PROTECTION OF RESOURCES DOWNLOADED TO PORTABLE DEVICES FROM ENTERPRISE SYSTEMS
First Claim
1. A method of protecting resources hosted on enterprise systems, said method being performed at least in part by an enterprise system, said method comprising:
- receiving a request from a portable device to download a resource of said resources;
formulating a plurality of security actions and a plurality of conditions for said resource, wherein each security action is associated with a corresponding condition of said plurality of conditions;
sending to said portable device, said resource, said plurality of security actions and said plurality of conditions;
determining whether each of said plurality of conditions is satisfied in said portable device; and
performing the security action associated with a condition determined to have been satisfied.
1 Assignment
0 Petitions
Accused Products
Abstract
An aspect of the present invention provides for protection of resources hosted on enterprise systems. In an embodiment, an enterprise system receives a request from a portable device to download a resource, and in response formulates multiple security actions and associated conditions for the requested resource. The enterprise system sends the requested resource, the security actions and the conditions to the portable device. The portable device determines whether each condition is satisfied and performs the security actions associated with the conditions determined to have been satisfied. Due to the ability to send multiple security actions and associated conditions, better control in protection and retention of downloaded resources is obtained.
62 Citations
20 Claims
-
1. A method of protecting resources hosted on enterprise systems, said method being performed at least in part by an enterprise system, said method comprising:
-
receiving a request from a portable device to download a resource of said resources; formulating a plurality of security actions and a plurality of conditions for said resource, wherein each security action is associated with a corresponding condition of said plurality of conditions; sending to said portable device, said resource, said plurality of security actions and said plurality of conditions; determining whether each of said plurality of conditions is satisfied in said portable device; and performing the security action associated with a condition determined to have been satisfied. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computing system comprising:
-
a portable device to enable users to download resources; and an enterprise system to host said resources, said enterprise system operable to; receive a request from said portable device to download a resource of said resources; formulate a plurality of security actions and a plurality of conditions for said resource, wherein each security action is associated with a corresponding condition of said plurality of conditions; and send to said portable device, said resource, said plurality of security actions and said plurality of conditions, wherein said portable device is operable to; receive said resource, said plurality of security actions and said plurality of conditions; determine whether each of said plurality of conditions is satisfied in said portable device; and perform the security action associated with a condition determined to have been satisfied. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory machine readable medium storing one or more sequences of instructions for causing a portable device to provide protection of resources downloaded from enterprise systems, wherein execution of said one or more sequences of instructions by one or more processors contained in said portable device causes said portable device to perform the actions of:
-
receiving from a user, a request to download a resource of said resources; forwarding said request to an enterprise system hosting said resource; downloading from said enterprise system, said resource and a metadata, said metadata specifying a plurality of security actions and a plurality of conditions for said resource, wherein each security action is associated with a corresponding condition of said plurality of conditions; determining whether each of said plurality of conditions is satisfied in said portable device; and performing the security action associated with a condition determined to have been satisfied prior to permitting access to said resource. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification