating the node security profile to determine whether the computing node is authorized to transfer a device security profile to the mobile device, wherein the device security profile sets security parameters for the mobile device based on at least one of time and a location of the mobile device; transferring the device security profile to the mobile device if the computing node is authorized to transfer the device security profile; evaluating at least one security parameter of the node security profile in order to manage a process involving data being communicated between the computing node and the mobile device and the network resource; determining that the process is not authorized based on the at least one security parameter, wherein the at least one security parameter includes information, based on a mobile device parameter, identifying the computing node as not being authorized; and preventing the process from executing when it is determined that the process is not authorized based on the at least one security parameter. - View Dependent Claims (18, 19, 20)
Specification