Inventors:
Michael Wright - Sandy UT, US
Peter Boucher - Orem UT, US
Gabe Nault - Draper UT, US
Merrill Smith - Riverton UT, US
Sterling K. Jacobson - Saratoga Springs UT, US
Jonathan Wood - Orem UT, US
Robert Mims - West Valley City UT, US
International Classification:
H04L 29/06, G06F 7/04, G06F 17/00
US Classification:
726 1, 726 11, 726 23, 380258, 709221, 709229, 713154
Abstract:
The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.