System and method for securely managing data stored on mobile devices, such as enterprise mobility data
First Claim
Patent Images
1. A method for providing user access to data stored within a mobile device under enterprise mobility management, the method comprising:
- receiving a request from a user to access data stored under enterprise mobility management parameters,wherein the enterprise mobility management parameters include information that helps identify the desired security level for a particular type of data;
reviewing an access policy to determine one or more security measures to implement,wherein the access policy is selected from multiple access policies and wherein the access policy relates characteristics associated with the mobile device to security measures established by an employer of multiple employees who each use a mobile device managed under the enterprise mobility management parameters;
implementing a determined security measure based on the review of the access policy; and
determining that the implemented security measure has been satisfied; and
providing the user access to the data stored under the enterprise mobility management parameters.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for managing data stored on mobile devices is described. In some cases, the system stores data, such as data under enterprise mobility management, within a secured memory location of a SIM card. In some cases, the system may request validation credentials before providing access to data stored in secure locations. In some cases, the system may review an access policy and request validation based on instructions from the access policy.
-
Citations
21 Claims
-
1. A method for providing user access to data stored within a mobile device under enterprise mobility management, the method comprising:
-
receiving a request from a user to access data stored under enterprise mobility management parameters, wherein the enterprise mobility management parameters include information that helps identify the desired security level for a particular type of data; reviewing an access policy to determine one or more security measures to implement, wherein the access policy is selected from multiple access policies and wherein the access policy relates characteristics associated with the mobile device to security measures established by an employer of multiple employees who each use a mobile device managed under the enterprise mobility management parameters; implementing a determined security measure based on the review of the access policy; and determining that the implemented security measure has been satisfied; and providing the user access to the data stored under the enterprise mobility management parameters. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-readable medium whose contents cause a mobile device to perform a method of determining whether a user is authorized to access contents stored within the mobile device, the method comprising:
-
receiving a request from a user to access content stored within the mobile device; determining that the requested content is stored within a secure memory component contained by a subscriber identity module within the mobile device; performing an action to determine whether the user is an authorized user; denying access to the requested content when the performed action determines that the user is not an authorized user; and removing the requested content from the mobile device in response to the determination that the user is not an authorized user. - View Dependent Claims (12, 13)
-
-
14. A system for providing user access to data stored within a mobile device under enterprise mobility management, the system comprising:
-
means for receiving a request from a user to access data stored under enterprise mobility management parameters, wherein the enterprise mobility management parameters include information that helps identify the desired security level for a particular type of data; means for reviewing an access policy to determine one or more security measures to implement, wherein the access policy is selected from multiple access policies and wherein the access policy relates characteristics associated with the mobile device to security measures established by an employer of multiple employees who each use a mobile device managed under the enterprise mobility management parameters; means for implementing a determined security measure based on the review of the access policy; and means for determining that the implemented security measure has been satisfied; and means for providing the user access to the data stored under the enterprise mobility management parameters. - View Dependent Claims (15, 16, 17)
-
-
18. A system for determining whether a user is authorized to access contents stored within a mobile device, the system comprising:
-
means for receiving a request from a user to access content stored within the mobile device; means for determining that the requested content is stored within a secure memory component contained by a subscriber identity module within the mobile device; means for performing an action to determine whether the user is an authorized user; means for denying access to the requested content when the performed action determines that the user is not an authorized user; and means for removing the requested content from the mobile device in response to the determination that the user is not an authorized user. - View Dependent Claims (19, 20, 21)
-
Specification