System and method for protecting data in a synchronized environment
First Claim
Patent Images
1. A system comprising:
- a mobile device configured to run first and second applications, each of the first and second applications configured to run on the mobile device and provide a user-interactive interface that allows a user of the mobile device to interactively operate each of the applications; and
an agent configured to provide first and second authentication procedures that are independently or combinably assignable to the first and second applications and are configured to gather first and second authentication data from the mobile device and prevent access to first and second application data associated respectively with the first and second applications prior to authentication;
wherein the agent grants access to the first application data by authenticating the gathered first authentication data through the first authentication procedure to authenticate the mobile device to the first application; and
wherein the agent grants access to the second application data by authenticating the gathered first and second authentication data through both the first authentication procedure and the second authentication procedure, respectively, to authenticate the mobile device to the second application.
7 Assignments
0 Petitions
Accused Products
Abstract
A system includes a mobile device providing a plurality of applications and an agent providing first and second authentication procedures for authenticating a user of the mobile device to first and second applications running on the mobile device. A first application is enabled by authenticating a user through a first authentication procedure, and a second application is enabled by authenticating a user through a second authentication procedure. The agent authenticates the user to the first application following the first authentication procedure, and the agent authenticates the user to the second application following the second authentication procedure.
-
Citations
21 Claims
-
1. A system comprising:
-
a mobile device configured to run first and second applications, each of the first and second applications configured to run on the mobile device and provide a user-interactive interface that allows a user of the mobile device to interactively operate each of the applications; and an agent configured to provide first and second authentication procedures that are independently or combinably assignable to the first and second applications and are configured to gather first and second authentication data from the mobile device and prevent access to first and second application data associated respectively with the first and second applications prior to authentication; wherein the agent grants access to the first application data by authenticating the gathered first authentication data through the first authentication procedure to authenticate the mobile device to the first application; and wherein the agent grants access to the second application data by authenticating the gathered first and second authentication data through both the first authentication procedure and the second authentication procedure, respectively, to authenticate the mobile device to the second application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A wireless network comprising:
-
a server; a mobile device for communicating with the server, the mobile device configured to run a plurality of applications each configured to receive application data from the server and provide a user-interactive interface that allows a user of the mobile device to interactively operate each application; and an agent configured to provide a plurality of authentication procedures that are independently or combinably assignable to the plurality of applications and are configured to gather authentication data from the mobile device and prevent access to the application data prior to authentication; wherein the agent authenticates access to the application data for each of the plurality of applications based on the authentication data using a boolean logic combination criterion of more than one of the plurality of authentication procedures different from a boolean logic combination criterion associated with any of the other of the plurality of applications. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A method for authenticating a mobile device to a mobile communications network, the method comprising:
-
providing a mobile device configured to communicate with one or more servers; providing a plurality of authentication procedures independently or combinably assignable to a plurality of applications, the plurality of applications provided by at least one of the mobile device and the one or more servers and each configured to run on the mobile device and provide a user-interactive interface that allows a user of the mobile device to interactively operate the application, wherein the plurality of authentication procedures are configured to gather authentication data from the mobile device and prevent access to application data associated with the plurality of applications prior to authentication; and associating each of the plurality of applications with one or more of the plurality of authentication procedures; wherein each of the plurality of authentication procedures is configured to obtain authentication of the authentication data from the one or more servers to allow access to the application data. - View Dependent Claims (20, 21)
-
Specification