Assessing a security state of a mobile communications device to determine access to specific tasks
First Claim
1. A non-transitory computer-readable medium encoded with a plurality of instructions which, when executed by a processor, causes the processor to perform a method comprising:
- receiving, at a server security component, a request to access services from a mobile communications device for a specific task;
determining, at the server security component, whether a security state for the mobile communications device is acceptable for access to the services,the determining the security state for the mobile communications device comprising;
determining whether a security state information associated with the received request to access services is up to date,based on the security state information being determined to not be up to date, obtaining, at the server security component, an updated security state information from the mobile communications device, anddetermining the security state for the mobile communication device based on the updated security state information obtained from the mobile communications device;
based on the security state for the mobile communications device being determined to be acceptable for access to the services, granting access, by the server security component, to the services, and determining, at the server security component, whether the security state for the mobile communications device is acceptable for access to the specified task requested; and
based on the security state for the mobile communications device being determined to be acceptable for access to the specified task requested, granting access, by the server security component, to the specific task requested.
6 Assignments
0 Petitions
Accused Products
Abstract
Methods for assessing the current security state of a mobile communications device to determine access to specific tasks is presented. A security component on a server is configured to receive a request to access services from a mobile communications device for a specific task. The security component on the server is further configured to determine whether a security state for the mobile communications device is acceptable for access to the services. Based on the security state for the mobile device being determined to be acceptable for access to the services, access to the services is granted and a determination is whether the security state is acceptable for access to the specific task requested. Based on the security state being determined to be acceptable for access to the specific task requested, access to the specific task requested is granted by the server security component.
321 Citations
12 Claims
-
1. A non-transitory computer-readable medium encoded with a plurality of instructions which, when executed by a processor, causes the processor to perform a method comprising:
-
receiving, at a server security component, a request to access services from a mobile communications device for a specific task; determining, at the server security component, whether a security state for the mobile communications device is acceptable for access to the services, the determining the security state for the mobile communications device comprising; determining whether a security state information associated with the received request to access services is up to date, based on the security state information being determined to not be up to date, obtaining, at the server security component, an updated security state information from the mobile communications device, and determining the security state for the mobile communication device based on the updated security state information obtained from the mobile communications device; based on the security state for the mobile communications device being determined to be acceptable for access to the services, granting access, by the server security component, to the services, and determining, at the server security component, whether the security state for the mobile communications device is acceptable for access to the specified task requested; and based on the security state for the mobile communications device being determined to be acceptable for access to the specified task requested, granting access, by the server security component, to the specific task requested. - View Dependent Claims (2)
-
-
3. A non-transitory computer-readable medium encoded with a plurality of instructions which, when executed by a processor, causes the processor to perform a method comprising:
-
receiving, at a service provider, a request to access services by a mobile communications device; determining, at the service provider, whether a security state for the mobile communications device is acceptable for access to the services, the determining the security state for the mobile communications device comprising; determining whether a security state information associated with the received request to access services is up to date, based on the security state information being determined to not being up to date, obtaining, at the server security component, an updated security state information from the mobile communications device, and determining the security state for the mobile communications device based on the updated security state information obtained from the mobile communications device; based on the security state for the mobile communications device being determined to be acceptable for access to the services, granting access, by the server security component, to the services, and determining, at the service provider, whether the security state for the mobile communications device is acceptable for access to the specified task requested; and based on the security state for the mobile communications device being determined to be unacceptable for access to the specific task requested, denying access, by the service provider, to the specified task requested. - View Dependent Claims (4, 5, 6)
-
-
7. A method comprising:
-
receiving, at a server security component, a request to access services from a mobile communications device for a specified task; determining, at the server security component, whether a security state for the mobile communications device is acceptable for access to the services, the determining the security state for the mobile communications device comprising; determining whether a security state information associated with the received request to access services is up to date, based on the security state information being determined to not be up to date, obtaining, at the server security component, an updated security state information from the mobile communication device, and determining the security state for the mobile communications device based on the updated security state information obtained from the mobile communications device; based on the security state for the mobile communications device being determined to be acceptable for access to the services, granting access, by the server security component, to the services, and determining, at the server security component, whether the security state for the mobile communications device is acceptable for access to the specified task requested; and based on the security state for the mobile communications device being determined to be acceptable for access to the specified task requested, granting access, by the server security component, to the specified task requested. - View Dependent Claims (8)
-
-
9. A method comprising:
-
receiving, at a service provider, a request to access services by a mobile communications device; determining, at the service provider, whether a security state for the mobile communications device is acceptable for access to the services, the determining the security state for the mobile communications device comprising; determining whether a security state information associated with the received request to access services is up to date, based on the security state information being determined to not being up to date, obtaining, at the server security component, an updated security state information from the mobile communications device, and determining the security state for the mobile communications device based on the updated security state information obtained from the mobile communications device; based on the security state for the mobile communications device being determined to be acceptable for access to the services, granting access, by the server security component, to the services, and determining, at the service provider, whether the security state for the mobile communications device is acceptable for access to the specified task requested; and based on the security state for the mobile communications device being determined to be unacceptable for access to the specific task requested, denying access, by the service provider, to the specified task requested. - View Dependent Claims (10, 11, 12)
-
Specification