发明名称 Securing a network connection by way of an endpoint computing device
摘要 Methods and apparatus involve securing a network connection by way of mobile, endpoint computing assets. The endpoints have one or more pre-defined security policies governing the connection that are balanced against competing interests of actually maintaining connections between devices, especially in WiMAX, MANET, MESH, or other ad hoc computing environments where poor security, signal strength, fragile connections or mobility issues are of traditional concern. In this manner, connections will not be lost over security enforcement in an otherwise hostile environment. The security policies are enforced in a variety of ways, but may be altered to lesser policies or not-so-strictly enforced so as to maintain satisfactory connections between devices. Other embodiments contemplate analyzing connectivity components before connection and selecting only those components that enable full or best compliance with the policies. Still other embodiments contemplate altering connections in order to maintain full enforcement of policies. Computer program products are also disclosed.
申请公布号 US8838804(B2) 申请公布日期 2014.09.16
申请号 US200912381624 申请日期 2009.03.12
申请人 Novell, Inc. 发明人 Beachem Brent R.
分类号 G06F15/16;G06F21/57;H04L29/06 主分类号 G06F15/16
代理机构 King & Schickli, PLLC 代理人 King & Schickli, PLLC
主权项 1. A method of securing an endpoint computing device connection over a network, comprising: pre-defining a security policy for the endpoint computing device; establishing a computing connection from the endpoint computing device to another computing device, including analyzing connectivity components of the endpoint computing device and/or the network enabling the computing connection before or after the establishing; determining whether enforcement of the security policy jeopardizes a continued stability of the computing connection between the endpoint computing device and the another computing device according to the analyzing; and if so, altering the security policy to maintain a continued stability of the computing connection between the endpoint computing device and the another computing device.
地址 Provo UT US