Data synchronization for a secure electronic device
First Claim
Patent Images
1. A method for secure synchronization of data contained on a first device and a second device, comprising:
- establishing a device-to-device single-level secure processing state as between said first device and said second device at a first defined security access level by (a) authenticating a user, said first device, and said second device;
(b) determining an assigned security access level for said user from among a plurality of possible user security access levels; and
(c) determining if said first defined security access level at which said user requests to sign on is lesser than or equal to said assigned security access level of said user; and
synchronizing a first plurality of managed data objects stored on said first device and said second device at said first defined security access level.
3 Assignments
0 Petitions
Accused Products
Abstract
Method for synchronizing stored data in one device (102, 106, 202, 206, 210) with other devices (102, 106, 202, 206, 210) at multiple levels of security classification. The methods and systems disclosed herein can advantageously utilize unique protocols and, optionally, cryptographic technologies to effect data synchronization in a secure manner.
24 Citations
42 Claims
-
1. A method for secure synchronization of data contained on a first device and a second device, comprising:
-
establishing a device-to-device single-level secure processing state as between said first device and said second device at a first defined security access level by (a) authenticating a user, said first device, and said second device;
(b) determining an assigned security access level for said user from among a plurality of possible user security access levels; and
(c) determining if said first defined security access level at which said user requests to sign on is lesser than or equal to said assigned security access level of said user; and
synchronizing a first plurality of managed data objects stored on said first device and said second device at said first defined security access level. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
Specification