SECURING DATA USAGE IN COMPUTING DEVICES
First Claim
Patent Images
1. A computer storage medium having computer readable instructions stored thereupon that, when executed by a computer, cause the computer to:
- receive a definition for a policy configured to control access to data on a computing device;
store the policy; and
send the policy to the computing device, whereat access to the data is controlled in accordance with the policy.
2 Assignments
0 Petitions
Accused Products
Abstract
Policies are applied to specific data rather than to an entire computing device that contains the specific data. Access to the specific data is controlled by the policies utilizing various password or other authentication credential requirements, selective data caching, data transmission, temporary data storage, and/or pre-defined conditions under which the specific data is to be erased or rendered inaccessible. Policies may be defined by an administrator and pushed to a mobile computing device, whereat the policies are enforced.
-
Citations
20 Claims
-
1. A computer storage medium having computer readable instructions stored thereupon that, when executed by a computer, cause the computer to:
-
receive a definition for a policy configured to control access to data on a computing device; store the policy; and send the policy to the computing device, whereat access to the data is controlled in accordance with the policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer storage medium having computer readable instructions stored thereupon that, when executed by a computer, cause the computer to:
-
receive a policy; receive a request for specific data associated with the policy; and allow or deny access to the specific data in accordance with the policy. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A mobile computing device, comprising:
-
a processor; and a memory in communication with the processor, the memory comprising instructions stored thereupon which, when executed by the processor, cause the processor to store personal data associated with a user of the mobile computing device; store enterprise data associated with an enterprise; store one or more policies, each of which comprises instructions for at least one of controlling access to the enterprise data and handling of the enterprise data; receive a data request for at east a portion of the enterprise data; and selectively allow access to the portion of the enterprise data in accordance with the one or more policies without inhibiting access to the personal data.
-
Specification