SYSTEM AND METHOD TO PROVIDE SERVER CONTROL FOR ACCESS TO MOBILE CLIENT DATA
First Claim
Patent Images
1. A method for protecting a data item, comprising:
- upon initiation of transfer of the data item from a server to a client device, determining a sensitivity score of the data item and a current protection level of the data item;
applying a policy to determine an appropriate protection for the data item based upon the sensitivity score and the current protection level; and
providing a protected data item to the client device by applying the appropriate protection to the data item.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for protecting a data item include, upon initiation of transfer of the data item from a server to a client device, determining a sensitivity score and a current protection level of the data item. A policy is applied to determine an appropriate protection for the data item based upon the sensitivity score and the current protection level. A protected data item is provided to the client device by applying the appropriate protection to the data item.
45 Citations
25 Claims
-
1. A method for protecting a data item, comprising:
-
upon initiation of transfer of the data item from a server to a client device, determining a sensitivity score of the data item and a current protection level of the data item; applying a policy to determine an appropriate protection for the data item based upon the sensitivity score and the current protection level; and providing a protected data item to the client device by applying the appropriate protection to the data item. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for protecting a data item, comprising:
-
upon initiation of transfer of the data item from a server to a mobile device, determining a sensitivity score of the data item and a current protection level of the data item using a data protection server; applying a policy to determine an appropriate protection for the data item using the data protection server, wherein the appropriate protection is based upon the sensitivity score, the current protection level, and features of at least one of the data item and the mobile device; and providing a protected data item to the mobile device by applying the appropriate protection to the data item using the data protection server.
-
-
15. A method for accessing a protected data item, comprising:
-
responsive to a request to access the protected data item, determining a level of confidence that a user of a client device is an authorized user of the client device to determine eligibility of the user to access the protected data item, wherein the level of confidence is based on one or more of a context of the client device, an authentication history of the client device, and an access history of the user of the client device; and in accordance with the level of confidence, providing access to the protected data item to the client device such that a level of confidence needed to access the protected data item is based upon a sensitivity score of the protected data item. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method for accessing a protected data item, comprising:
-
responsive to a request to access the protected data item, determining a level of confidence that a user of a mobile device is an authorized user of the mobile device to determine eligibility of the user to access the protected data item using a data protection server, wherein the level of confidence is based on one or more of a context of the client device, an authentication history of the client device, and an access history of the user of the client device; and in accordance with the level of confidence, providing access to the protected data item to the client device using the data protection system such that a level of confidence needed to access the protected data item is based upon sensitivity of the protected data item.
-
Specification