Data Security in Mobile Devices
First Claim
1. A method of securing data used by a mobile device, comprising:
- obtaining data from an application module;
encrypting said data to generate encrypted data; and
storing said encrypted data in a data store.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods for computer program products for securely storing data in a data store or in an external data store associated with a mobile device are described herein. Data that is being sent from an application module to a data store, on the mobile device or an external data store used by the mobile device is first encrypted by a security manager. The security manager encrypts data based on an encryption algorithm that may be selected by a user. Data received from an application module is thus stored in an encrypted form on a data store. When an application requests data from the data store, the security manager decrypts the data and provides the data to the application module in its decrypted form. All data that is transmitted to or received from a data store or an external data store is intercepted by the security manager for encryption and decryption respectively.
19 Citations
15 Claims
-
1. A method of securing data used by a mobile device, comprising:
-
obtaining data from an application module; encrypting said data to generate encrypted data; and storing said encrypted data in a data store. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of securely storing data in a mobile device comprising:
-
intercepting data from an application module; encrypting said intercepted data using an encryption algorithm to generate encrypted data; and storing said encrypted data in a data store. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A system for securing data used by a mobile device, comprising:
-
a data store; an application module; a security manager to encrypt data received from said application module, and to decrypt data received from said data store; and an OS process that stores and receives data from said data store. - View Dependent Claims (13, 14)
-
-
15. A computer program product having control logic stored therein, said control logic enabling a processor to securely exchange data between an application module and a data store on a mobile device, said control logic comprising;
-
instantiating means for enabling a processor to instantiate a security manager for each process in said mobile device; encrypting means for enabling a processor to encrypt data using said security manager; and storing means for enabling a processor to store said encrypted data in said data store.
-
Specification