Policy-Based Application Management
First Claim
1. A method comprising:
- receiving, by processing circuitry of an electronic mobile device, a copy command;
encrypting, by the processing circuitry and in response to the copy command, original data from a first secure application to form encrypted data; and
writing, by the processing circuitry and in response to the copy command, the encrypted data to a secure clipboard residing in memory of the electronic mobile device to enable a second secure application to subsequently read and decrypt the encrypted data from the secure clipboard, the secure clipboard residing at a location of the memory which is different than that of a general clipboard residing in the memory, the general clipboard being accessible by a set of unsecure applications running on the electronic mobile device.
7 Assignments
0 Petitions
Accused Products
Abstract
Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user'"'"'s own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.
116 Citations
20 Claims
-
1. A method comprising:
-
receiving, by processing circuitry of an electronic mobile device, a copy command; encrypting, by the processing circuitry and in response to the copy command, original data from a first secure application to form encrypted data; and writing, by the processing circuitry and in response to the copy command, the encrypted data to a secure clipboard residing in memory of the electronic mobile device to enable a second secure application to subsequently read and decrypt the encrypted data from the secure clipboard, the secure clipboard residing at a location of the memory which is different than that of a general clipboard residing in the memory, the general clipboard being accessible by a set of unsecure applications running on the electronic mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
receiving, by a processor of an electronic mobile device, a managed application from an application server during a first communication, the managed application being constructed to operate in accordance with a set of one or more policy files; receiving, by the processor, the set of one or more policy files from the application server during a second communication which is different than the first communication, the set of one or more policy files being stored on the electronic mobile device separately from the managed application; and running, by the processor, the managed application on the mobile device, the managed application operating in accordance with the set of one or more policy files, wherein one of the policy files defines when the managed application may access a secure encrypted clipboard, and further defines when the managed application may access a general clipboard, wherein the secure encrypted clipboard resides at a location of memory of the electronic mobile device which is different than that of the general clipboard, the general clipboard being accessible by a set of unsecure applications running on the electronic mobile device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. One or more non-transitory computer readable media storing computer readable instructions that, when executed by an electronic mobile device having a memory, cause the device to perform:
-
receiving, by the processing circuitry, a copy command; encrypting, by the processing circuitry and in response to the copy command, original data from a first secure application to form encrypted data; and writing, by the processing circuitry and in response to the copy command, the encrypted data to a secure clipboard residing in the memory to enable a second secure application to subsequently read and decrypt the encrypted data from the secure clipboard, the secure clipboard residing at a location of the memory which is different than that of a general clipboard residing in the memory, the general clipboard being accessible by a set of unsecure applications running on the electronic mobile device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification