SYSTEM AND METHOD FOR CREATING AND ASSIGNING A POLICY FOR A MOBILE COMMUNICATIONS DEVICE BASED ON PERSONAL DATA
First Claim
1. A method comprising:
- identifying, by a mobile communications device, one or more locations for storing data on the mobile communications device;
identifying a first set of personal data stored at the one or more locations on the mobile communications device;
generating, by the mobile communications device, a policy for the mobile communications device based on an analysis of the first set of personal data;
identifying a second set of personal data stored on the mobile communications device based on the generated policy;
monitoring the second set of personal data stored on the mobile communications device; and
detecting an access of the monitored second set of personal data by an application executed on the mobile communications device.
7 Assignments
0 Petitions
Accused Products
Abstract
A system and method to create and assign a policy for a mobile communications device are disclosed. The policy may be created based on personal data associated with the mobile communications device. For example, known sources of personal data on the mobile communications device may be identified and a policy may be created based on the known personal data. The policy may then be used to identify additional personal data associated with the mobile communications device. Thus, the personal data associated with the mobile communications device may be monitored. If an application attempts to access the monitored personal data, the access will be detected.
87 Citations
20 Claims
-
1. A method comprising:
-
identifying, by a mobile communications device, one or more locations for storing data on the mobile communications device; identifying a first set of personal data stored at the one or more locations on the mobile communications device; generating, by the mobile communications device, a policy for the mobile communications device based on an analysis of the first set of personal data; identifying a second set of personal data stored on the mobile communications device based on the generated policy; monitoring the second set of personal data stored on the mobile communications device; and detecting an access of the monitored second set of personal data by an application executed on the mobile communications device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
identifying, by a mobile communications device, personal data associated with the mobile communications device; receiving at the mobile communications device, from a server, an analysis associated with the mobile communications device; generating, by the mobile communications device, a policy for the mobile communications device based on the personal data associated with the mobile communications device and the analysis received from the server; assigning the policy to the mobile communications device; monitoring data on the mobile communications device based on the policy; and detecting an access of the monitored data by an application that is executed on the mobile communications device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
identifying, by a mobile communications device, a first set of personal data stored on the mobile communications device; creating, by the mobile communications device, a policy based on the identified first set of personal data stored on the mobile communications device; identifying a second set of personal data stored on the mobile communications device based on the generated policy, wherein the second set of personal data includes the identified first set of personal data and additional personal data; monitoring the second set of personal data stored on the mobile communications device; and detecting an access of the monitored second set of personal data by at least one application executed on the mobile communications device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification