×

Policy compliance-based secure data access

  • US 8,756,651 B2
  • Filed: 09/27/2011
  • Issued: 06/17/2014
  • Est. Priority Date: 09/27/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method of verifying client compliance with a set of security policies in order to grant access to secure data, the method comprising:

  • under control of one or more computer systems configured with executable instructions,receiving, from a mobile device, a request for an authentication seed that includes security information enabling generation of an authentication code that is distinct from the authentication seed;

    after receiving the request for the authentication seed from the mobile device, sending a request for a set of parameter values corresponding to a set of security policies to the mobile device in order to determine whether the mobile device complies with the set of security policies;

    instructing the mobile device to impose at least one of the set of security policies on the mobile device;

    receiving the set of parameter values from the mobile device;

    determining whether the set of parameter values received from the mobile device indicates that the mobile device is in compliance with the set of security policies; and

    after determining, sending the authentication seed to the mobile device to enable the mobile device to generate the authentication code when the set of parameter values indicates that the mobile device is in compliance with the set of security policies, the authentication code being generated based at least in part on the authentication seed.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×