Integration of different mobile device types with a business infrastructure
First Claim
1. A first apparatus comprising:
- at least one memory; and
at least one processor coupled to the at least one memory and configured to perform, based on instructions stored in the at least one memory;
initiating execution of a data application for a user through an operating system in response to entering a correct password;
after the correct password has been entered, detecting whether the user is allowed privileged control within the operating system;
when the allowed privileged control is detected, deleting all stored documents from an allocated storage of the data application;
when the allowed privileged control is not detected, sending a registration request to a second apparatus;
when a received registration response indicates that of the user is not associated with a specified business, deleting all stored documents from the allocated storage of the data application;
when the correct password is entered, the allowed privilege control is not detected, and the received registration response indicates that the user is associated with the specific business, receiving an alert notification when at least one document is available;
when the alert notification is selected, sending a document request for the least one document;
receiving the at least one document when the alert notification is selected;
generating a list of documents, wherein the list includes at least one entry for the at least one documents; and
when one of the documents is selected from the list, displaying said one document.
1 Assignment
0 Petitions
Accused Products
Abstract
A mobile implementation channel enables secure mobile customer alerts, content delivery, event and location awareness and context integration that can be leveraged across multiple lines of business using basic interfaces. Pushed documents may be processed by an application executing at a mobile device in a secure manner. An alert indication may be sent to the mobile device when the documents are available. The documents may then be downloaded over a secure channel if the user affirmatively responds to the alert indication and may be further encrypted and stored in an application file store. The user may subsequently select one of the documents from a document list so that the selected document may be decrypted and displayed. The stored documents in the application file store may be deleted if the operating system has been compromised, the user is not associated with a business, or the user device is lost or stolen.
33 Citations
20 Claims
-
1. A first apparatus comprising:
- at least one memory; and
at least one processor coupled to the at least one memory and configured to perform, based on instructions stored in the at least one memory;
initiating execution of a data application for a user through an operating system in response to entering a correct password;
after the correct password has been entered, detecting whether the user is allowed privileged control within the operating system;
when the allowed privileged control is detected, deleting all stored documents from an allocated storage of the data application;
when the allowed privileged control is not detected, sending a registration request to a second apparatus;
when a received registration response indicates that of the user is not associated with a specified business, deleting all stored documents from the allocated storage of the data application;
when the correct password is entered, the allowed privilege control is not detected, and the received registration response indicates that the user is associated with the specific business, receiving an alert notification when at least one document is available;
when the alert notification is selected, sending a document request for the least one document;
receiving the at least one document when the alert notification is selected;
generating a list of documents, wherein the list includes at least one entry for the at least one documents; and
when one of the documents is selected from the list, displaying said one document.
- at least one memory; and
-
2. A computer-assisted method comprising:
- for performing operations for a data application that processes at least one pushed document to a device, the method comprising;
Initiating execution of the data application for a user in response to entering a correct password;
after the correct password has been entered, determining whether the device on which an operating system is executing has been rooted, wherein the user has attained unauthorized privileged control within the operating system; and
when rooting of the device has been detected, preventing access, to all stored documents from an allocated storage of the data application when rooting of the device has not been detected, sending device registration to a computer system of a specified business;
receiving a registration response; and
when the registration response is indicative that the user is not associated with the specified business, deleting all stored documents from the allocated storage of the data application. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
- for performing operations for a data application that processes at least one pushed document to a device, the method comprising;
-
16. A first apparatus for supporting operations for a data application that processes at least one pushed document to the first apparatus, the first apparatus comprising:
- at least one memory; and
at least one processor coupled to the at least one memory and configured to perform, based on instructions stored in the at least one memory; Initiating execution of the data application for a user in response to entering a correct password;
after the correct password has been entered, determining whether the first apparatus on which an operating system is executing has been rooted, wherein the user has attained unauthorized privileged control within the operating system;
when rooting of the device has been detected, deleting all stored documents from an allocated storage of the data application;
when rooting of the first apparatus has not been detected, sending device registration to a computer system of a specified business;
receiving a registration response; and
when the registration response is indicative that the user is now associated with the specified business, deleting all stored documents from the allocated storage of the data application. - View Dependent Claims (17, 18)
- at least one memory; and
-
19. A non-transitory computer-readable storage medium storing computer-executable instructions that, when executed, cause at least one processor to perform operations for a data application that processes at least one pushed document to a device, the operations comprising:
Initiating execution of the data application for a user in response to entering a correct password;
after the correct password has been entered, determining whether the device on which an operating system is executing has been rooted, wherein the user has attained unauthorized privileged control within the operating system;
when rooting of the device has been detected, deleting all stored documents from an allocated storage of the data application;
when rooting of the device has not been detected, sending device registration to a computer system of a specified business;
receiving a registration response; and
when the registration response is indicative that the user is not associated with the specified business, deleting all store documents from the allocated storage of the data application.- View Dependent Claims (20)
Specification