System and method for secure control of resources of wireless mobile communication devices
First Claim
1. A method comprising:
- storing first data and second data in a wireless communication device,wherein the first data is stored in a first domain of the wireless communication device and the second data is stored in a second domain of the wireless communication device,wherein the first data is controlled by an organization and the second data is controlled by a user of the wireless communication device;
permitting a first software application to access the first data, the first software application executing at the wireless communication device and associated with the first domain; and
controlling whether a second software application is permitted to access the first data, the second software application executing at the wireless communication device and associated with the second domain.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless mobile communication device asset. When a request to perform an operation affecting at least one of the assets is received, it is determined whether the request is permitted by the domain that includes the at least one affected asset, by determining whether the entity with which the request originated has a trust relationship with the domain, for example. The operation is completed where it is permitted by the domain. Wireless mobile communication device assets include software applications, persistent data, communication pipes, and configuration data, properties or user or subscriber profiles.
-
Citations
24 Claims
-
1. A method comprising:
-
storing first data and second data in a wireless communication device, wherein the first data is stored in a first domain of the wireless communication device and the second data is stored in a second domain of the wireless communication device, wherein the first data is controlled by an organization and the second data is controlled by a user of the wireless communication device; permitting a first software application to access the first data, the first software application executing at the wireless communication device and associated with the first domain; and controlling whether a second software application is permitted to access the first data, the second software application executing at the wireless communication device and associated with the second domain. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A wireless communication device, comprising:
-
at least one memory storing first data and second data in the wireless communication device, wherein the first data is stored in a first domain of the wireless communication device and the second data is stored in a second domain of the wireless communication device, wherein the first data is controlled by an organization and the second data is controlled by a user of the wireless communication device; and a controller configured to; permit a first software application to access the first data, the first software application executing at the wireless communication device and associated with the first domain; and control whether a second software application is permitted to access the first data, the second software application executing at the wireless communication device and associated with the second domain. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer readable medium comprising program code executable by a processor such that, when executed, causes a wireless communication device to perform operations comprising:
-
storing first data and second data in the wireless communication device, wherein the first data is stored in a first domain of the wireless communication device and the second data is stored in a second domain of the wireless communication device, wherein the first data is controlled by an organization and the second data is controlled by a user of the wireless communication device; permitting a first software application to access the first data, the first software application executing at the wireless communication device and associated with the first domain; and controlling whether a second software application is permitted to access the first data, the second software application executing at the wireless communication device and associated with the second domain. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification