Security management on a mobile device
First Claim
Patent Images
1. A method for managing security levels on a mobile device, the method comprising:
- assigning, at the mobile device, a first data tag to a capsule including first data and information associated with the first data, the first data tag identifying a security level for the first data, the security level corresponding to at least one of a personal security level and a workplace security level;
storing the capsule on the mobile device;
detecting a system call performed by an email process to an address book process, the email process executing on the mobile device;
in response to the system call, assigning, by executing an instruction with a processor of the mobile device, an application tag to the email process based on a recipient email address obtained from the address book process for an email being composed with the email process, the application tag corresponding to at least one of the personal security level and the workplace security level;
allowing, by executing an instruction with the processor, the email process to include the first data with the email when the application tag matches the first data tag; and
preventing the first data from being included with the email when the application tag does not match the first data tag.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for managing security levels on a mobile device includes receiving a capsule including first data; assigning a first data tag to the capsule, the first data tag identifying a security level for the first data; storing the capsule on the mobile device; executing a process on the mobile device, the process associated with an application tag; allowing the process to access the first data when the application tag matches the first data tag, the process for generating second data in response to the first data.
-
Citations
18 Claims
-
1. A method for managing security levels on a mobile device, the method comprising:
-
assigning, at the mobile device, a first data tag to a capsule including first data and information associated with the first data, the first data tag identifying a security level for the first data, the security level corresponding to at least one of a personal security level and a workplace security level; storing the capsule on the mobile device; detecting a system call performed by an email process to an address book process, the email process executing on the mobile device; in response to the system call, assigning, by executing an instruction with a processor of the mobile device, an application tag to the email process based on a recipient email address obtained from the address book process for an email being composed with the email process, the application tag corresponding to at least one of the personal security level and the workplace security level; allowing, by executing an instruction with the processor, the email process to include the first data with the email when the application tag matches the first data tag; and preventing the first data from being included with the email when the application tag does not match the first data tag. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus comprising:
-
a processor; and memory including computer-executable instructions that, when executed by the processor, cause the processor to perform operations, the operations including; assigning a first data tag to a capsule including first data and information associated with the first data, the first data tag identifying a security level for the first data, the security level corresponding to at least one of a personal security level and a workplace security level; storing the capsule; detecting a system call performed by an email process to an address book process; in response to the system call, assigning an application tag to the email process based on a recipient email address obtained from the address book process for an email being composed with the email process, the application tag corresponding to at least one of the personal security level and the workplace security level; allowing the email process to include the first data with the email when the application tag matches the first data tag; and preventing the first data from being included with the email when the application tag does not match the first data tag. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer readable memory including instructions that, when executed by a processor of a mobile device, cause the processor to perform operations comprising:
-
assigning a first data tag to a capsule including first data and information associated with the first data, the first data tag identifying a security level for the first data, the security level corresponding to at least one of a personal security level and a workplace security level; storing the capsule on the mobile device; detecting a system call performed by an email process to an address book process; in response to the system call, assigning an application tag assigned to the email process based on a recipient email address obtained from the address book process for an email being composed with the email process, the application tag corresponding to at least one of the personal security level and the workplace security level; allowing the email process to include the first data with the email when the application tag matches the first data tag; and preventing the first data from being included with the email when the application tag does not match the first data tag. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification