Policy-based dynamic information flow control on mobile devices
First Claim
Patent Images
1. Apparatus associated with a mobile device that is configured to execute both enterprise applications and personal applications, comprising:
- a processor;
computer memory holding computer program instructions executed by the processor to enforce an enterprise policy configured to prevent enterprise data from being leaked to a personal application running in the mobile device, the computer program instructions comprising;
program code to receive and store an enterprise policy defining a permitted run-time execution context when multiple applications execute concurrently on the mobile device;
program code responsive to an application seeking access to enterprise data stored in the mobile device to retrieve the enterprise policy, together with a list of applications currently running on the mobile device;
program code to determine, based at least in part on the retrieved list of applications currently running on the mobile device, whether the run-time execution context identified in the enterprise policy is satisfied;
program code to release to the application sensory data captured from a user input to the mobile device and to enable the application to access the enterprise data when the run-time execution context identified in the enterprise policy is satisfied.
1 Assignment
0 Petitions
Accused Products
Abstract
A system is provided for securing data on a mobile device that supports both enterprise and personal applications. According to the technique, information flows and data accesses are tracked on the device at run-time to enable access control decisions to be performed based on a policy, such as an enterprise privacy policy that has been distributed to the device from an enterprise server. The policy may be updated by events at the device as well as at the enterprise server.
27 Citations
15 Claims
-
1. Apparatus associated with a mobile device that is configured to execute both enterprise applications and personal applications, comprising:
-
a processor; computer memory holding computer program instructions executed by the processor to enforce an enterprise policy configured to prevent enterprise data from being leaked to a personal application running in the mobile device, the computer program instructions comprising; program code to receive and store an enterprise policy defining a permitted run-time execution context when multiple applications execute concurrently on the mobile device; program code responsive to an application seeking access to enterprise data stored in the mobile device to retrieve the enterprise policy, together with a list of applications currently running on the mobile device; program code to determine, based at least in part on the retrieved list of applications currently running on the mobile device, whether the run-time execution context identified in the enterprise policy is satisfied; program code to release to the application sensory data captured from a user input to the mobile device and to enable the application to access the enterprise data when the run-time execution context identified in the enterprise policy is satisfied. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product in a non-transitory computer readable medium for use in a mobile device data processing system, the computer program product holding computer program instructions which, when executed by the data processing system, perform a method to enforce an enterprise policy on the mobile device, the mobile device configured to execute both enterprise applications and personal applications, the method comprising:
-
receiving and storing an enterprise policy configured to prevent enterprise data from being leaked to a personal application running in the mobile device, the enterprise policy defining a permitted run-time execution context when multiple applications execute concurrently on the mobile device; responsive to an application seeking access to enterprise data stored in the mobile device, retrieving the enterprise policy, together with a list of applications currently running on the mobile device; determining, based at least in part on the retrieved list of applications currently running on the mobile device, whether the run-time execution context identified in the enterprise policy is satisfied; when the run-time execution context identified in the enterprise policy is satisfied, releasing to the application sensory data captured from a user input to the mobile device and enabling the application to access the enterprise data. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A mobile device, comprising:
-
a hardware processor; one or more data stores in which are stored;
an enterprise security policy, an enterprise application, and a personal application, the enterprise security policy configured to prevent enterprise data from being leaked to the personal application running in the mobile device, the enterprise security policy defining a permitted run-time execution context when multiple applications execute concurrently on the mobile device; anda trusted platform module executed by the hardware processor to provide run-time enforcement of the enterprise policy to restrict use of enterprise data except by the enterprise application, the run-time enforcement based at least in part on a comparison of the multiple applications defined in the enterprise security policy with a list of applications then determined to be currently running on the mobile device, the trusted platform module releasing to the enterprise application sensory data captured from a user input to the mobile device and enabling access to the enterprise data according to the enforcement policy in association with the run-time enforcement as determined by the comparison.
-
Specification