Secure data synchronization
First Claim
Patent Images
1. A method comprising:
- determining that enterprise data is stored locally on a first device, the first device corresponding to an enterprise device based on an association with at least one enterprise policy or permission;
receiving a request to propagate the enterprise data from the first device to a second device;
determining whether the second device is an enterprise device or a non-enterprise device;
based at least on a determination that the second device is a non-enterprise device based on a lack of the association with at least one enterprise policy or permission, determining whether a propagation permission associated with the first device indicates that the first device is permitted to propagate the enterprise data to non-enterprise devices; and
based at least on a determination that the first device lacks permission to propagate the enterprise data to a non-enterprise device, preventing the enterprise data from being propagated from the first device to the second device.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for secure data synchronization are described. In one or more implementations, a determination is made as to whether enterprise data is stored locally on a first device corresponding to an enterprise device. Based on a determination that the second device is a non-enterprise device, a determination is made as to whether a permission associated with the first device indicates that the first device is permitted to propagate the enterprise data to non-enterprise devices. If the first device lacks permission to propagate the enterprise data to non-enterprise devices, the enterprise data is prevented from being propagated to the second device.
-
Citations
21 Claims
-
1. A method comprising:
-
determining that enterprise data is stored locally on a first device, the first device corresponding to an enterprise device based on an association with at least one enterprise policy or permission; receiving a request to propagate the enterprise data from the first device to a second device; determining whether the second device is an enterprise device or a non-enterprise device; based at least on a determination that the second device is a non-enterprise device based on a lack of the association with at least one enterprise policy or permission, determining whether a propagation permission associated with the first device indicates that the first device is permitted to propagate the enterprise data to non-enterprise devices; and based at least on a determination that the first device lacks permission to propagate the enterprise data to a non-enterprise device, preventing the enterprise data from being propagated from the first device to the second device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
one or more processors; and one or more computer-readable hardware storage media storing computer-executable instructions which are executable by the one or more processors to cause the system to perform operations including; identifying an association of a first device with at least one enterprise policy or permission; determining that enterprise data is stored locally on the first device, the first device corresponding to an enterprise device based on the association with at least one enterprise policy or permission; receiving a request to propagate the enterprise data from the first device to a second device; determining whether the second device is an enterprise device or a non-enterprise device; based at least on a determination that the second device is a non-enterprise device made by identifying a lack of an association of the second device with at least one enterprise policy or permission, determining whether the enterprise data is permitted to be propagated to non-enterprise devices based on a propagation permission associated with one of the first device or the enterprise data; and based at least on the propagation permission indicating that the enterprise data is not to be propagated to a non-enterprise device, preventing the enterprise data from being propagated from the first device to the second device. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
determining that enterprise data is stored locally on a device having an association with at least one enterprise policy or permission; ascertaining whether the enterprise data is permitted to be propagated to a different device based at least in part on whether the different device is an enterprise device or a non-enterprise device; and in an event that the different device is a non-enterprise device according to a lack of an association of the different device with at least one enterprise policy or permission, preventing the enterprise data from being propagated to the non-enterprise device unless a propagation permission associated with the device indicates that the enterprise data is permitted to be propagated to the non-enterprise device. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A method comprising:
-
determining that enterprise data is stored on an enterprise portion of a device, the enterprise portion of the device having an association with at least one enterprise policy or permission; receiving a request to propagate the enterprise data from the enterprise portion of the device to a non-enterprise portion of the device, the non-enterprise portion of the device lacking the association with at least one enterprise policy or permission; determining whether a propagation permission associated with the enterprise portion of the device indicates that the enterprise portion of the device is permitted to propagate the enterprise data to the non-enterprise portion of the device; and based at least on a determination that the enterprise portion of the device lacks permission to propagate the enterprise data to the non-enterprise portion of the device, preventing the enterprise data from being propagated from the enterprise portion of the device to the non-enterprise portion of the device.
-
Specification