×

Compliance protocol and architecture

  • US 8,874,685 B1
  • Filed: 09/22/2010
  • Issued: 10/28/2014
  • Est. Priority Date: 09/22/2009
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of enabling a client to receive secure packages, the method comprising:

  • establishing, on the client, a connection between a security configuration management application and an electronic mail messaging application, wherein the security configuration management application and the electronic mail messaging application are both executed on the client;

    configuring the electronic mail messaging application to route a security message with a security update for the security configuration management application from the electronic mail messaging application to the security configuration management application;

    receiving, at the electronic mail messaging application on the client, the security message from a security configuration manager, wherein the security configuration manager is executed on one or more computers external to the client;

    automatically routing the security update from the electronic mail messaging application to the security configuration management application;

    inspecting, using the security configuration management application, the security update to ensure that the security update is valid;

    loading, in response to inspecting the security update to ensure that the security update is valid, instructions within the security update to the security configuration management application;

    executing, using the security configuration management application, the loaded instructions,wherein executing the loaded instructions comprises;

    performing a security compliance survey of the client;

    determining a security metric of the client based on an outcome of the security compliance survey;

    comparing the determined security metric of the client with a compliance threshold;

    when the determined security metric of the client meets or exceeds the compliance threshold, instructing the client to enter an activated state in which one or more features of the client are activated; and

    when the determined security metric of the client does not meet the compliance threshold, instructing the client to enter a secured state in which one or more features of the client are limited.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×