Establishing connectivity between an enterprise security perimeter of a device and an enterprise
First Claim
Patent Images
1. A method comprising:
- establishing a communications channel between a computing device and a mobile communications device, wherein the mobile communications device has established a connection to a private network;
establishing one or more communications sessions over the communications channel, including at least a first communications session associated with a proxy of the mobile communications device, the proxy to facilitate communication with the private network;
temporarily providing a limited access privilege allowing access to a first security perimeter on the computing device to only allow the computing device to send a request attempting to establish a connection with a service at the private network via the first communications session, the request to test if the private network to which the mobile communications device has established the connection includes the service indicating that the private network is associated with the first security perimeter; and
selectively providing an access privilege to the first security perimeter of the computing device, the access privilege allowing applications of the first security perimeter to utilize the first communications session for further communications with the private network, wherein the access privilege is provided when the attempted connection with the service at the private network was established via the first communications session and private network is associated with the first security perimeter.
4 Assignments
0 Petitions
Accused Products
Abstract
A first device establishes a connection with a second device and attempts access, via the connection to an enterprise server of an enterprise. The first device may have a number of security perimeters, ones of which are allowed to use various communications proxies provided by the second device. If the first device and the second device are associated with a same common enterprise, an enterprise perimeter of the first device may be enabled to access the enterprise using an enterprise proxy of the second device.
-
Citations
18 Claims
-
1. A method comprising:
-
establishing a communications channel between a computing device and a mobile communications device, wherein the mobile communications device has established a connection to a private network; establishing one or more communications sessions over the communications channel, including at least a first communications session associated with a proxy of the mobile communications device, the proxy to facilitate communication with the private network; temporarily providing a limited access privilege allowing access to a first security perimeter on the computing device to only allow the computing device to send a request attempting to establish a connection with a service at the private network via the first communications session, the request to test if the private network to which the mobile communications device has established the connection includes the service indicating that the private network is associated with the first security perimeter; and selectively providing an access privilege to the first security perimeter of the computing device, the access privilege allowing applications of the first security perimeter to utilize the first communications session for further communications with the private network, wherein the access privilege is provided when the attempted connection with the service at the private network was established via the first communications session and private network is associated with the first security perimeter. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 15, 16, 17, 18)
-
-
11. A device comprising:
a hardware processor configured to; establish a communications channel between the device and a mobile communications device, wherein the mobile communications device has established a connection to a private network; manage at least one security perimeter established on the device, the security perimeter having associated applications and security policies; temporarily provide a limited access privilege allowing access to the security perimeter on the device to only allow an enterprise management application on the device to send a request attempting to establish a connection with a service at the private network via a first communication session over the communication channel, the request to test if the private network to which the mobile communications device has established the connection includes the service indicating that the private network is associated with the first security perimeter; and establish a communications socket in the security perimeter, the communications socket associated with the first communications session over the communications channel with the mobile communications device, wherein the hardware processor is configured to selectively enable or disable the communications socket in the security perimeter based upon whether the enterprise management application is able to establish the connection to the service at private network. - View Dependent Claims (12, 13, 14)
Specification