System and method for protecting data in a synchronized environment
First Claim
1. A system comprising:
- a mobile device for providing first and second applications; and
an agent for providing first and second authentication procedures for authenticating a user of the mobile device to the first and second applications running on the mobile device;
wherein the first application is enabled by authenticating the user through the first authentication procedure;
wherein the second application is enabled by authenticating the user through the second authentication procedure;
wherein the agent authenticates the user to the first application following the first authentication procedure; and
wherein the agent authenticates the user to the second application following the second authentication procedure.
7 Assignments
0 Petitions
Accused Products
Abstract
A system includes a mobile device providing a plurality of applications and an agent providing first and second authentication procedures for authenticating a user of the mobile device to first and second applications running on the mobile device. A first application is enabled by authenticating a user through a first authentication procedure, and a second application is enabled by authenticating a user through a second authentication procedure. The agent authenticates the user to the first application following the first authentication procedure, and the agent authenticates the user to the second application following the second authentication procedure.
45 Citations
22 Claims
-
1. A system comprising:
-
a mobile device for providing first and second applications; and
an agent for providing first and second authentication procedures for authenticating a user of the mobile device to the first and second applications running on the mobile device;
wherein the first application is enabled by authenticating the user through the first authentication procedure;
wherein the second application is enabled by authenticating the user through the second authentication procedure;
wherein the agent authenticates the user to the first application following the first authentication procedure; and
wherein the agent authenticates the user to the second application following the second authentication procedure. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A wireless network comprising:
-
a server;
a mobile device for communicating with the server, the mobile device providing a plurality of applications for receiving data from the server; and
an agent for providing a plurality of authentication procedures for authenticating a user of the mobile device to a particular one of the plurality of applications running on the mobile device;
wherein the agent authenticates each of the plurality of applications using one of the plurality of authentication procedures different from the authentication procedure used to authenticate any of the other of the plurality of applications. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A method for authenticating a user to a mobile device comprising:
-
providing one or more applications; and
assigning a plurality of authentication procedures to the one or more applications to authenticate a user of the mobile device to the one or more applications;
wherein each authentication procedure has a criterion for satisfaction; and
wherein the criterion for satisfaction of a first one of the authentication procedures changes in response to satisfaction of the criterion of a second one of the authentication procedures. - View Dependent Claims (18, 19)
-
-
20. A method for authenticating a user to a mobile communications network, the method comprising:
-
providing a server;
providing a mobile device for communicating with the server;
providing a matrix having a plurality of authentication procedures in one dimension and a plurality of applications provided by the mobile device in another dimension;
associating each of the plurality of applications provided by the mobile device with one or more of the plurality of authentication procedures of the matrix. - View Dependent Claims (21, 22)
-
Specification