METHOD AND APPARATUS FOR PROVIDING A SECURE VIRTUAL ENVIRONMENT ON A MOBILE DEVICE
First Claim
1. A method for handling data on a mobile device, comprising:
- enabling access to a secure virtual environment on the mobile device, the secure virtual environment configured with a security policy;
enabling only trusted applications to operate within the secure virtual environment according to the security policy;
presenting a user interface with only the trusted applications;
enabling a user to manipulate data with a trusted application in the secure virtual environment;
encrypting manipulated data with the secure virtual environment before data exits the secure virtual environment; and
storing encrypted data according to the security policy.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and devices provide a secure virtual environment within a mobile device for processing documents and conducting secure activities. The methods and devices create a secure application environment in which secure data and documents may be segregated from unsecured data using document encryption, allowing the application of security policies to only the secure application environment. The creation of a secure application environment allows users to access and manipulate secure data on any mobile device, not just specifically designated secure devices, without having to secure all data on the mobile device, while providing the corporate entity with necessary document security. The methods and devices provide for securing data on a mobile device at the data level using encryption.
111 Citations
76 Claims
-
1. A method for handling data on a mobile device, comprising:
-
enabling access to a secure virtual environment on the mobile device, the secure virtual environment configured with a security policy; enabling only trusted applications to operate within the secure virtual environment according to the security policy; presenting a user interface with only the trusted applications; enabling a user to manipulate data with a trusted application in the secure virtual environment; encrypting manipulated data with the secure virtual environment before data exits the secure virtual environment; and storing encrypted data according to the security policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A mobile device, comprising:
-
a memory; and a processor coupled to the memory, wherein the processor is configured with processor-executable instructions to perform operations comprising; enabling access to a secure virtual environment on the mobile device, the secure virtual environment configured with a security policy; enabling only trusted applications to operate within the secure virtual environment according to the security policy; presenting a user interface with only the trusted applications; enabling a user to manipulate data with a trusted application in the secure virtual environment; encrypting manipulated data with the secure virtual environment before data exits the secure virtual environment; and storing encrypted data in the memory according to the security policy. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A mobile device, comprising:
-
means for means for enabling access to a secure virtual environment on the mobile device, the secure virtual environment configured with a security policy; means for enabling only trusted applications to operate within the secure virtual environment according to the security policy; means for presenting a user interface with only the trusted applications; means for enabling a user to manipulate data with a trusted application in the secure virtual environment; means for encrypting manipulated data with the secure virtual environment before data exits the secure virtual environment; and means for storing encrypted data according to the security policy. - View Dependent Claims (40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57)
-
-
58. A non-transitory processor-readable medium having stored thereon processor-executable instructions configured to cause a mobile device processor to perform operations comprising:
-
enabling access to a secure virtual environment on the mobile device, the secure virtual environment configured with a security policy; enabling only trusted applications to operate within the secure virtual environment according to the security policy; presenting a user interface with only the trusted applications; enabling a user to manipulate data with a trusted application in the secure virtual environment; encrypting manipulated data with the secure virtual environment before data exits the secure virtual environment; and storing encrypted data in memory according to the security policy. - View Dependent Claims (59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76)
-
Specification