Stateful data geofencing
First Claim
1. An apparatus comprising:
- a boundary module, implemented by one or more hardware processors executing instructions, that determines if a mobile device communicatively coupled with the apparatus is within a secure area, the mobile device comprising a computing device capable of connecting to a secured wireless network;
a download module, implemented by the one or more hardware processors executing the instructions, that downloads a latest version of a file from a secure server to the mobile device in response to the boundary module determining that the mobile device has entered the secure area, wherein the mobile device connects with the secure server wirelessly over the secured wireless network while the mobile device is in the secure area;
a copy module, implemented by the one or more hardware processors executing the instructions, that copies the file including the latest version of the file from the mobile device to the secure server in response to the boundary module determining that the mobile device has left the secure area, wherein the copy module copies the file including the latest version of the file from the mobile device to the secure server using a second wireless network independent from the secured wireless network and extending beyond the secure area; and
a deletion module, implemented by the one or more hardware processors executing the instructions, that deletes the file including all versions of the file from the mobile device in response to the boundary module determining that the mobile device has left the secure area and in response to the copy module having completed copying the file from the mobile device to the secure server.
2 Assignments
0 Petitions
Accused Products
Abstract
An apparatus includes a boundary module that determines if a mobile device is within a secure area. The mobile device includes a computing device capable of connecting to a wireless network. The apparatus includes a download module that downloads a latest version of a file from a secure server to the mobile device in response to the boundary module determining that the mobile device has entered the secure area. The apparatus includes a copy module that copies the file from the mobile device to the secure server in response to the boundary module determining that the mobile device has left the secure area and a deletion module that deletes the file from the mobile device in response to the boundary module determining that the mobile device has left the secure area and in response to the copy module completing copying the file from the mobile device to the secure server.
19 Citations
16 Claims
-
1. An apparatus comprising:
-
a boundary module, implemented by one or more hardware processors executing instructions, that determines if a mobile device communicatively coupled with the apparatus is within a secure area, the mobile device comprising a computing device capable of connecting to a secured wireless network; a download module, implemented by the one or more hardware processors executing the instructions, that downloads a latest version of a file from a secure server to the mobile device in response to the boundary module determining that the mobile device has entered the secure area, wherein the mobile device connects with the secure server wirelessly over the secured wireless network while the mobile device is in the secure area; a copy module, implemented by the one or more hardware processors executing the instructions, that copies the file including the latest version of the file from the mobile device to the secure server in response to the boundary module determining that the mobile device has left the secure area, wherein the copy module copies the file including the latest version of the file from the mobile device to the secure server using a second wireless network independent from the secured wireless network and extending beyond the secure area; and a deletion module, implemented by the one or more hardware processors executing the instructions, that deletes the file including all versions of the file from the mobile device in response to the boundary module determining that the mobile device has left the secure area and in response to the copy module having completed copying the file from the mobile device to the secure server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
determining if a mobile device is within a secure area, the mobile device comprising a computing device capable of connecting to a secured wireless network; downloading a latest version of a file from a secure server to the mobile device in response to determining that the mobile device has entered the secure area, wherein the mobile device connects with the secure server wirelessly over the secured wireless network while the mobile device is in the secure area; copying the file including the latest version of the file from the mobile device to the secure server in response to determining that the mobile device has left the secure area, wherein copying the file including the latest version of the file from the mobile device to the secure server comprises using a second wireless network independent from the secured wireless network and extending beyond the secure area; and deleting the file including all versions of the file from the mobile device in response to determining that the mobile device has left the secure area and in response to having completed copying the file from the mobile device to the secure server. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer program product comprising a non-transitory computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to:
-
determine if a mobile device is within a secure area, the mobile device comprising a computing device capable of connecting to a secured wireless network; download a latest version of a file from a secure server to the mobile device in response to determining that the mobile device has entered the secure area, wherein the mobile device connects with the secure server wirelessly over the secured wireless network while the mobile device is in the secure area; copy the file including the latest version of the file to the secure server in response to determining that the mobile device has left the secure area, wherein copying the file including the latest version of the file from the mobile device to the secure server comprises using a second wireless network independent from the secured wireless network and extending beyond the secure area; and delete the file including all versions of the file from the mobile device in response to determining that the mobile device has left the secure area and in response to having completed copying the file from the mobile device to the secure server.
-
Specification