Electronic device based security management background

An electronic device, security technology, applied in the direction of security devices, electrical digital data processing, computer security devices, etc., can solve the problem that users cannot access the device as a whole

Inactive Publication Date: 2018-12-21
QUALCOMM INC
View PDF11 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Often, responses to security threats include disabling the user's overa...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic device based security management background
  • Electronic device based security management background
  • Electronic device based security management background

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] This disclosure presents techniques for providing security for electronic devices. The electronic device monitors the status of the electronic device for one or more threats to the security of the electronic device. The state may include the operation and / or configuration of the electronic device. The operation of the electronic device includes operating system and / or application program operation. The configuration of the electronic device includes software, firmware and hardware configuration. The electronic device detects one or more threats based on the monitored state and based on one or more security policies associated with the electronic device. In response to a detected threat, the electronic device self-enforces one or more security policies. The electronic device self-enforces one or more security policies by implementing one or more targeted security actions according to these policies. The targeted security actions may selectively alter operation and / or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Methods, apparatus, and computer program products for providing security for an electronic device are described. An example of a method includes monitoring, by the electronic device, a status of the electronic device for one or more threats to a security of the electronic device, detecting, by the electronic device, the one or more threats to the security of the electronic device based on the status of the electronic device and on one or more security policies associated with the electronic device, and self-enforcing, by the electronic device, the one or more security policies by implementingone or more targeted security actions, as indicated by the one or more security policies, to selectively alter the status of the electronic device, based on the detected one or more threats to the security of the electronic device.

Description

Background technique [0001] Illegal activities and configurations of electronic devices can circumvent data security protections on the electronic devices. For example, malicious code executing on a device and device settings intended to violate data security may pose a threat to the security of the device and reduce trust associated with the device. Additionally, weakened security and / or trust of electronic devices may adversely affect user privacy and / or the privacy or security of electronic device assets (eg, data, software, and / or hardware assets). A security policy may provide a response to security threats to a device, which may reduce or eliminate security threats and / or reduce or eliminate current and / or future security losses. Often, responses to security threats include disabling the user's overall access to the device (eg, disabling continued operation of the device). Additionally, typically a server, such as a mobile device management (MDM) server, enforces secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57H04L29/06H04W12/08H04W12/12
CPCG06F21/577H04L63/1433H04W12/08H04W12/128G06F21/554G06F21/56
Inventor S·科甘蒂M·巴普斯特B·雅各布松G·米利基希
Owner QUALCOMM INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products