SYSTEM FOR PROVIDING MOBILE DATA SECURITY
4 Assignments
0 Petitions
Accused Products
Abstract
A system transfers applications and datasets (files) from a server to a client device and assigns to each file a lease key that will expire at a specified time. A file cannot be accessed unless its lease key is validated. Upon expiration of a lease key, the client device will connect to the server to determine if the lease key may be renewed. If the lease key may be renewed, a new lease key is created and access to the associated application or dataset is restored. If the lease key may not be renewed, the file may be deleted or rendered inaccessible. If rendered inaccessible, the file may be restored in the future without having to re-transmit it from the server to the client device. The server may also revoke a lease key before it expires.
36 Citations
19 Claims
-
1. (canceled)
-
2. A method for providing mobile data security, comprising:
-
transmitting to a client device a connection processor tool for allowing said client device to connect to a server; establishing a connection with the client device and authenticating the connection; transmitting to said client device an enumeration of one or more data files or an enumeration of one or more applications; if said enumeration of one or more applications lists an application new to said client device, receiving a request for retrieval of said new application; if said enumeration of one or more data files lists a data file new to said client device, receiving a request for retrieval of said new data file; and transmitting to said client device the new application or the new data file in a format corresponding to said client device. - View Dependent Claims (3, 4, 5, 6, 7, 15)
-
-
8. A method for providing mobile data security, comprising:
-
receiving a connection processor tool for allowing a client device to connect to a server; authenticating a connection from said client device to said server; receiving an enumeration of one or more data files or an enumeration of one or more applications; processing said enumeration of data files or enumeration of applications; and determining whether an update of a data file or an application is required or whether retrieval of a new data file or a new application is required. - View Dependent Claims (9, 10, 11, 12, 13, 14, 16, 17, 18, 19)
-
Specification