Systems and methods for applying a security policy to a device based on location
First Claim
1. A method comprising:
- obtaining, by a mobile communications device, a first location associated with a current location of the mobile communications device;
applying a first security policy to the mobile communications device based on the first location;
determining, by the mobile communications device, a change in the current location of the mobile communications device from the first location to a second location associated with the current location of the mobile communications device;
at the mobile communication device, applying a second security policy to replace the first security policy to the mobile communications device based on the change from the first location to the second location;
generating, by the mobile communications device, a notification when the detected change in the current location corresponds to one of the mobile communications device entering a location known to the mobile communications device or leaving a location known to the mobile communications device; and
transmitting, from the mobile communications device, the generated notification to a server.
10 Assignments
0 Petitions
Accused Products
Abstract
A security policy may be applied to a mobile communications device based on a location of the mobile communications device. For example, a first location of the mobile communications device may be obtained and a first security policy may be applied to the mobile communications device based on the first location. Furthermore, a change in the location of the mobile communications device may be detected. For example, the location of the mobile communications device may change from the first location to a second location. In response to the mobile communications device now being located at the second location, a second security policy may be applied to the mobile communications device. Thus, different security policies may be applied to a mobile communications device as the current location of the mobile communications device changes.
310 Citations
23 Claims
-
1. A method comprising:
-
obtaining, by a mobile communications device, a first location associated with a current location of the mobile communications device; applying a first security policy to the mobile communications device based on the first location; determining, by the mobile communications device, a change in the current location of the mobile communications device from the first location to a second location associated with the current location of the mobile communications device; at the mobile communication device, applying a second security policy to replace the first security policy to the mobile communications device based on the change from the first location to the second location; generating, by the mobile communications device, a notification when the detected change in the current location corresponds to one of the mobile communications device entering a location known to the mobile communications device or leaving a location known to the mobile communications device; and transmitting, from the mobile communications device, the generated notification to a server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable medium carrying one or more sequences of instructions which, when executed by one or more processors, cause the one or more processors to perform operations comprising:
-
obtaining, by a mobile communications device, a first location associated with a current location of the mobile communications device; applying a first security policy to the mobile communications device based on the first location; determining, by the mobile communications device, a change in the current location of the mobile communications device from the first location to a second location associated with the current location of the mobile communications device; at the mobile communication device, applying a second security policy to replace the first security policy to the mobile communications device based on the change from the first location to the second location; generating, by the mobile communications device, a notification when the detected change in the current location corresponds to one of the mobile communications device entering a location known to the mobile communications device or leaving a location known to the mobile communications device; and transmitting, from the mobile communications device, the generated notification to a server. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system, comprising at least one processor and memory, comprising:
-
a module to obtain, by a mobile communications device, a first location associated with a current location of the mobile communications device; a module to apply a first security policy to the mobile communications device based on the first location; a module to determine, by the mobile communications device, a change in the current location of the mobile communications device from the first location to a second location; a module to apply, at the mobile communication device, a second security policy to replace the first security policy to the mobile communications device based on the change from the first location to the second location; a module to generate, by the mobile communications device, a notification when the detected change in the current location corresponds to one of the mobile communications device entering a location known to the mobile communications device or leaving a location known to the mobile communications device; and a module to transmit, from the mobile communications device, the generated notification to a server. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
Specification