Method and system for secure synchronization between an enterprise system and a device
First Claim
Patent Images
1. A method for synchronizing a device with an enterprise system comprising:
- storing at least one first security parameter generated as a function of a verified application code at a network node;
receiving an identifier of a device requesting synchronization, an application identifier and at least one second security parameter from the device, the second security parameter generated as a function of code corresponding to an application running on the device;
if the first security parameter matches the second security parameter, performing a synchronization process with the device; and
, if the first security parameter does not match the second security parameter, denying a synchronization process with the device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for secure synchronization between an enterprise system such as an ERP system and a mobile device. Before synchronization is allowed, a verified security parameter corresponding to a verified application is compared with a device security parameter representing an application running on the device
-
Citations
16 Claims
-
1. A method for synchronizing a device with an enterprise system comprising:
- storing at least one first security parameter generated as a function of a verified application code at a network node;
receiving an identifier of a device requesting synchronization, an application identifier and at least one second security parameter from the device, the second security parameter generated as a function of code corresponding to an application running on the device;
if the first security parameter matches the second security parameter, performing a synchronization process with the device; and
,if the first security parameter does not match the second security parameter, denying a synchronization process with the device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
- storing at least one first security parameter generated as a function of a verified application code at a network node;
-
8. A system for synchronizing a device with an enterprise system comprising:
-
a database, the database storing;
at least one device identifier;
at least one application identifier;
at least one verified security parameter;
wherein each verified security parameter is associated with an application identifier; and
,a processor, the processor configured to;
receive a device identifier, an application identifier and at least one device security parameter from the device, the device security parameter generated as a function of code corresponding to an application running on the device;
determine a corresponding verified security parameter from the database as a function of the application identifier and the device identifier;
if the determined verified security parameter matches the device security parameter, perform a synchronization process with the device; and
,if the determined verified security parameter does not match the device security parameter, deny a synchronization process with the device. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A system for synchronizing a mobile device with an enterprise system comprising:
-
a central synchronization point, the central synchronization point including a processor;
a central deployment console, the central deployment console including a processor;
a database, the database storing;
at least one device identifier;
at least one application identifier;
at least one verified security parameter, wherein each verified security parameter corresponds to an application identifier and a device identifier;
wherein the processor at the central synchronization point is configured to;
receive a device security parameter, an application identifier and a device identifier from a device requesting synchronization;
upon receiving the device security parameter, the application identifier and the device identifier, transmit the device security parameter, the application identifier and the device identifier to the central deployment console;
the processor at the central deployment console configured to;
receive a device security parameter, an application identifier and a device identifier from the central synchronization server;
determine a corresponding verified security parameter from the database as a function of the application identifier and the device identifier;
if the corresponding verified security parameter matches the device security parameter, transmit a signal to the central synchronization point indicating synchronization should be allowed; and
,if the corresponding verified security parameter does not match the device security parameter transmit a signal to the central synchronization point indicating synchronization should not be allowed;
- View Dependent Claims (14, 15)
-
-
16. A program storage device, the program storage device including instructions for performing synchronization between an enterprise system and a device, the instructions including:
-
storing at least one verified security parameter generated as a function of a verified application code at a network node;
receiving an identifier of a device requesting synchronization, an application identifier and at least one device security parameter from the device, the device security parameter generated as a function of code corresponding to an application running on the device;
if the verified security parameter matches the device security parameter, performing a synchronization process with the device; and
,if the verified security parameter does not match the device security parameter, denying a synchronization process with the device.
-
Specification