System and method for configuring devices for secure operations
First Claim
Patent Images
1. A wireless mobile device configured to communicate with a policy data storage located remotely from the wireless mobile device, the wireless mobile device comprising:
- a processor configured to be placed in a first security mode of operation responsive to the wireless mobile device receiving first instructions from the policy data storage located at a remote location, the first instructions containing a first administrative selection;
the processor further configured to be placed in a second security mode of operation responsive to the wireless mobile device receiving second instructions from the policy data storage at the remote location, the second instructions containing a second administrative selection, wherein at least one of the first and second security modes of operation are initiated without intervention from a user of the wireless device and causes the processor to use one or more security algorithms corresponding to one or more security schemes stored in the policy data storage at the remote location, and wherein at least one of the first and second security modes of operation force use of at least one cryptographic algorithm selected from the one or more security algorithms; and
a display configured to visually indicate a current security mode of operation to a user of the wireless mobile device,wherein the processor is configured to transmit an indication of the wireless mobile device'"'"'s current security mode to a remote administrator that selects the first and second administrative selections.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for establishing a security-related mode of operation for computing devices. A policy data store contains security mode configuration data related to the computing devices. Security mode configuration data is used in establishing a security-related mode of operation for the computing devices.
30 Citations
20 Claims
-
1. A wireless mobile device configured to communicate with a policy data storage located remotely from the wireless mobile device, the wireless mobile device comprising:
-
a processor configured to be placed in a first security mode of operation responsive to the wireless mobile device receiving first instructions from the policy data storage located at a remote location, the first instructions containing a first administrative selection; the processor further configured to be placed in a second security mode of operation responsive to the wireless mobile device receiving second instructions from the policy data storage at the remote location, the second instructions containing a second administrative selection, wherein at least one of the first and second security modes of operation are initiated without intervention from a user of the wireless device and causes the processor to use one or more security algorithms corresponding to one or more security schemes stored in the policy data storage at the remote location, and wherein at least one of the first and second security modes of operation force use of at least one cryptographic algorithm selected from the one or more security algorithms; and a display configured to visually indicate a current security mode of operation to a user of the wireless mobile device, wherein the processor is configured to transmit an indication of the wireless mobile device'"'"'s current security mode to a remote administrator that selects the first and second administrative selections. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for operating a wireless mobile device configured to communicate with a policy data storage located remotely from the wireless mobile device, the method comprising:
-
placing a processor in a first security mode of operation responsive to the wireless mobile device receiving first instructions from the policy data storage located at a remote location, the first instructions containing a first administrative selection; placing the processor in a second security mode of operation responsive to the wireless mobile device receiving second instructions from the policy data storage at the remote location, the second instructions containing a second administrative selection, wherein at least one of the first and second security modes of operation are initiated without intervention from a user of the wireless device and causes the processor to use one or more security algorithms corresponding to one or more security schemes stored in the policy data storage at the remote location, and wherein at least one of the first and second security modes of operation force use of at least one cryptographic algorithm selected from the one or more security algorithms; visually indicating a current security mode of operation to a user of the wireless mobile device using a display of the wireless mobile device; and transmitting an indication of the wireless mobile device'"'"'s current security mode to a remote administrator that selects the first and second administrative selections. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer readable storage medium having computer readable instructions stored thereon that, when executed, implement method for operating a wireless mobile device configured to communicate with a policy data storage located remotely from the wireless mobile device, the method comprising:
-
placing a processor in a first security mode of operation responsive to the wireless mobile device receiving first instructions from the policy data storage at a remote location, the first instructions containing a first administrative selection; placing the processor in a second security mode of operation responsive to the wireless mobile device receiving second instructions from the policy data storage at the remote location, the second instructions containing a second administrative selection, wherein at least one of the first and second security modes of operation are initiated without intervention from a user of the wireless device and causes the processor to use one or more security algorithms corresponding to one or more security schemes stored in the policy data storage at the remote location, and wherein at least one of the first and second security modes of operation force use of at least one cryptographic algorithm selected from the one or more security algorithms; visually indicating a current security mode of operation to a user of the wireless mobile device using a display of the wireless mobile device; and transmitting an indication of the wireless mobile device'"'"'s current security mode to a remote administrator that selects the first and second administrative selections. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A system, comprising:
-
at least one wireless mobile device operable by a user; a host circuit in communication with the at least one wireless mobile device and located remotely from the at least one wireless mobile device, the host system including a policy data storage and configured to place the at least one wireless mobile device in a first security mode of operation responsive to receiving first instructions containing a first administrative selection, the policy data storage location configured to store at least one security mode setting including at least one security scheme corresponding to a particular wireless mobile device among the at least one wireless mobile device; the host circuit configured to select the security mode from the policy data storage and place the at least one wireless mobile device in a second security mode of operation that executes the corresponding at least one security scheme responsive to receiving second instructions containing a first administrative selection, wherein at least one of the first and second security modes of operation are initiated without intervention from the user of the at least one wireless mobile device and causes the processor to use one or more security algorithms corresponding to the at least one security scheme stored in the policy data storage, and wherein at least one of the first and second security modes of operation force use of at least one cryptographic algorithm selected from the one or more security algorithms; and the at least one wireless mobile device having a display configured to visually indicate a current security mode of operation to a user of the wireless mobile device, wherein the host device is configured to receive an indication of the current security mode from the at least one wireless mobile device. - View Dependent Claims (17, 18, 19, 20)
-
Specification