Cloud based mobile device security and policy enforcement
First Claim
1. A cloud based security method for a mobile device, comprising:
- providing a mobile configuration to the mobile device, the mobile configuration configured to provide communications between the mobile device and external network through a cloud based system that is in an external network relative to both the mobile device and the external network;
receiving communications associated with the mobile device and the external network in the cloud based system;
analyzing the communications associated with the mobile device for policy and security compliance therewith in the cloud based system utilizing one or more data inspection engines to classify content of the communications; and
blocking, in the cloud based system, the communications to or from the mobile device before the communications reach either the mobile device or the external network based on a violation of the policy and security compliance responsive to the classification of the content.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure relates to cloud based mobile device security and policy systems and methods to use the “cloud” to pervasively enforce security and policy on mobile devices. The cloud based mobile device security and policy systems and methods provide uniformity in securing mobile devices for small to large organizations. The cloud based mobile device security and policy systems and methods may enforce one or more policies for users wherever and whenever the users are connected across a plurality of different devices including mobile devices. This solution ensures protection across different types, brands, operating systems, etc. for smartphones, tablets, netbooks, mobile computers, and the like.
36 Citations
19 Claims
-
1. A cloud based security method for a mobile device, comprising:
-
providing a mobile configuration to the mobile device, the mobile configuration configured to provide communications between the mobile device and external network through a cloud based system that is in an external network relative to both the mobile device and the external network; receiving communications associated with the mobile device and the external network in the cloud based system; analyzing the communications associated with the mobile device for policy and security compliance therewith in the cloud based system utilizing one or more data inspection engines to classify content of the communications; and blocking, in the cloud based system, the communications to or from the mobile device before the communications reach either the mobile device or the external network based on a violation of the policy and security compliance responsive to the classification of the content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 18, 19)
-
-
10. A mobile device, comprising:
-
a network interface configured to connect to a wireless network; memory; and a processor, the network interface, the memory, and the processor are communicatively coupled therebetween; wherein the processor with the network interface and the memory is configured to; connect to a cloud based security system over the wireless network, wherein the cloud based security system is in an external network relative to both the mobile device and the wireless network; communicate data with an external network interface through the cloud based security system, wherein the cloud based security system monitors the data between the mobile device and the external network for analysis utilizing one or more data inspection engines to classify content of the data; and receive notifications of content blocking of the data from the cloud based security system based on security and policy violations responsive to the classification of the content, wherein the content blocking is before the data either reaches the mobile device or the wireless network. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A cloud network configured to perform mobile device security and policy enforcement, comprising:
-
a plurality of cloud nodes communicatively coupled to a network, each of the plurality of cloud nodes is configured to; communicate with a mobile device, wherein the cloud based security system is in an external network relative to both the mobile device and the network; monitor communications to and from the mobile device; analyze the communications utilizing one or more data inspection engines to classify content of the communications; and perform mobile device policy and security enforcement of the mobile device while concurrently providing access to the network, wherein the mobile device policy and security enforcement based on the classification of the content, wherein the mobile device policy and security enforcement is before the communications reach either the mobile device or the network. - View Dependent Claims (16, 17)
-
Specification