System and method for secure control of resources of wireless mobile communication devices
First Claim
1. A system of securely controlling a wireless mobile communication device, comprising:
- a plurality of domains residing on a wireless mobile communication device, each domain including an asset of the wireless mobile communication device; and
a domain controller configured to receive a request to perform an operation affecting at least one of the assets, to determine whether the request originated with an entity that has a trust relationship with the domain that includes the at least one affected asset, and to permit completion of the operation where the request originated with an entity that has a trust relationship with the domain that includes the at least one affected asset.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless mobile communication device asset. When a request to perform an operation affecting at least one of the assets is received, it is determined whether the request is permitted by the domain that includes the at least one affected asset, by determining whether the entity with which the request originated has a trust relationship with the domain, for example. The operation is completed where it is permitted by the domain. Wireless mobile communication device assets include software applications, persistent data, communication pipes, and configuration data, properties or user or subscriber profiles.
201 Citations
20 Claims
-
1. A system of securely controlling a wireless mobile communication device, comprising:
-
a plurality of domains residing on a wireless mobile communication device, each domain including an asset of the wireless mobile communication device; and
a domain controller configured to receive a request to perform an operation affecting at least one of the assets, to determine whether the request originated with an entity that has a trust relationship with the domain that includes the at least one affected asset, and to permit completion of the operation where the request originated with an entity that has a trust relationship with the domain that includes the at least one affected asset. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for secure control of a wireless mobile communication device, comprising:
-
segregating assets of the wireless mobile communication device into a plurality of domains, each domain including at least one asset of the wireless mobile communication device;
receiving a request to perform an operation affecting at least one of the assets;
determining whether the operation is permitted by the domain that includes the affected asset; and
allowing the operation to be completed where the operation is permitted by the domain that includes the affected asset. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification