×

Method, apparatus, and system for enabling a secure location-aware platform

  • US 8,393,000 B2
  • Filed: 08/19/2011
  • Issued: 03/05/2013
  • Est. Priority Date: 10/17/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for security control, the method comprising:

  • identifying a change in network status of a device, the device including a secure partition, a first virtual user partition, and a second virtual user partition, each of the secure partition, the first virtual user partition, and the second virtual user partition being different partitions of the device, and the secure partition including a location awareness agent;

    determining, with the location awareness agent, whether the device is connected to a network;

    determining, in response to the device being connected to the network, whether the network is secure by attempting to connect to a known network infrastructure element in a secure network;

    applying, with the location awareness agent, a first set of security controls to a first operating system in the first virtual user partition in response to determining that the device is connected to the secure network, the location awareness agent to apply the first set of security controls to the first operating system prior to enabling the first operating system to access the secure network;

    applying, with the location awareness agent, a second set of security controls to a second operating system in the second virtual user partition in response to determining that the device is connected to an unsecure network, the location awareness agent to apply the second set of security controls to the second operating system prior to enabling the second operating system to access the unsecure network;

    identifying whether the device moves from the secure network to the unsecure network; and

    transferring an execution environment from the first operating system in the first virtual user partition to the second operating system in the second virtual user partition in response to identifying that the device moved from the secure network to the unsecure network.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×