SECURITY MANAGEMENT SYSTEM AND METHOD FOR LOCATION-BASED MOBILE DEVICE
First Claim
1. A method for managing information security for a mobile device in a restricted area, based on location information regarding the mobile device, the method comprising:
- receiving, by the mobile device, a request for the execution of an application program in a restricted area from a server managing the restricted area;
executing, by the mobile device, the application program requested for execution when the program is set to be executable according to a security policy set to the restricted area;
encrypting, by the mobile device, a file, created according to the execution of the application program, based on location information regarding the mobile device; and
storing the encrypted file.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and a system of managing information security for a mobile device in a restricted area based on location information regarding the mobile device are provided. The method includes receiving, by the mobile device, a request for the execution of an application program in a restricted area from a server managing the restricted area, executing, by the mobile device, the application program requested for execution when the program was set to be executable according to a security policy set to the restricted area, encrypting, by the mobile device, a file, created according to the execution of the application program, based on location information regarding the mobile device, and storing the encrypted file.
-
Citations
16 Claims
-
1. A method for managing information security for a mobile device in a restricted area, based on location information regarding the mobile device, the method comprising:
-
receiving, by the mobile device, a request for the execution of an application program in a restricted area from a server managing the restricted area; executing, by the mobile device, the application program requested for execution when the program is set to be executable according to a security policy set to the restricted area; encrypting, by the mobile device, a file, created according to the execution of the application program, based on location information regarding the mobile device; and storing the encrypted file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A location information-based security management system, the system comprising:
-
a Radio Frequency (RF) communication unit for performing RF communication with a server managing a restricted area; a storage unit for storing a security policy set for the restricted area transmitted from the server and a file created according to the execution of an application program; and a controller, wherein the controller; receives a request for the execution of the application program in a restricted area from the server, and determines whether the application program is set to be executable in the restricted area according to the security policy; executes the application program when the application program is set to be executable according to the security policy; encrypts a file, created according to the execution of the application program, based on location information regarding the mobile device; and stores the encrypted file. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification