Access control to files based on source information
First Claim
1. A method for making data accessible by a mobile computing device, the method comprising the steps of:
- determining a location of the mobile computing device;
receiving a request to access a file;
determining source information for the file; and
allowing access to the file based on the determined location and the determined source information.
16 Assignments
0 Petitions
Accused Products
Abstract
The present invention is a security tool for protection of data on a mobile computing device. The security tool provides a plurality of security policies to be enforced based on source information for the data and a location associated with a network environment in which a mobile device is operating. The security tool may be either located at the mobile computing device or at the server. The security tool includes a file access module for determining whether files are visible or accessible. The file access module comprises a tag generator, an association module, and a policy enforcement module. The tag generator creates source information for the file being accessed and the policy enforcement module determines what actions, if any, can be performed on the file and under what conditions such as location and network environment, type of file and other factors.
339 Citations
21 Claims
-
1. A method for making data accessible by a mobile computing device, the method comprising the steps of:
-
determining a location of the mobile computing device;
receiving a request to access a file;
determining source information for the file; and
allowing access to the file based on the determined location and the determined source information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for making a file visible on a mobile computing device, the method comprising the steps of:
-
determining a location of the mobile computing device;
retrieving a file name for the file;
determining source information for the file; and
making the file visible on the mobile computing device based on the determined location and the determined source information. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. An apparatus for protection of data accessible by a mobile computing device, the apparatus comprising:
-
a tag generator for generating source information for a file in response to a request for access to the file, the source information including a file name, a source address and privilege information;
an association module for managing a name space and providing an unique identification number that identifies a file in response to a signal from the tag generator, the association module coupled to the tag generator; and
a controller coupled to the tag generator and the association module, the controller coupled to a policy enforcement module to provide source information useable by the policy enforcement module to control access to the file. - View Dependent Claims (19, 20, 21)
-
Specification