Methods and systems for implementing security policies on a mobile device
First Claim
Patent Images
1. A wireless device comprising:
- a non-volatile memory comprising a designation of a security type hard-coded in the non-volatile memory; and
a processor coupled to the non-volatile memory, the processor being configured to execute computer-readable instructions to cause the wireless device to;
determine, based on the security type, whether a received security policy governing behavior of one or more resources designated as personal is applicable to the one or more resources designated as personal;
if the security type is determined to indicate that the received security policy is not applicable to the one or more resources designated as personal, not apply the security policy to the one or more resources designated as personal; and
if the security type is determined to indicate that the received security policy is applicable to the one or more resources designated as personal, apply the security policy to the one or more resources designated as personal,wherein the wireless device is configurable to provide concurrent use for both personal and work purposes and the security type is one of the following;
a first security type, which indicates that no security policies are applicable to resources designated as personal;
a second security type, which indicates that at least one security policy is applicable to resources designated as personal;
ora third security type, which indicates that all security policies are applicable to resources designated as personal.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods and devices for implementing security policies on a wireless device. The wireless device may include a non-volatile memory comprising a security type hard-coded in the non-volatile memory. Based on the security type, it may be determined whether a received security policy governing behavior of one or more resources designated as personal is applicable to the one or more resources designated as personal. If the security type is determined to indicate that the received security policy is not applicable to the one or more resources designated as personal, the security policy may not be applied to the one or more resources designated as personal.
12 Citations
18 Claims
-
1. A wireless device comprising:
-
a non-volatile memory comprising a designation of a security type hard-coded in the non-volatile memory; and a processor coupled to the non-volatile memory, the processor being configured to execute computer-readable instructions to cause the wireless device to; determine, based on the security type, whether a received security policy governing behavior of one or more resources designated as personal is applicable to the one or more resources designated as personal; if the security type is determined to indicate that the received security policy is not applicable to the one or more resources designated as personal, not apply the security policy to the one or more resources designated as personal; and if the security type is determined to indicate that the received security policy is applicable to the one or more resources designated as personal, apply the security policy to the one or more resources designated as personal, wherein the wireless device is configurable to provide concurrent use for both personal and work purposes and the security type is one of the following; a first security type, which indicates that no security policies are applicable to resources designated as personal; a second security type, which indicates that at least one security policy is applicable to resources designated as personal;
ora third security type, which indicates that all security policies are applicable to resources designated as personal. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for applying a security policy to a wireless device, wherein the method is carried out by the wireless device comprising a security type hard-coded in a non-volatile memory, the method comprising:
-
determining, using a processor coupled to the non-volatile memory, based on the security type hard-coded in a non-volatile memory, whether a received security policy governing behavior of one or more resources designated as personal is applicable to the one or more resources designated as personal; if the security type is determined to indicate that the received security policy is not applicable to the one or more resources designated as personal, not applying the security policy to the one or more resources designated as personal; and if the security type is determined to indicate that the received security policy is applicable to the one or more resources designated as personal, applying the security policy to the one or more resources designated as personal, wherein the wireless device is configurable to provide concurrent use for both personal and work purposes and the security type is one of the following; a first security type, which indicates that no security policies are applicable to resources designated as personal; a second security type, which indicates that at least one security policy is applicable to resources designated as personal;
ora third security type, which indicates that all security policies are applicable to resources designated as personal. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable medium comprising computer readable-instructions which, when executed by one or more processors of a wireless device, cause the one or more processors to be configured to:
-
determine, using a processor coupled to the non-volatile memory, based on the security type hard-coded in a non-volatile memory, whether a received security policy governing behavior of one or more resources designated as personal is applicable to the one or more resources designated as personal; if the security type is determined to indicate that the received security policy is not applicable to the one or more resources designated as personal, not apply the security policy to the one or more resources designated as personal; and if the security type is determined to indicate that the received security policy is applicable to the one or more resources designated as personal, apply the security policy to the one or more resources designated as personal, wherein the wireless device is configurable to provide concurrent use for both personal and work purposes and the security type is one of the following; a first security type, which indicates that no security policies are applicable to resources designated as personal; a second security type, which indicates that at least one security policy is applicable to resources designated as personal;
ora third security type, which indicates that all security policies are applicable to resources designated as personal. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification