Integration of Different Mobile Device Types with a Business Infrastructure
First Claim
1. A first apparatus comprising:
- at least one memory; and
at least one processor coupled to the at least one memory and configured to perform, based on instructions stored in the at least one memory;
initiating execution of a data application for a user through an operating system;
detecting whether the user is allowed privileged control with the operating system;
when the allowed privileged control is detected, deleting all stored documents from an allocated storage of the data application;
when the allowed privileged control is not detected, sending a registration request to a second apparatus;
when a received registration response indicates at least one of the user not being associated with a specified business, the first apparatus being lost, and the first apparatus being stolen, deleting all stored documents from the allocated storage of the data application;
receiving an alert notification when at least one document is available;
when the alert notification is selected, sending a document request for the least one document;
receiving the at least one document when the alert notification is selected;
generating a list of documents, wherein the list includes at least one entry for the at least one documents; and
when one of the documents is selected from the list, displaying said one document.
1 Assignment
0 Petitions
Accused Products
Abstract
A mobile implementation channel enables secure mobile customer alerts, content delivery, event and location awareness and context integration that can be leveraged across multiple lines of business using basic interfaces. Pushed documents may be processed by an application executing at a mobile device in a secure manner. An alert indication may be sent to the mobile device when the documents are available. The documents may then be downloaded over a secure channel if the user affirmatively responds to the alert indication and may be further encrypted and stored in an application file store. The user may subsequently select one of the documents from a document list so that the selected document may be decrypted and displayed. The stored documents in the application file store may be deleted if the operating system has been compromised, the user is not associated with a business, or the user device is lost or stolen.
21 Citations
21 Claims
-
1. A first apparatus comprising:
-
at least one memory; and at least one processor coupled to the at least one memory and configured to perform, based on instructions stored in the at least one memory; initiating execution of a data application for a user through an operating system; detecting whether the user is allowed privileged control with the operating system; when the allowed privileged control is detected, deleting all stored documents from an allocated storage of the data application; when the allowed privileged control is not detected, sending a registration request to a second apparatus; when a received registration response indicates at least one of the user not being associated with a specified business, the first apparatus being lost, and the first apparatus being stolen, deleting all stored documents from the allocated storage of the data application; receiving an alert notification when at least one document is available; when the alert notification is selected, sending a document request for the least one document; receiving the at least one document when the alert notification is selected; generating a list of documents, wherein the list includes at least one entry for the at least one documents; and when one of the documents is selected from the list, displaying said one document.
-
-
2. A computer-assisted method comprising:
-
initiating, by a first computer system, execution of a data application for a user; determining whether an operating system executing on the first computer system has been compromised; and when the operating system is detected as being compromised, preventing access, by the first computer system, to all stored documents from an allocated storage of the data application. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A first apparatus comprising:
-
at least one memory; and at least one processor coupled to the at least one memory and configured to perform, based on instructions stored in the at least one memory; initiating execution of a data application for a user; determining whether an operating system executing on the first apparatus has been compromised; and when the operating system is detected as being compromised, deleting all stored documents from an allocated storage of the data application. - View Dependent Claims (18, 19)
-
-
20. A non-transitory computer-readable storage medium storing computer-executable instructions that, when executed, cause at least one processor to perform operations comprising:
-
initiating execution of a data application for a user; determining whether an operating system executing on the at least one processor has been compromised; when the operating system is detected as being compromised, deleting all stored documents from an allocated storage of the data application; when the operating system is not detected as being compromised, sending device registration to a computer system of a specified business; receiving a registration response; and when the registration response is indicative of at least one of the user not being associated with the specified business, a user device being lost, and the user device being stolen, deleting all stored documents from the allocated storage of the data application. - View Dependent Claims (21)
-
Specification