×

Restricting access of a portable communication device to confidential data or applications via a remote network based on event triggers generated by the portable communication device

  • US 9,374,363 B1
  • Filed: 03/15/2013
  • Issued: 06/21/2016
  • Est. Priority Date: 03/15/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method of protecting information on a hospital network comprising:

  • loading, by an application on a portable electronic device having an original persona, a hospital persona that is different from the original persona, wherein the hospital persona comprises a hospital plurality of data, a hospital plurality of applications, and a hospital access right to a hospital network;

    subsequently activating the hospital persona and deactivating the original persona, by the application, in response to an activation trigger, the activation trigger comprising at least one of a manual activation trigger or a dynamic activation trigger, wherein activating the hospital persona comprises restricting access to at least one of an original software, hardware, or firmware on the portable electronic device associated with the original persona;

    accessing, by the portable electronic device while the hospital persona is activated, at least a portion of the hospital plurality of data, wherein accessing the at least the portion of the hospital plurality of data comprises creating or modifying the least the portion of the hospital plurality of data; and

    deactivating, by the application, in response to a deactivation trigger comprising at least one of a manual deactivation trigger or a dynamic deactivation trigger, the hospital persona, wherein the deactivating comprises;

    determining if the deactivation trigger is the manual deactivation trigger or the dynamic deactivation trigger;

    storing, in response to the determination, the at least the portion of the hospital plurality of data, wherein the at least the portion of the hospital plurality of data is stored in the hospital network when the deactivation trigger is the manual deactivation trigger, and wherein when the deactivation trigger is the dynamic deactivation trigger, the at least the portion of the hospital plurality of data is temporarily stored in a trusted security zone on the portable electronic device until a subsequent activation of the hospital persona when the at least the portion of the hospital plurality of data is uploaded from the trusted security zone to the hospital network; and

    reactivating, in response to the deactivation trigger, the original persona on the portable electronic device, wherein the original persona runs on a first virtual processor and the hospital personal runs on a second virtual processor, and wherein the first virtual processor and the second virtual processor run on a single physical processor executing in a time-sliced fashion by switching contexts between the first and second virtual processors to share processor resources.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×