System and method for providing network security to mobile devices
First Claim
Patent Images
1. A mobile security system, comprising:
- a runtime memory;
a preboot memory for storing at least a portion of an operating system, wherein the preboot memory is configured to copy and load the at least a portion of the operating system into the runtime memory when the mobile security system is rebooted;
a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device, the mobile device having a mobile device processor;
a network connection module for receiving content intended for the mobile device;
security policies defining unacceptable malicious content;
security engines for examining the content received by the network connection module for the unacceptable malicious content as defined by the security policies, the security engines operating at different layers of the OSI stack;
a mobile security system processor executing the security engines in the runtime memory using the operating system, the mobile security system processor being different than the mobile device processor; and
a backup module capable of storing at least a portion of the boot sector of the mobile device should the boot sector of the mobile device become compromised.
2 Assignments
0 Petitions
Accused Products
Abstract
A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.
171 Citations
49 Claims
-
1. A mobile security system, comprising:
-
a runtime memory; a preboot memory for storing at least a portion of an operating system, wherein the preboot memory is configured to copy and load the at least a portion of the operating system into the runtime memory when the mobile security system is rebooted; a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device, the mobile device having a mobile device processor; a network connection module for receiving content intended for the mobile device; security policies defining unacceptable malicious content; security engines for examining the content received by the network connection module for the unacceptable malicious content as defined by the security policies, the security engines operating at different layers of the OSI stack; a mobile security system processor executing the security engines in the runtime memory using the operating system, the mobile security system processor being different than the mobile device processor; and a backup module capable of storing at least a portion of the boot sector of the mobile device should the boot sector of the mobile device become compromised. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 18, 19, 20, 21, 22, 41, 43, 44, 45, 46, 47, 48)
-
-
16. In a mobile security system having a mobile security system processor, a method comprising:
-
storing at least a portion of an operating system of the mobile security system in a preboot memory of the mobile security system; copying and loading the at least a portion of the operating system into a runtime memory of the mobile security system when the mobile security system is rebooted; receiving information intended for a mobile device from a network, the mobile device having a mobile device processor different than the mobile security system processor;
examining by the mobile security system processor the information for unacceptable malicious content as defined by security policies involving different layers of the OSI stack, wherein the mobile security system processor uses the operating system to examine the information for the unacceptable malicious code; andstoring at least a portion of the boot sector of the mobile device should the boot sector of the mobile device become compromised. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 42, 49)
-
-
17. A mobile security system comprising:
-
preboot memory means for storing at least a portion of an operating system of the mobile security system; boot loader means for copying and loading the at least a portion of the operating system into a runtime memory of the mobile security system when the mobile security system is rebooted; means for receiving information intended for a mobile device from a network, the mobile device having a mobile device processor; a mobile security system processor, the mobile security system processor being different than the mobile device processor, the mobile security system processor for examining the information for unacceptable malicious content as defined by security policies involving different layers of the OSI stack, wherein the mobile security system processor uses the operating system to examine the information for the unacceptable malicious content; and means for storing at least a portion of the boot sector of the mobile device should the boot sector of the mobile device become compromised.
-
Specification