System for providing mobile data security
First Claim
1. A method for providing mobile data security, comprising:
- transmitting to a client device a connection processor tool for allowing said client device to connect to a server;
establishing a connection with the client device and authenticating the connection;
transmitting to said client device an enumeration of one or more data files or an enumeration of one or more applications;
transmitting to said client device a lease key management tool to allow said client device to create a lease key using client side information and the lease key is stored in the client device'"'"'s enumeration of configuration data for an application and/or a dataset stored on the client device to control access to the application and/or dataset;
if said enumeration of one or more applications lists an application new to said client device, receiving a request for retrieval of said new application;
if said enumeration of one or more data files lists a data file new to said client device, receiving a request for retrieval of said new data file, andtransmitting to said client device the new application or the new data file in a format corresponding to said client device.
4 Assignments
0 Petitions
Accused Products
Abstract
A system transfers applications and datasets (files) from a server to a client device and assigns to each file a lease key that will expire at a specified time. A file cannot be accessed unless its lease key is validated. Upon expiration of a lease key, the client device will connect to the server to determine if the lease key may be renewed. If the lease key may be renewed, a new lease key is created and access to the associated application or dataset is restored. If the lease key may not be renewed, the file may be deleted or rendered inaccessible. If rendered inaccessible, the file may be restored in the future without having to re-transmit it from the server to the client device. The server may also revoke a lease key before it expires.
-
Citations
18 Claims
-
1. A method for providing mobile data security, comprising:
-
transmitting to a client device a connection processor tool for allowing said client device to connect to a server; establishing a connection with the client device and authenticating the connection; transmitting to said client device an enumeration of one or more data files or an enumeration of one or more applications; transmitting to said client device a lease key management tool to allow said client device to create a lease key using client side information and the lease key is stored in the client device'"'"'s enumeration of configuration data for an application and/or a dataset stored on the client device to control access to the application and/or dataset; if said enumeration of one or more applications lists an application new to said client device, receiving a request for retrieval of said new application; if said enumeration of one or more data files lists a data file new to said client device, receiving a request for retrieval of said new data file, and transmitting to said client device the new application or the new data file in a format corresponding to said client device. - View Dependent Claims (2, 3, 4, 5, 6, 14)
-
-
7. A method for providing mobile data security, comprising:
-
receiving a connection processor tool for allowing a client device to connect to a server; authenticating a connection from said client device to said server; receiving by said client device a lease key management tool to allow said client device to create a lease key using client side information and the lease key is stored in the client device'"'"'s enumeration of configuration data for an application and/or a dataset stored on the client device to control access to the application and/or data set; receiving an enumeration of one or more data files or an enumeration of one or more applications; processing said enumeration of data files or enumeration of applications; and determining whether an update of a data file or an application is required or whether retrieval of a new data file or a new application is required. - View Dependent Claims (8, 9, 10, 11, 12, 13, 15, 16)
-
-
17. The method of 7, wherein the step of processing said enumeration of data files or enumeration of applications comprises:
-
if an earlier version of a data file or an earlier version of an application listed in the enumeration exists in said client device, transmitting a request for an update of a data file or an application; and if an update of an application or data file is successfully received, creating a new lease key for the application or data file updated. - View Dependent Claims (18)
-
Specification