ACCESS CONTROL TO FILES BASED ON SOURCE INFORMATION
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention is a security tool for protection of data on a mobile computing device. The security tool provides a plurality of security policies to be enforced based on source information for the data and a location associated with a network environment in which a mobile device is operating. The security tool may be either located at the mobile computing device or at the server. The security tool includes a file access module for determining whether files are visible or accessible. The file access module comprises a tag generator, an association module, and a policy enforcement module. The tag generator creates source information for the file being accessed and the policy enforcement module determines what actions, if any, can be performed on the file and under what conditions such as location and network environment, type of file and other factors.
38 Citations
40 Claims
-
1-21. -21. (canceled)
-
22. A method for providing security to a mobile device, comprising:
-
automatically detecting a location of a mobile device; and implementing on the mobile device a first security policy when the mobile device is located in a first location, and implementing on the mobile device a second security policy when the mobile device is located in a second location. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A mobile device comprising:
-
a memory storing a plurality of locations, each location associated with a security policy; a processor configured to; automatically detect a location of a mobile device; and implement on the mobile device a first security policy when the mobile device is located in a first location, and implement on the mobile device a second security policy when the mobile device is located in a second location. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40)
-
Specification