Monitoring and reporting policy compliance of home networks
First Claim
Patent Images
1. A computer program product comprising at least one non-transitory computer-readable medium having computer program instructions stored therein which are operable to cause at least one computing device to monitor and configure a home network to facilitate secure communications between the home network and a remote network, the computer program instructions comprising:
- first instructions for identifying a set of devices presently communicating on the home network and for monitoring at least one security parameter associated with the home network, the at least one security parameter defined according to a policy corresponding to an enterprise associated with the remote network;
second instructions for locally detecting, by a background application running on one of the set of devices, that the at least one security parameter fails to conform to the policy, wherein the home network corresponds to a residence of a person employed by the enterprise, and wherein the home network has a corresponding network provider not affiliated with the enterprise; and
third instructions for automatically configuring at least one of the devices to facilitate compliance with the policy in response to detecting that the at least one security parameter does not conform to the policy.
7 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus are described for monitoring and configuring home networks for a variety of purposes such as, for example, facilitating secure communications between the home network and a remote network, and facilitating provision of a service by a service provider such as, for example, a cellular carrier.
-
Citations
24 Claims
-
1. A computer program product comprising at least one non-transitory computer-readable medium having computer program instructions stored therein which are operable to cause at least one computing device to monitor and configure a home network to facilitate secure communications between the home network and a remote network, the computer program instructions comprising:
-
first instructions for identifying a set of devices presently communicating on the home network and for monitoring at least one security parameter associated with the home network, the at least one security parameter defined according to a policy corresponding to an enterprise associated with the remote network; second instructions for locally detecting, by a background application running on one of the set of devices, that the at least one security parameter fails to conform to the policy, wherein the home network corresponds to a residence of a person employed by the enterprise, and wherein the home network has a corresponding network provider not affiliated with the enterprise; and third instructions for automatically configuring at least one of the devices to facilitate compliance with the policy in response to detecting that the at least one security parameter does not conform to the policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer-implemented method for monitoring and configuring a home network to facilitate secure communications between the home network and a remote network, comprising:
-
monitoring at least one security parameter associated with the home network including identifying devices presently communicating on the home network, the at least one security parameter defined according to a policy corresponding to an enterprise associated with the remote network; locally detecting, by a background application running on one of the set of devices, that the at least one security parameter fails to conform to the policy, wherein the home network corresponds to a residence of a person employed by the enterprise, and wherein the home network has a corresponding network provider not affiliated with the enterprise; and in response to detecting that the at least one security parameter does not conform to the policy, automatically configuring at least one of the devices to facilitate compliance with the policy. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification