×

On device policy enforcement to secure open platform via network and open network

  • US 9,467,858 B2
  • Filed: 02/07/2011
  • Issued: 10/11/2016
  • Est. Priority Date: 02/05/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method of using policy enforcement for securing open devices and networks, the method comprising:

  • monitoring, by a policy enforcer executing on a mobile device, an integrity of the policy enforcer;

    determining, by the policy enforcer executing on the mobile device, if the policy enforcer has been compromised;

    in response to determining that the policy enforcer has not been compromised, allowing, by the policy enforcer executing on the mobile device, the mobile device to access a network;

    accessing, by the policy enforcer executing on the mobile device, a policy database storing a plurality of policies configured to enforce network integrity on the network providing a plurality of services, the plurality of services including at least a cellular communication service, and an Internet service;

    retrieving, by the policy enforcer executing on the mobile device, the plurality of policies from the policy database;

    monitoring, at random intervals by the policy enforcer executing on the mobile device, programs, services, O/S, firmware, drivers, hardware, and peripherals running on the mobile device;

    based on at least one of the plurality of policies, comparing, by the policy enforcer executing on the mobile device, the programs, the services, the O/S, the firmware, the drivers, the hardware, and the peripherals running on the mobile device against programs, services, O/S, firmware, drivers, hardware, and peripherals allowed by the at least one of the plurality of policies; and

    based on the comparison and in response to determining, by the policy enforcer executing on the mobile device, that the mobile device is running one or more programs, services, O/S, firmware, drivers, hardware, and peripherals not allowed by the at least one of the plurality of policies, prohibiting, by the policy enforcer executing on the mobile device, access of the mobile device to one or more services of the plurality of services provided by the network based on the at least one of the plurality of policies; and

    implementing a mitigation process while continuing to allow the mobile device to access the network and one or more other services of the plurality of services provided by the network based on the at least one of the plurality of policies.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×