Method and system to contextually initiate synchronization services on mobile terminals in an enterprise environment
First Claim
1. A system to provide security features to a wireless mobile device based on its context, comprising:
- a first middleware program stored in a memory of a wireless mobile device, having a plurality of security process subroutines selectable by a command;
a second middleware program stored in a memory of a wireless access point device, having a plurality of security process subroutines selectable by said command;
a third middleware program stored in a memory of a server in a network coupled to said access point device, having a plurality of security process subroutines selectable by said command;
a context manager program in said server for determining a context for said wireless mobile device from a signal received from said access point indicating that said wireless mobile device is wirelessly connected to said access point;
a database coupled to said server for storing security feature data accessible by said determined context to implement a security process;
said context manager accessing said stored security feature data based on said determined context and sending a command representing said security feature data to said first, second, and third middleware programs to implement said security process in said wireless mobile device, said access point device, and said server, respectively.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are disclosed for providing security features to a wireless mobile device based upon its context when it establishes a wireless connection with different access points. A plurality of access points are connected to a connectivity server which includes a security context middleware. Each of the access points also includes a security context middleware. Furthermore, each mobile wireless device includes security context middleware. A context manager program in the server determines a context for a wireless mobile device from a signal received from an access point indicating that the wireless mobile device is wirelessly connected to the access point. A database connected to the server stores security feature data which is accessible by the determined context to implement a security process. The context manager accesses the stored security feature data based on the determined context and sends a command representing the security feature data to the middleware programs in the server, the access point and the mobile wireless device to implement the security process in the mobile wireless device.
104 Citations
133 Claims
-
1. A system to provide security features to a wireless mobile device based on its context, comprising:
-
a first middleware program stored in a memory of a wireless mobile device, having a plurality of security process subroutines selectable by a command;
a second middleware program stored in a memory of a wireless access point device, having a plurality of security process subroutines selectable by said command;
a third middleware program stored in a memory of a server in a network coupled to said access point device, having a plurality of security process subroutines selectable by said command;
a context manager program in said server for determining a context for said wireless mobile device from a signal received from said access point indicating that said wireless mobile device is wirelessly connected to said access point;
a database coupled to said server for storing security feature data accessible by said determined context to implement a security process;
said context manager accessing said stored security feature data based on said determined context and sending a command representing said security feature data to said first, second, and third middleware programs to implement said security process in said wireless mobile device, said access point device, and said server, respectively. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method to provide security features to a wireless mobile device based on its context, comprising:
-
storing a first middleware program in a memory of a wireless mobile device, having a plurality of security process subroutines selectable by a command;
storing a second middleware program in a memory of a wireless access point device, having a plurality of security process subroutines selectable by said command;
storing a third middleware program in a memory of a server in a network coupled to said access point device, having a plurality of security process subroutines selectable by said command;
determining with a context manager program in said server a context for said wireless mobile device from a signal received from said access point indicating that said wireless mobile device is wirelessly connected to said access point;
storing in a database coupled to said server security feature data accessible by said determined context to implement a security process;
accessing with said context manager said stored security feature data based on said determined context and sending a command representing said security feature data to said first, second, and third middleware programs to implement said security process in said wireless mobile device, said access point device, and said server, respectively. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A system to provide security features to a wireless mobile device based on its context, comprising:
-
a first middleware program stored in a memory of a first wireless mobile device, having a plurality of security process subroutines selectable by a command;
a second middleware program stored in a memory of a second wireless device having a known current location, said middleware having a plurality of security process subroutines selectable by said command;
a context manager program in a server coupled to said second wireless device for determining a context for said first wireless mobile device when said first wireless mobile device is wirelessly connected to said second wireless device;
a database coupled to said server for storing security feature data accessible by said determined context to implement a security process;
said context manager accessing said stored security feature data based on said determined context and issuing a command representing said security feature data to said first and second middleware programs to implement said security process in said first wireless mobile device and said second wireless device, respectively. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
-
-
53. A server to provide security features to a wireless mobile device based on its context, comprising:
-
a computer coupled to a wireless access point;
a context manager program stored in a memory of the computer, for determining a context for a wireless mobile device when said wireless mobile device is wirelessly connected to said wireless access point;
a database coupled to said computer for storing security feature data accessible by said determined context to implement a security process;
said context manager accessing said stored security feature data based on said determined context and issuing a command representing said security feature data;
a middleware program stored in a memory of the computer, having a plurality of security process subroutines selectable by said command, to operatively interact with a first middleware program in said access point and a second middleware program in said mobile wireless device, to implement said security process in said first wireless mobile device and said second wireless device, respectively. - View Dependent Claims (54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66)
-
-
67. A wireless access point to provide security features to a wireless mobile device based on its context, comprising:
-
a computer coupled to a memory;
a server interface coupled to said computer, for interfacing with a server;
a wireless communications interface coupled to said computer, for wirelessly interfacing with a mobile wireless device;
a communications program stored in said memory, for establishing a wireless connection with said mobile device and providing context information to said server when said wireless mobile device is wirelessly connected to said wireless communications interface;
a middleware program stored in said memory, having a plurality of security process subroutines selectable by a command received from said server in response to said context information;
said command representing a security feature to be implemented in said access point and said wireless mobile device by one of said subroutines selected by said command. - View Dependent Claims (68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91)
-
-
92. A wireless mobile device having security features based on its context, comprising:
-
a computer coupled to a memory;
a wireless communications interface coupled to said computer, for wirelessly interfacing with an access point;
a communications program stored in said memory, for establishing a wireless connection with said access point;
said access point providing to a server context information about the mobile device when said access point is wirelessly connected to said wireless communications interface;
a middleware program stored in said memory, having a plurality of security process subroutines selectable by a command received from said access point in response to said context information;
said command representing a security feature to be implemented in said wireless mobile device by one of said subroutines selected by said command. - View Dependent Claims (93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112)
-
-
113. A program product for a wireless mobile device having security features based on its context, comprising:
-
a communications program for establishing a wireless connection with an access point;
said access point providing to a server context information about the mobile device when said access point is wirelessly connected to said wireless communications interface;
a middleware program having a plurality of security process subroutines selectable by a command received from said access point in response to said context information;
said command representing a security feature to be implemented in said wireless mobile device by one of said subroutines selected by said command. - View Dependent Claims (114, 115)
-
-
116. A program product for an access point to provide security features to a wireless mobile device based on its context, comprising:
-
a communications program for establishing a wireless connection with a mobile device and providing context information to a server when said wireless mobile device is wirelessly connected to the access point;
a middleware program having a plurality of security process subroutines selectable by a command received from said server in response to said context information;
said command representing a security feature to be implemented in said access point and said wireless mobile device by one of said subroutines selected by said command. - View Dependent Claims (117, 118, 119, 120, 121, 122)
-
-
123. A program product for a server to provide security features to a wireless mobile device based on its context, comprising:
-
a context manager program for determining a context for a wireless mobile device when said wireless mobile device is wirelessly connected to a wireless access point;
said context manager accessing stored security feature data based on said determined context and issuing a command representing said security feature data;
a middleware program having a plurality of security process subroutines selectable by said command, to operatively interact with a first middleware program in said access point and a second middleware program in said mobile wireless device, to implement said security process in said first wireless mobile device and said second wireless device, respectively. - View Dependent Claims (124, 125, 126, 127, 128, 129, 130, 131, 132, 133)
-
Specification