Security policy enforcement for mobile devices connecting to a virtual private network gateway
First Claim
Patent Images
1. A computer-implemented method comprising:
- connecting a mobile device to a computer wherein said computer system has an active VPN tunnel with a VPN gateway;
running, by said computer system, a security policy check on said mobile device;
determining whether said mobile device passed said security policy check and when said mobile device does pass said security policy check, issuing a certificate to said mobile device; and
using said certificate by said mobile device when said mobile device connects to a Virtual Private Network (VPN);
wherein said connecting a mobile device to said computer system comprises docking said mobile device to said computer system such that said running said security check is done without taxing resources of said mobile device.
13 Assignments
0 Petitions
Accused Products
Abstract
A method, apparatus and computer program product for providing secure policy enforcement for mobile devices is presented. A mobile device is connected to a computer system, the computer system having an active Virtual Private Network (VPN) tunnel with a VPN gateway. The computer system runs a security policy check on the mobile device. A determination is made whether the mobile device passed the security policy check and when the mobile device does pass the security policy check, a certificate is issued to the mobile device. The mobile device then uses the certificate to connect to a VPN.
-
Citations
17 Claims
-
1. A computer-implemented method comprising:
-
connecting a mobile device to a computer wherein said computer system has an active VPN tunnel with a VPN gateway; running, by said computer system, a security policy check on said mobile device; determining whether said mobile device passed said security policy check and when said mobile device does pass said security policy check, issuing a certificate to said mobile device; and using said certificate by said mobile device when said mobile device connects to a Virtual Private Network (VPN); wherein said connecting a mobile device to said computer system comprises docking said mobile device to said computer system such that said running said security check is done without taxing resources of said mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer readable storage medium having computer readable code thereon for providing security policy enforcement for a mobile device, the medium including instructions in which a computer system performs operations comprising:
-
connecting a mobile device to said computer system wherein said computer system has an active VPN tunnel with a VPN gateway; running, by said computer system, a security policy check on said mobile device; determining whether said mobile device passed said security policy check and when said mobile device does pass said security policy check, issuing a certificate to said mobile device; and wherein said certificate is used by said mobile device when said mobile device connects to a Virtual Private Network (VPN); wherein said connecting a mobile device to said computer system comprises docking said mobile device to said computer system such that said running said security check is done without taxing resources of said mobile device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer system comprising:
-
a memory; a processor; a communications interface; an interconnection mechanism coupling the memory, the processor and the communications interface; and wherein the memory is encoded with an application providing secure policy enforcement for mobile devices, that when performed on the processor, provides a process for processing information, the process causing the computer system to perform the operations of;
connecting to a mobile device;running, by said computer system, a security policy check on said mobile device, wherein said computer system has an active VPN tunnel with a VPN gateway; determining whether said mobile device passed said security policy check and when said mobile device does pass said security policy check, issuing a certificate to said mobile device; and wherein said mobile device uses said certificate when said mobile device connects to a Virtual Private Network (VPN); wherein said connecting a mobile device to said computer system comprises docking said mobile device to said computer system such that said running said security check is done without taxing resources of said mobile device. - View Dependent Claims (16, 17)
-
Specification