-
公开(公告)号:US07353533B2
公开(公告)日:2008-04-01
申请号:US10413443
申请日:2003-04-11
申请人: Michael Wright , Peter Boucher , Gabe Nault , Merrill Smith , Sterling K Jacobson , Jonathan Wood , Robert Mims
发明人: Michael Wright , Peter Boucher , Gabe Nault , Merrill Smith , Sterling K Jacobson , Jonathan Wood , Robert Mims
CPC分类号: H04W12/08 , G06F11/30 , G06F21/32 , G06F21/604 , H04L63/0492 , H04L63/102 , H04L63/107 , H04L63/20 , H04L67/34
摘要: The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
摘要翻译: 描述了由企业网络内的服务器计算机系统或单独的移动计算设备对客户端移动计算设备上的数据进行管理。 描述了安全工具,其基于与移动设备正在操作的网络环境相关联的位置来提供不同的安全策略。 描述了用于检测移动设备的位置的方法。 此外,安全工具还可以提供基于安全特征来实施不同的策略。 安全功能的示例包括正在传输数据的有线或无线连接的类型,防病毒软件的操作或网络适配器卡的类型。 不同的安全策略提供可以基于检测到的与移动设备相关联的位置和/或主动安全特征来定制的强制机制。 执行机制的实例是自适应端口阻塞,文件隐藏和文件加密。
-
公开(公告)号:US20080077971A1
公开(公告)日:2008-03-27
申请号:US11926314
申请日:2007-10-29
申请人: Michael Wright , Peter Boucher , Gabe Nault , Merrill Smith , Sterling Jacobson , Jonathan Wood , Robert Mims
发明人: Michael Wright , Peter Boucher , Gabe Nault , Merrill Smith , Sterling Jacobson , Jonathan Wood , Robert Mims
IPC分类号: H04L9/00
CPC分类号: H04W12/08 , G06F11/30 , G06F21/32 , G06F21/604 , H04L63/0492 , H04L63/102 , H04L63/107 , H04L63/20 , H04L67/34
摘要: The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
-
3.
公开(公告)号:US09237514B2
公开(公告)日:2016-01-12
申请号:US11176999
申请日:2005-07-07
申请人: Brent Beachem , Peter Boucher , Gabe Nault , Richard Rollins , Jonathan Brett Wood , Michael Wright
发明人: Brent Beachem , Peter Boucher , Gabe Nault , Richard Rollins , Jonathan Brett Wood , Michael Wright
CPC分类号: H04W12/08 , H04L63/101 , H04L63/102 , H04L63/107 , H04L63/20 , H04M7/121 , H04W4/02 , H04W48/20 , H04W76/20 , H04W84/12 , H04W92/10
摘要: The present invention filters access points presented to a user and locks onto an access point. The present invention includes an access point filtering unit and an access point locking unit. The access point filtering unit determines the access points that are accessible by a client device and then filters them to present only the access points that are acceptable to under a security policy in force. The access point locking unit has a plurality of operating modes and can lock onto a user selected access point, a security policy prescribed access point, or the access point with the best signal profile. The present invention also includes several methods such as: a method for filtering access points for presentation to the user, a method for locking onto an access point selected by the user, a method for locking onto an access point with the best signal profile, and a method for locking onto an access point prescribed by a security policy for a given location.
-
公开(公告)号:US09197668B2
公开(公告)日:2015-11-24
申请号:US11330530
申请日:2006-01-11
申请人: Peter Boucher , Michael Wright , Tim Cranny , Gabe Nault , Merrill Smith
发明人: Peter Boucher , Michael Wright , Tim Cranny , Gabe Nault , Merrill Smith
CPC分类号: H04L63/20 , G06F21/6218 , G06F2221/2141 , H04L9/3247 , H04L63/0227 , H04L63/0272 , H04L63/10 , H04L63/101 , H04L63/102 , H04L63/12 , H04L2209/60 , H04L2209/80
摘要: The present invention is a security tool for protection of data on a mobile computing device. The security tool provides a plurality of security policies to be enforced based on source information for the data and a location associated with a network environment in which a mobile device is operating. The security tool may be either located at the mobile computing device or at the server. The security tool includes a file access module for determining whether files are visible or accessible. The file access module comprises a tag generator, an association module, and a policy enforcement module. The tag generator creates source information for the file being accessed and the policy enforcement module determines what actions, if any, can be performed on the file and under what conditions such as location and network environment, type of file and other factors.
摘要翻译: 本发明是用于保护移动计算设备上的数据的安全工具。 该安全工具提供了基于数据的源信息和与移动设备在其中运行的网络环境相关联的位置来执行的多个安全策略。 安全工具可以位于移动计算设备处或服务器处。 安全工具包括用于确定文件是可见还是可访问的文件访问模块。 文件访问模块包括标签生成器,关联模块和策略执行模块。 标签生成器为要访问的文件创建源信息,并且策略实施模块确定可以对文件执行哪些操作(如果有的话)以及在什么条件下,如位置和网络环境,文件类型和其他因素。
-
公开(公告)号:US07478420B2
公开(公告)日:2009-01-13
申请号:US11926436
申请日:2007-10-29
申请人: Michael Wright , Peter Boucher , Gabe Nault , Merrill Smith , Sterling K. Jacobson , Jonathan Wood , Robert Mims
发明人: Michael Wright , Peter Boucher , Gabe Nault , Merrill Smith , Sterling K. Jacobson , Jonathan Wood , Robert Mims
CPC分类号: H04L67/18 , G06F21/32 , G06F21/554 , G06F21/604 , G06F21/6218 , G06F2221/2111 , G06F2221/2141 , H04L12/4604 , H04L63/0272 , H04L63/045 , H04L63/0492 , H04L63/08 , H04L63/105 , H04L63/166 , H04L63/20 , H04L67/26 , H04W4/02 , H04W12/02 , H04W12/06 , H04W12/08 , H04W12/12
摘要: The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
-
公开(公告)号:US20080109679A1
公开(公告)日:2008-05-08
申请号:US11926371
申请日:2007-10-29
申请人: Michael Wright , Peter Boucher , Gabe Nault , Merrill Smith , Sterling Jacobson , Jonathan Wood , Robert Mims
发明人: Michael Wright , Peter Boucher , Gabe Nault , Merrill Smith , Sterling Jacobson , Jonathan Wood , Robert Mims
IPC分类号: G06F11/07
CPC分类号: H04L63/102 , H04L63/107 , H04L63/20 , H04L67/34 , H04W12/08
摘要: The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
摘要翻译: 描述了由企业网络内的服务器计算机系统或单独的移动计算设备对客户端移动计算设备上的数据进行管理。 描述了安全工具,其基于与移动设备正在操作的网络环境相关联的位置来提供不同的安全策略。 描述了用于检测移动设备的位置的方法。 此外,安全工具还可以提供基于安全特征来实施不同的策略。 安全功能的示例包括正在传输数据的有线或无线连接的类型,防病毒软件的操作或网络适配器卡的类型。 不同的安全策略提供可以基于检测到的与移动设备相关联的位置和/或主动安全特征来定制的强制机制。 执行机制的实例是自适应端口阻塞,文件隐藏和文件加密。
-
公开(公告)号:US20080046965A1
公开(公告)日:2008-02-21
申请号:US11926436
申请日:2007-10-29
申请人: Michael Wright , Peter Boucher , Gabe Nault , Merrill Smith , Sterling Jacobson , Jonathan Wood , Robert Mims
发明人: Michael Wright , Peter Boucher , Gabe Nault , Merrill Smith , Sterling Jacobson , Jonathan Wood , Robert Mims
CPC分类号: H04L67/18 , G06F21/32 , G06F21/554 , G06F21/604 , G06F21/6218 , G06F2221/2111 , G06F2221/2141 , H04L12/4604 , H04L63/0272 , H04L63/045 , H04L63/0492 , H04L63/08 , H04L63/105 , H04L63/166 , H04L63/20 , H04L67/26 , H04W4/02 , H04W12/02 , H04W12/06 , H04W12/08 , H04W12/12
摘要: The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
-
公开(公告)号:US08020192B2
公开(公告)日:2011-09-13
申请号:US11926454
申请日:2007-10-29
申请人: Michael Wright , Peter Boucher , Gabe Nault , Merrill Smith , Sterling K. Jacobson , Jonathan Wood , Robert Mims
发明人: Michael Wright , Peter Boucher , Gabe Nault , Merrill Smith , Sterling K. Jacobson , Jonathan Wood , Robert Mims
CPC分类号: H04L63/20 , H04L63/045 , H04L63/08 , H04L63/166 , H04L67/18 , H04W4/02
摘要: The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
摘要翻译: 描述了由诸如企业网络内的服务器计算机系统或单独的移动计算设备在客户端移动计算设备上的数据保护。 描述了安全工具,其基于与移动设备正在操作的网络环境相关联的位置来提供不同的安全策略。 描述了用于检测移动设备的位置的方法。 此外,安全工具还可以提供基于安全特征来实施不同的策略。 安全功能的示例包括正在传输数据的有线或无线连接的类型,防病毒软件的操作或网络适配器卡的类型。 不同的安全策略提供可以基于检测到的与移动设备相关联的位置和/或主动安全特征来定制的强制机制。 执行机制的实例是自适应端口阻塞,文件隐藏和文件加密。
-
公开(公告)号:US07636936B2
公开(公告)日:2009-12-22
申请号:US11926314
申请日:2007-10-29
申请人: Michael Wright , Peter Boucher , Gabe Nault , Merrill Smith , Sterling K Jacobson , Jonathan Wood , Robert Mims
发明人: Michael Wright , Peter Boucher , Gabe Nault , Merrill Smith , Sterling K Jacobson , Jonathan Wood , Robert Mims
CPC分类号: H04W12/08 , G06F11/30 , G06F21/32 , G06F21/604 , H04L63/0492 , H04L63/102 , H04L63/107 , H04L63/20 , H04L67/34
摘要: The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
摘要翻译: 描述了由企业网络内的服务器计算机系统或单独的移动计算设备对客户端移动计算设备上的数据进行管理。 描述了安全工具,其基于与移动设备正在操作的网络环境相关联的位置来提供不同的安全策略。 描述了用于检测移动设备的位置的方法。 此外,安全工具还可以提供基于安全特征来实施不同的策略。 安全功能的示例包括正在传输数据的有线或无线连接的类型,防病毒软件的操作或网络适配器卡的类型。 不同的安全策略提供可以基于检测到的与移动设备相关联的位置和/或主动安全特征来定制的强制机制。 执行机制的实例是自适应端口阻塞,文件隐藏和文件加密。
-
公开(公告)号:US20080052395A1
公开(公告)日:2008-02-28
申请号:US11926454
申请日:2007-10-29
申请人: Michael Wright , Peter Boucher , Gabe Nault , Merrill Smith , Sterling Jacobson , Jonathan Wood , Robert Mims
发明人: Michael Wright , Peter Boucher , Gabe Nault , Merrill Smith , Sterling Jacobson , Jonathan Wood , Robert Mims
IPC分类号: G06F15/173
CPC分类号: H04L63/20 , H04L63/045 , H04L63/08 , H04L63/166 , H04L67/18 , H04W4/02
摘要: The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
摘要翻译: 描述了由诸如企业网络内的服务器计算机系统或单独的移动计算设备在客户端移动计算设备上的数据保护。 描述了安全工具,其基于与移动设备正在操作的网络环境相关联的位置来提供不同的安全策略。 描述了用于检测移动设备的位置的方法。 此外,安全工具还可以提供基于安全特征来实施不同的策略。 安全功能的示例包括正在传输数据的有线或无线连接的类型,防病毒软件的操作或网络适配器卡的类型。 不同的安全策略提供可以基于检测到的与移动设备相关联的位置和/或主动安全特征来定制的强制机制。 执行机制的实例是自适应端口阻塞,文件隐藏和文件加密。
-
-
-
-
-
-
-
-
-