System and method for securing wireless data
First Claim
1. A method for operation upon a data processing device for handling secure data stored on the device, wherein the device is configurable to communicate over a data channel with an external security information source, said method comprising:
- receiving user identification information from the external security information source;
wherein the external security information source has a location proximate relative to the device;
wherein the user identification information identifies a predetermined user;
determining, based upon the received user identification information, whether the secure data stored on the device is to be accessed by a user of the device.
5 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for operation upon a data processing device for handling secure data stored on the device. The device is configurable to communicate over a data channel with an external security information source. User identification information is received from the external security information source which identifies a user of the device. The device, based upon the received user identification information, determines whether the secure data stored on the device is to be accessed by a user of the device.
21 Citations
31 Claims
-
1. A method for operation upon a data processing device for handling secure data stored on the device, wherein the device is configurable to communicate over a data channel with an external security information source, said method comprising:
-
receiving user identification information from the external security information source;
wherein the external security information source has a location proximate relative to the device;
wherein the user identification information identifies a predetermined user;
determining, based upon the received user identification information, whether the secure data stored on the device is to be accessed by a user of the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. An apparatus for operation upon a data processing device, wherein the device is configurable to communicate over a data channel with an external security information source, comprising:
-
data processing instructions configured to receive user identification information from the external security information source;
wherein the external security information source has a location proximate relative to the device;
wherein the user identification information identifies a predetermined user;
data processing instructions configured to determine whether the secure information stored on the device is to be accessed based upon the received user identification information.
-
-
31. A system for operation upon a wireless mobile communications device for handling encrypted email messages stored on the device, wherein the device is configurable to communicate over a data channel with an external security credentials information source, wherein the device receives email messages over a wireless communications network;
- said system comprising;
means for receiving user identification information from the external security credentials information source;
wherein the user identification information identifies a specific user;
means for determining, based upon the received user identification information, whether a secure email message stored on the device is to be accessed and viewed by a user of the device;
wherein the external security credentials information source has a location proximate relative to the device such that the external security credentials information source can communicate with the device;
wherein the external security credentials information source includes a security credentials tag or card which communicates with the device over a wireless data link;
wherein a first user of the device is an intended recipient of a message sent to the device;
wherein a second user is not able to access the sent message because the device does not receive proper user identification information from the external security credentials information source;
wherein the data is encrypted based upon the security rules stored in the rules database.
- said system comprising;
Specification