System and method for secure control of resources of wireless mobile communication devices
First Claim
1. A method comprising:
- storing corporate data and other data on a wireless communication device, wherein the corporate data is stored in a corporate domain of the wireless communication device and the other data is not stored in the corporate domain, wherein the corporate data is controlled by a corporate entity and the other data is controlled by a user of the wireless communication device;
receiving, via a communication pipe, a request to access the corporate data; and
controlling access, through a security firewall, to the corporate data based on whether the communication pipe is determined to be in the corporate domain by using a cryptographic key.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless mobile communication device asset. When a request to perform an operation affecting at least one of the assets is received, it is determined whether the request is permitted by the domain that includes the at least one affected asset, by determining whether the entity with which the request originated has a trust relationship with the domain, for example. The operation is completed where it is permitted by the domain. Wireless mobile communication device assets include software applications, persistent data, communication pipes, and configuration data, properties or user or subscriber profiles.
124 Citations
20 Claims
-
1. A method comprising:
-
storing corporate data and other data on a wireless communication device, wherein the corporate data is stored in a corporate domain of the wireless communication device and the other data is not stored in the corporate domain, wherein the corporate data is controlled by a corporate entity and the other data is controlled by a user of the wireless communication device; receiving, via a communication pipe, a request to access the corporate data; and controlling access, through a security firewall, to the corporate data based on whether the communication pipe is determined to be in the corporate domain by using a cryptographic key. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A wireless communication device, comprising:
-
at least one memory storing corporate data and other data on the wireless communication device, wherein the corporate data is stored in a corporate domain of the wireless communication device and the other data is not stored in the corporate domain, wherein the corporate data is controlled by a corporate entity and the other data is controlled by a user of the wireless communication device; and a controller configured to; receive, via a communication pipe, a request to access the corporate data; and control access, through a security firewall, to the corporate data based on whether the communication pipe is determined to be in the corporate domain by using a cryptographic key. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium, comprising program code executable by a processor such that when executed, cause a wireless communication device to:
-
store corporate data and other data on the wireless communication device, wherein the corporate data is stored in a corporate domain of the wireless communication device and the other data is not stored in the corporate domain, wherein the corporate data is controlled by a corporate entity and the other data is controlled by a user of the wireless communication device; receive, via a communication pipe, a request to access the corporate data; and control access, through a security firewall, to the corporate data based on whether the communication pipe is determined to be in the corporate domain by using a cryptographic key. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification