Method and apparatus for storing data on the application layer in mobile devices
First Claim
Patent Images
1. A method comprising:
- receiving a request to operate an application of a personal device;
requesting a first user identifier responsive to the request to operate;
comparing the first user identifier to a set of stored user identifiers; and
operating the application of the personal device with user-specific data corresponding to the first user identifier.
2 Assignments
0 Petitions
Accused Products
Abstract
The present embodiments provide a system and methods for encrypting and storing data in a mobile device such as a personal digital assistant. The system includes an access controller and a cryptography manager both coupled to the software applications on the mobile device. The system employs a user specific key to encrypt the user specific data. The encrypted file along with header information is stored below the application layer within the mobile system.
34 Citations
20 Claims
-
1. A method comprising:
-
receiving a request to operate an application of a personal device;
requesting a first user identifier responsive to the request to operate;
comparing the first user identifier to a set of stored user identifiers; and
operating the application of the personal device with user-specific data corresponding to the first user identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus, comprising:
-
a remote personal device including;
an operating system;
an access controller;
a cryptography manager; and
an application coupled to the access controller and the cryptography manager, the application to query the access controller for an indication of permission to execute. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A method, comprising:
-
receiving a request to operate an application of a personal device;
requesting a user identifier responsive to the request to operate;
verifying the user identifier against a set of stored user identifiers; and
;
operating the application of the personal device with user-specific data corresponding to the user identifier;
encrypting user-specific data with a user-specific key within the application;
storing user-specific data as encrypted data;
synchronizing user-specific data with a remote database;
terminating operation of the personal device responsive to a logoff request. - View Dependent Claims (18, 19, 20)
-
Specification