Method and system for policy based authentication
First Claim
Patent Images
1. A mobile device configured to perform a plurality of functions comprising:
- a memory for storing a plurality of different security policies, wherein each of the plurality of different security policies has a corresponding security requirement, wherein each of the plurality of functions has an associated security policy, wherein each security requirement requires either authentication or encryption of data associated with the function of the corresponding security policy;
an input device for invoking a function from the plurality of functions by a user;
a processor for implementing a first security policy from the stored plurality of different security policies associated with the invoked function; and
a security module for requiring the user to satisfy a security requirement corresponding to the first security policy, before the invoked function is performed by the mobile device.
5 Assignments
0 Petitions
Accused Products
Abstract
A mobile device capable of performing a plurality of functions. The mobile device includes a memory for storing a plurality of different security policies; an input device for invoking a function from the plurality of functions by a user; a processor for assigning a first security policy from the stored plurality of security policies to the invoked function; and a security module for requiring the user to satisfy the assigned first security policy, before the invoked function is performed by the mobile device.
22 Citations
36 Claims
-
1. A mobile device configured to perform a plurality of functions comprising:
-
a memory for storing a plurality of different security policies, wherein each of the plurality of different security policies has a corresponding security requirement, wherein each of the plurality of functions has an associated security policy, wherein each security requirement requires either authentication or encryption of data associated with the function of the corresponding security policy; an input device for invoking a function from the plurality of functions by a user; a processor for implementing a first security policy from the stored plurality of different security policies associated with the invoked function; and a security module for requiring the user to satisfy a security requirement corresponding to the first security policy, before the invoked function is performed by the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 35, 36)
-
-
12. A method for data security of a mobile device configured to perform a plurality of functions, the method comprising:
-
storing a plurality of different security policies, wherein each of the plurality of different security policies has a corresponding security requirement, wherein each of the plurality of functions has an associated security policy, wherein each security requirement requires either authentication or encryption of data associated with the function of the corresponding security policy; invoking a function from the plurality of functions by a user; implementing a first security policy from the stored plurality of different security policies associated with the invoked function; and requiring the user to satisfy a security requirement corresponding to the first security policy, before the invoked function is performed by the mobile device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A mobile device configured to perform a plurality of functions comprising:
-
a memory for storing a three-dimensional matrix of security policies, wherein the three-dimensional matrix includes a plurality of security requirements as a first dimension, a plurality of functions as a second dimension, and a plurality of locations for the mobile device as a third dimension, wherein each security requirement requires either authentication or encryption of data associated with the associated function to execute the associated function; an input device for invoking a function from the plurality of functions by a user; a processor for implementing a security requirement from the stored three-dimensional matrix based on the invoked function and the location of the mobile device; and a security module for requiring the user to satisfy the implemented security requirement, before the invoked function is performed by the mobile device. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. A method for data security of a mobile device configured to perform a plurality of functions, the method comprising:
-
storing, on the mobile device, a three-dimensional matrix of security policies, wherein the three-dimensional matrix includes a plurality of security requirements as a first dimension, a plurality of functions as a second dimension, and a plurality of locations for the mobile device as a third dimension, wherein each security requirement requires either authentication or encryption of data associated with the associated function to execute the associated function; invoking, on the mobile device, a function from the plurality of functions by a user; implementing, on the mobile device, a security requirement from the stored three-dimensional matrix based on the invoked function and the location of the mobile device; and requiring, on the mobile device, the user to satisfy the implemented security requirement, before the invoked function is performed by the mobile device. - View Dependent Claims (29, 30, 31)
-
-
32. A mobile device configured to perform a plurality of functions comprising:
-
means for storing a plurality of different security policies, wherein each of the plurality of different security policies has a corresponding security requirement, wherein each of the plurality of functions has an associated security policy, wherein each security requirement requires either authentication or encryption of data associated with the function of the corresponding security policy; means for invoking a function from the plurality of functions by a user; means for implementing a first security policy from the stored plurality of security policies associated with the invoked function; and means for requiring the user to satisfy a security requirement corresponding to the implemented first security policy, before the invoked function is performed by the mobile device.
-
-
33. A mobile device configured to perform a plurality of functions comprising:
-
means for storing a three-dimensional matrix of security policies, wherein the three-dimensional matrix includes a plurality of security requirements as a first dimension, a plurality of functions as a second dimension, and a plurality of locations for the mobile device as a third dimension, wherein each security requirement requires either authentication or encryption of data associated with the associated function to execute the associated function; means for invoking a function from the plurality of functions by a user; means for implementing a security requirement from the stored three-dimensional matrix based on the invoked function and the location of the mobile device; and means for requiring the user to satisfy the implemented security requirement, before the invoked function is performed by the mobile device.
-
-
34. A mobile device configured to perform a plurality of functions comprising:
-
a memory for storing a plurality of different security policies, wherein the plurality of different security policies associate each of the plurality of functions to a security requirement, each security requirement requiring either authentication or encryption; an input device for invoking a function from the plurality of functions by a user; and a security module for authorizing the user to invoke the function only after satisfying a security requirement associated with the function by either authenticating the user or encrypting data associated with the function.
-
Specification