SYSTEM AND METHOD FOR PROVIDING NETWORK SECURITY TO MOBILE DEVICES
First Claim
1. A security system, comprising:
- security system memory; and
a security system processor configured to;
store in the security system memory at least a portion of security code, at least a portion of a security policy, and at least a portion of security data,the at least a portion of the security code, the at least a portion of the security policy, and the at least a portion of the security data configured to provide security services to a mobile device coupled to the security system, the mobile device having at least one mobile device processor different than the security system processor of the security system,the at least a portion of the security code, the at least a portion of the security policy, and the at least a portion of the security data being managed by one or more information technology (IT) administrators using an IT administrator system on a trusted enterprise network, the at least a portion of the security code, the at least a portion of the security policy, and the at least a portion of the security data being configured based on one or more policies implemented by the one or more IT administrators on the trusted enterprise network, the mobile device being a first computer system, the security system being a second computer system, and the IT administrator system being a third computer system, the first computer system, the second computer system and the third computer system being separate computer systems;
store in the security system memory at least a portion of remote management code configured to process an update command, the update command being an instruction to update at least one of the security code, the security policy, or the security data based on one or more revised policies implemented by the one or more IT administrators on the trusted enterprise network;
receive a particular update command to update a particular one of the security code, the security policy, or the security data, the particular update command having originated from the IT administrator system and having been forwarded to the security system; and
execute the update command using the remote management code to update the particular one of the security code, the security policy, or the security data.
2 Assignments
0 Petitions
Accused Products
Abstract
A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.
0 Citations
20 Claims
-
1. A security system, comprising:
-
security system memory; and a security system processor configured to; store in the security system memory at least a portion of security code, at least a portion of a security policy, and at least a portion of security data, the at least a portion of the security code, the at least a portion of the security policy, and the at least a portion of the security data configured to provide security services to a mobile device coupled to the security system, the mobile device having at least one mobile device processor different than the security system processor of the security system, the at least a portion of the security code, the at least a portion of the security policy, and the at least a portion of the security data being managed by one or more information technology (IT) administrators using an IT administrator system on a trusted enterprise network, the at least a portion of the security code, the at least a portion of the security policy, and the at least a portion of the security data being configured based on one or more policies implemented by the one or more IT administrators on the trusted enterprise network, the mobile device being a first computer system, the security system being a second computer system, and the IT administrator system being a third computer system, the first computer system, the second computer system and the third computer system being separate computer systems; store in the security system memory at least a portion of remote management code configured to process an update command, the update command being an instruction to update at least one of the security code, the security policy, or the security data based on one or more revised policies implemented by the one or more IT administrators on the trusted enterprise network; receive a particular update command to update a particular one of the security code, the security policy, or the security data, the particular update command having originated from the IT administrator system and having been forwarded to the security system; and execute the update command using the remote management code to update the particular one of the security code, the security policy, or the security data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer readable storage device of a security system storing:
-
program instructions; at least a portion of security code, at least a portion of a security policy, and at least a portion of security data, the at least a portion of the security code, the at least a portion of the security policy, and the at least a portion of the security data configured to provide security services to a mobile device coupled to the security system, the mobile device having at least one mobile device processor different than a security system processor of the security system, the at least a portion of the security code, the at least a portion of the security policy, and the at least a portion of the security data being managed by one or more information technology (IT) administrators using an IT administrator system on a trusted enterprise network, the at least a portion of the security code, the at least a portion of the security policy, and the at least a portion of the security data being configured based on one or more policies implemented by the one or more IT administrators on the trusted enterprise network, the mobile device being a first computer system, the security system being a second computer system, and the IT administrator system being a third computer system, the first computer system, the second computer system and the third computer system being separate computer systems; and at least a portion of remote management code configured to process an update command, the update command being an instruction to update at least one of the security code, the security policy, or the security data based on one or more revised policies implemented by the one or more IT administrators on the trusted enterprise network; the program instructions when executed by the security system processor causing the security system to receive a particular update command to update a particular one of the security code, the security policy, or the security data, the particular update command having originated from the IT administrator system, the particular update command having been forwarded to the security system; and the remote management code when executed by the security system processor causing the system to process the update command to update the particular one of the security code, the security policy, or the security data. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A security system, comprising:
-
security system memory; and a security system processor configured to; store in the security system memory at least a portion of security code, at least a portion of a security policy, and at least a portion of security data, the at least a portion of the security code, the at least a portion of the security policy, and the at least a portion of the security data configured to be processed by the security system processor to implement security services for a mobile device coupled to the security system, the mobile device having at least one mobile device processor different than the security system processor of the security system, the at least a portion of the security code, the at least a portion of the security policy, and the at least a portion of the security data being managed by one or more information technology (IT) administrators using an IT administrator system on a trusted enterprise network, the at least a portion of the security code, the at least a portion of the security policy, and the at least a portion of the security data being configured based on one or more policies implemented by the one or more IT administrators on the trusted enterprise network, the mobile device being a first computer system, the security system being a second computer system, and the IT administrator system being a third computer system, the first computer system, the second computer system and the third computer system being separate computer systems; store in the security system memory at least a portion of remote management code configured to process an update command, the update command being an instruction to update at least one of the security code, the security policy, or the security data based on one or more revised policies implemented by the one or more IT administrators on the trusted enterprise network; receive a particular update command to update a particular one of the security code, the security policy, or the security data, the particular update command having originated from the IT administrator system and having been forwarded to the security system; and execute the update command using the remote management code to update the particular one of the security code, the security policy, or the security data.
-
-
20. A non-transitory computer readable storage device of a security system storing:
-
program instructions; at least a portion of security code, at least a portion of a security policy, and at least a portion of security data, the at least a portion of the security code, the at least a portion of the security policy, and the at least a portion of the security data configured to be processed by the security system processor to implement security services for a mobile device coupled to the security system, the mobile device having at least one mobile device processor different than the security system processor of the security system, the at least a portion of the security code, the at least a portion of the security policy, and the at least a portion of the security data being managed by one or more information technology (IT) administrators using an IT administrator system on a trusted enterprise network, the at least a portion of the security code, the at least a portion of the security policy, and the at least a portion of the security data being configured based on one or more policies implemented by the one or more IT administrators on the trusted enterprise network, the mobile device being a first computer system, the security system being a second computer system, and the IT administrator system being a third computer system, the first computer system, the second computer system and the third computer system being separate computer systems; and at least a portion of remote management code configured to process an update command, the update command being an instruction to update at least one of the security code, the security policy, or the security data based on one or more revised policies implemented by the one or more IT administrators on the trusted enterprise network; the program instructions when executed by the security system processor causing the security system to receive a particular update command to update a particular one of the security code, the security policy, or the security data, the particular update command having originated from the IT administrator system, the particular update command having been forwarded to the security system; and the remote management code when executed by the security system processor causing the system to process the update command to update the particular one of the security code, the security policy, or the security data.
-
Specification