System and method of data security in synchronizing data with a wireless device
First Claim
Patent Images
1. A system comprising:
- a server configured to store data; and
a wireless device communicatively coupled to the server, the wireless device including;
a client application;
a first database configured to store data for access by the client application;
a second database configured to store data in an encrypted format;
a replicator for synchronizing the data stored in the first database with encrypted data stored in the second database; and
a synchronizer for synchronizing the encrypted data stored in the second database with data stored in the server,wherein when the wireless device is operating in a first security level, the synchronizer synchronizes the encrypted data stored in the second database with the data stored in the server, and the replicator synchronizes data stored in the first database with the encrypted data stored in the second database; and
when the wireless device is operating in a second security level, different to the first security level, the synchronizer synchronizes the encrypted data stored in the second database with the data stored in the server, and access by the client application to data stored in the first database is restricted.
9 Assignments
0 Petitions
Accused Products
Abstract
A system is disclosed. The system includes a server, a client application, and a first database. The first database is associated with the client application. The system further includes a second database to store data in an encrypted format, and a replicator to synchronize the data stored in the first and second databases. The system also includes a synchronizer to synchronize the data stored in the second database and the server based on a current security level.
-
Citations
26 Claims
-
1. A system comprising:
-
a server configured to store data; and a wireless device communicatively coupled to the server, the wireless device including; a client application; a first database configured to store data for access by the client application; a second database configured to store data in an encrypted format; a replicator for synchronizing the data stored in the first database with encrypted data stored in the second database; and a synchronizer for synchronizing the encrypted data stored in the second database with data stored in the server, wherein when the wireless device is operating in a first security level, the synchronizer synchronizes the encrypted data stored in the second database with the data stored in the server, and the replicator synchronizes data stored in the first database with the encrypted data stored in the second database; and when the wireless device is operating in a second security level, different to the first security level, the synchronizer synchronizes the encrypted data stored in the second database with the data stored in the server, and access by the client application to data stored in the first database is restricted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 9)
-
-
8. A method of controlling access to data held on a wireless device, the wireless device comprising a first database and a second database, different from the first database, the second database being configured to store data in an encrypted format, the wireless device being capable of operating in a first security mode and a second, different, security mode, wherein, when operating in the first security mode, the wireless device is configured to:
-
synchronize the data stored in the first database with encrypted data stored in the second database; and synchronize encrypted data stored in the second database with data stored on a server remote from the wireless device, the method comprising; determining whether the wireless device is operating in the first security mode or the second security mode; and responsive to a determination that the wireless device is operating in the second security mode, configuring the wireless device so as to restrict access to data stored in the first database, and to synchronize the encrypted data in the second database with data stored in said server. - View Dependent Claims (10, 11, 12, 13, 14, 23, 24)
-
-
15. A wireless device comprising:
-
a client application; a first database configured to store data for access by the client application; a second database for storing data in an encrypted format; a replicator for synchronizing data stored in the first database with encrypted data stored in the second database; and a synchronizer for synchronizing the encrypted data stored in the second database with data stored in a server, the wireless device being configured such that; when the wireless device is operating in a first state, the synchronizer synchronizes the encrypted data stored in the second database with the data stored in the server, and the replicator synchronizes data stored in the first database with the encrypted data stored in the second database; and when the wireless device is operating in a second state, different to the first state, the synchronizer synchronizes the encrypted data stored in the second database with the data stored in the server, and the wireless device prevents access by the client application to the data stored in the first database. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
-
25. A computer readable storage medium storing computer readable instructions thereon for execution on a wireless device to implement a method of controlling access to data stored thereon, the wireless device comprising a first database configured to store data and a second database, different from the first database, the second database being configured to store data in an encrypted form, the wireless device being capable of operating in a first security mode and a second, different, security mode, wherein, when operating in the first security mode, the wireless device is configured to:
-
synchronize the data stored in the first database with the encrypted data stored in the second database; and synchronize the encrypted data stored in the second database with data stored on a server remote from the wireless device, the computer readable instructions, when executed on a processor of the wireless device, causing the processor to perform the method comprising; receiving an indication of a change of mode from the first to the second mode; and responsive to receipt of said indication, configuring the device so as to restrict access to data stored in the first database, and to maintain said synchronization of the encrypted data stored in the second database with data stored on the remote server. - View Dependent Claims (26)
-
Specification