METHODS AND SYSTEMS FOR SECURE NETWORK CONNECTIONS
First Claim
Patent Images
1. A method comprising:
- storing on a mobile communications device a security policy to manage network connections;
collecting context information at the mobile communications device to evaluate a first network connection between the mobile communications device and a target destination;
applying the security policy using the collected context information at the mobile communication device; and
based on the application of the security policy, determining whether or not there should be a second network connection between the mobile communications device and the target destination, wherein the second network connection offers a level of security different from a level of security offered by the first network connection.
7 Assignments
0 Petitions
Accused Products
Abstract
Context information associated with a mobile communications device and a network connection for the mobile communications device is collected. A security policy is applied to determine whether the security offered by the network connection is appropriate for the context. If the security offered by the network connection is not appropriate for the context, the network connection may be made more secure, less secure, or a different network connection having an appropriate level of security may be used for the data associated with the context.
199 Citations
96 Claims
-
1. A method comprising:
-
storing on a mobile communications device a security policy to manage network connections; collecting context information at the mobile communications device to evaluate a first network connection between the mobile communications device and a target destination; applying the security policy using the collected context information at the mobile communication device; and based on the application of the security policy, determining whether or not there should be a second network connection between the mobile communications device and the target destination, wherein the second network connection offers a level of security different from a level of security offered by the first network connection. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A method comprising:
-
storing on a mobile communications device a security policy to manage network connections; on the mobile communications device, intercepting an attempt by the mobile communications device to establish a first network connection between the mobile communications device and a target destination; and applying the security policy on the mobile communications device according to context information associated with the mobile communications device to determine whether or not a second network connection should be established between the mobile communications device and the target destination, wherein a level of security offered by the first network connection is different from a level of security offered by the second network connection. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 44, 45, 46, 47)
-
-
43. A method comprising:
-
at a mobile communications device connected to a target destination via a first network connection, receiving a security policy specifying a particular type of network connection to be used during a particular context; on the mobile communication device, collecting context information associated with the mobile communications device; on the mobile communication device, analyzing the collected context information and determining whether or not the context information corresponds to the particular context specified in the security policy; and upon a determination that the collected context information corresponds to the particular context specified in the security policy, determining whether or not the type of network connection established between the mobile communications device and the target destination matches the particular type of network connection specified in the security policy.
-
-
48. A method comprising:
-
receiving, at a server, context information associated with a mobile communications device; at the server, analyzing the context information to determine whether a first existing network connection from the mobile communications device for a first application program executing on the mobile communications device offers a level of security appropriate for the first application program; if the first existing network connection does not offer the appropriate level of security, sending instructions to the mobile communications device to terminate the first existing network connection; and if the first existing network connection does offer the appropriate level of security, then allowing the first existing network connection to be maintained on the mobile communications device. - View Dependent Claims (49, 50, 51, 52, 53)
-
-
54. A method comprising:
-
storing on a mobile communications device a security policy to manage types of network connections; collecting context information at the mobile communications device to evaluate a first type of network connection between the mobile communications device and a target destination; applying the security policy using the collected context information at the mobile communications device; and based on the application of the security policy, determining whether or not there should be a second type of network connection between the mobile communications device and the target destination. - View Dependent Claims (55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67)
-
-
68. A method comprising:
-
storing on a mobile communications device a security policy; collecting context information at the mobile communications device to evaluate a request by an application program to establish an application connection over an existing physical network connection; applying the security policy using the collected context information at the mobile communications device; and based on the application of the security policy, allowing or not allowing the request. - View Dependent Claims (69, 70, 71, 72, 73, 74, 75, 76)
-
-
77. A method for providing a secure network connection to a mobile communications device, the method comprising:
-
receiving, at a first server, a request for a secure network account, the request being generated by the mobile communications device in response to a trigger; generating, at the first server, the secure network account, wherein the secure network account includes credentials for the secure network connection; transmitting the credentials to the mobile communications device; and establishing the secure network connection between the first server and the mobile communications device in response to receiving the credentials from the mobile communications device. - View Dependent Claims (78, 79, 80, 81, 82, 83, 84, 85, 86, 87)
-
-
88. A method for providing a secure network connection to a mobile communications device, the method comprising:
-
generating, at a server, a secure network account that includes credentials for the secure network connection; transmitting the credentials to the mobile communications device; establishing the secure network connection between the server and the mobile communications device in response to receiving the credentials from the mobile communications device; identifying a trigger based on an analysis of network traffic in the secure network connection; and modifying the secure network connection in response to identifying the triggering event or condition. - View Dependent Claims (89, 90, 91, 92)
-
-
93. A method for establishing a secure network connection at a mobile communications device, the method comprising:
-
identifying, at the mobile communications device, a trigger; automatically generating, at the mobile communications device, a request for a secure network account in response to identifying the trigger; transmitting the request for the secure network account to a server; receiving, from the server, credentials associated with the secure network account; automatically, at the mobile communications device, configuring a plurality of secure network connection settings on the mobile communications device based on the received credentials; and automatically establishing the secure network connection with the server. - View Dependent Claims (94, 95, 96)
-
Specification