System and method of data security in synchronizing data with a wireless device
First Claim
Patent Images
1. A wireless device, comprising:
- a client application;
a first database configured to store data for access by the client application;
a second database configured to store data in an encrypted format;
a replicator for synchronizing the data stored in the first database with encrypted data stored in the second database; and
a synchronizer for synchronizing the encrypted data stored in the second database with data stored in a server,the wireless device being configured to operate selectively in a plurality of security levels,wherein the wireless device is configured such that, when operating in a first security level of the plurality of security levels, the synchronizer synchronizes the encrypted data stored in the second database with the data stored in the server, and access by the client application to data stored in the first database is restricted.
9 Assignments
0 Petitions
Accused Products
Abstract
A system is disclosed. The system includes a server, a client application, and a first database. The first database is associated with the client application. The system further includes a second database to store data in an encrypted format, and a replicator to synchronize the data stored in the first and second databases. The system also includes a synchronizer to synchronize the data stored in the second database and the server based on a current security level.
114 Citations
18 Claims
-
1. A wireless device, comprising:
-
a client application; a first database configured to store data for access by the client application; a second database configured to store data in an encrypted format; a replicator for synchronizing the data stored in the first database with encrypted data stored in the second database; and a synchronizer for synchronizing the encrypted data stored in the second database with data stored in a server, the wireless device being configured to operate selectively in a plurality of security levels, wherein the wireless device is configured such that, when operating in a first security level of the plurality of security levels, the synchronizer synchronizes the encrypted data stored in the second database with the data stored in the server, and access by the client application to data stored in the first database is restricted. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a server configured to store data; and a wireless device communicatively coupled to the server, the wireless device, including; a client application; a first database configured to store data for access by the client application; a second database configured to store data in an encrypted format; a replicator for synchronizing the data stored in the first database with encrypted data stored in the second database; and a synchronizer for synchronizing the encrypted data stored in the second database with the data stored in the server, the wireless device being configured to operate selectively in a plurality of security levels, wherein the wireless device is configured such that, when operating in a first security level of the plurality of security levels, the synchronizer synchronizes the encrypted data stored in the second database with the data stored in the server, and access by the client application to data stored in the first database is restricted. - View Dependent Claims (9)
-
-
10. A method of controlling access to data held on a wireless device, the wireless device comprising a first database and a second, different, database, the first database being configured to store data for access by a client application on the wireless device the second database being configured to store data in an encrypted format, the wireless device being configured to synchronize data stored in the first database with encrypted data stored in the second database and to synchronize encrypted data stored in the second database with data stored on a server remote from the wireless device, and the wireless device being configured to operate in a plurality of security modes, including a first security mode, the method comprising:
-
determining whether the wireless device is operating in said first security mode; and responsive to a determination that the wireless device is operating in the first security mode, configuring the wireless device so as to restrict access by the client device to data stored in the first database, and to synchronize the encrypted data in the second database with data store in the server. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer readable storage medium storing computer readable instructions thereon for execution on a wireless device to implement a method of controlling access to data stored thereon, the wireless device comprising a first database and a second, different, database, the first database being configured to store data for access by a client application on the wireless device the second database being configured to store data in an encrypted format, the wireless device being configured to synchronize data stored in the first database with encrypted data stored in the second database and to synchronize encrypted data stored in the second database with data stored on a server remote from the wireless device, and the wireless device being configured to operate in a plurality of security modes, including a first security mode, the computer-readable instructions, when executed on a processor of the wireless device, causing the processor to perform the method comprising:
-
determining whether the wireless device is operating in said first security mode; and responsive to a determination that the wireless device is operating in the first security mode, configuring the wireless device so as to restrict access by the client device to data stored in the first database, and to synchronize the encrypted data in the second database with data store in the server. - View Dependent Claims (18)
-
Specification