Policy-based dynamic information flow control on mobile devices
First Claim
1. A method operative on a mobile device to enforce an enterprise policy, the mobile device including a hardware element and being configured to execute both enterprise and personal applications, the enterprise policy configured to prevent enterprise data from being leaked to a personal application running in the mobile device, comprising:
- receiving and storing in a data store an enterprise policy defining a permitted run-time execution context when multiple applications execute concurrently on the mobile device;
responsive to an application seeking access to enterprise data stored in the mobile device, retrieving the enterprise policy, together with a list of applications currently running on the mobile device;
determining, based at least in part on the list of applications currently running on the mobile device, whether the run-time execution context identified in the enterprise policy is satisfied;
when the run-time execution context identified in the enterprise policy is satisfied, releasing to the application sensory data captured from a user input to the mobile device and enabling the application to access the enterprise data;
wherein at least the determining step is carried out in software executing in a hardware element.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for securing data on a mobile device that supports both enterprise and personal applications. According to the method, information flows and data accesses are tracked on the device at run-time to enable access control decisions to be performed based on a policy, such as an enterprise privacy policy that has been distributed to the device from an enterprise server. The policy may be updated by events at the device as well as at the enterprise server.
-
Citations
7 Claims
-
1. A method operative on a mobile device to enforce an enterprise policy, the mobile device including a hardware element and being configured to execute both enterprise and personal applications, the enterprise policy configured to prevent enterprise data from being leaked to a personal application running in the mobile device, comprising:
-
receiving and storing in a data store an enterprise policy defining a permitted run-time execution context when multiple applications execute concurrently on the mobile device; responsive to an application seeking access to enterprise data stored in the mobile device, retrieving the enterprise policy, together with a list of applications currently running on the mobile device; determining, based at least in part on the list of applications currently running on the mobile device, whether the run-time execution context identified in the enterprise policy is satisfied; when the run-time execution context identified in the enterprise policy is satisfied, releasing to the application sensory data captured from a user input to the mobile device and enabling the application to access the enterprise data; wherein at least the determining step is carried out in software executing in a hardware element. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification