Protection of resources downloaded to portable devices from enterprise systems
First Claim
1. A method of protecting resources hosted on enterprise systems, said method being performed at least in part by an enterprise system, said method comprising:
- maintaining security policies applicable to said resources;
receiving a request from a portable device to download a resource of said resources, wherein said resource is a data file for use by an application executing in said portable device;
formulating a plurality of security actions and a plurality of conditions applicable for said data file, wherein each security action is associated with a corresponding condition of said plurality of conditions, wherein a first condition specifies a retention duration and an associated first security action indicates a delete action, wherein said formulating comprises;
identifying a set of security policies of said security policies applicable to a combination of two or more of said resources, a user at said portable device, said application accessing said data file and a type of said portable device, wherein each of said set of security policies comprises a general condition; and
translating each of said general conditions to corresponding specific conditions as applicable to said combination,wherein said specific conditions are included in said plurality of conditions;
sending to said portable device, said data file along with said plurality of security actions and said plurality of conditions, including said first security action and said first condition, as a response to said request;
determining whether each of said plurality of conditions is satisfied in said portable device, wherein said determining determines at a first time instance that the duration of said data file on said portable device has exceeded said retention duration; and
performing on said data file, the security action associated with a condition determined to have been satisfied, wherein said performing performs said delete action by deleting said data file on said portable device after said first time instance,wherein said data file is available on said portable device only for said retention duration, thereby protecting said data file downloaded to said portable device.
1 Assignment
0 Petitions
Accused Products
Abstract
Protection of resources hosted on enterprise systems. In an embodiment, an enterprise system receives a request from a portable device to download a resource, and in response formulates multiple security actions and associated conditions for the requested resource. The enterprise system sends the requested resource, the security actions and the conditions to the portable device. The portable device determines whether each condition is satisfied and performs the security actions associated with the conditions determined to have been satisfied. Due to the ability to send multiple security actions and associated conditions, better control in protection and retention of downloaded resources is obtained.
62 Citations
17 Claims
-
1. A method of protecting resources hosted on enterprise systems, said method being performed at least in part by an enterprise system, said method comprising:
-
maintaining security policies applicable to said resources; receiving a request from a portable device to download a resource of said resources, wherein said resource is a data file for use by an application executing in said portable device; formulating a plurality of security actions and a plurality of conditions applicable for said data file, wherein each security action is associated with a corresponding condition of said plurality of conditions, wherein a first condition specifies a retention duration and an associated first security action indicates a delete action, wherein said formulating comprises; identifying a set of security policies of said security policies applicable to a combination of two or more of said resources, a user at said portable device, said application accessing said data file and a type of said portable device, wherein each of said set of security policies comprises a general condition; and translating each of said general conditions to corresponding specific conditions as applicable to said combination, wherein said specific conditions are included in said plurality of conditions; sending to said portable device, said data file along with said plurality of security actions and said plurality of conditions, including said first security action and said first condition, as a response to said request; determining whether each of said plurality of conditions is satisfied in said portable device, wherein said determining determines at a first time instance that the duration of said data file on said portable device has exceeded said retention duration; and performing on said data file, the security action associated with a condition determined to have been satisfied, wherein said performing performs said delete action by deleting said data file on said portable device after said first time instance, wherein said data file is available on said portable device only for said retention duration, thereby protecting said data file downloaded to said portable device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computing system comprising:
-
a portable device to enable users to download resources; and an enterprise system to host said resources, said enterprise system operable to; maintain security policies applicable to said resources; receive a request from said portable device to download a resource of said resources, wherein said resource is a data file for use by an application executing in said portable device; formulate a plurality of security actions and a plurality of conditions applicable for said data file, wherein each security action is associated with a corresponding condition of said plurality of conditions, wherein a first condition specifies a retention duration and an associated first security action indicates a delete action, wherein to formulate said metadata, said enterprise system is operable to; identify a set of security policies of said security policies applicable to a combination of two or more of said resources, a user at said portable device, said application accessing said data file and a type of said portable device, wherein each of said set of security policies comprises a general condition; and translate each of said general conditions to corresponding specific conditions as applicable to said combination, wherein said specific conditions are included in said plurality of conditions; and send to said portable device, said data file along with said plurality of security actions and said plurality of conditions, including said first security action and said first condition, as a response to said request, wherein said portable device is operable to; receive said response containing said data file along with said plurality of security actions and said plurality of conditions including said first security action and said first condition; determine whether each of said plurality of conditions is satisfied in said portable device, wherein said portable device determines at a first time instance that the duration of said data file on said portable device has exceeded said retention duration; and perform on said data file the security action associated with a condition determined to have been satisfied, wherein said portable device performs said delete action by deleting said data file on said portable device after said first time instance, wherein said data file is available on said portable device only for said retention duration, thereby protecting said data file downloaded to said portable device. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory machine readable medium storing one or more sequences of instructions for causing a portable device to provide protection of resources downloaded from enterprise systems, wherein execution of said one or more sequences of instructions by one or more processors contained in said portable device causes said portable device to perform the actions of:
-
receiving from a user, a request to download a resource of said resources, wherein said resource is a data file for use by an application executing in said portable device; downloading from an enterprise system hosting said data file, both of said data file and a metadata together in response to said request, said metadata specifying a plurality of security actions and a plurality of conditions applicable for said data file, wherein each security action is associated with a corresponding condition of said plurality of conditions, wherein a first condition specifies a retention duration and an associated first security action indicates a delete action, wherein said plurality of conditions and said plurality of security actions are generated based on a set of security policies applicable to a combination of two or more of said resources, a user at said portable device, said application accessing said data file and a type of said portable device, wherein each of said set of security policies comprises a general condition, wherein said plurality of conditions includes specific conditions corresponding to said general conditions as applicable to said combination; determining whether each of said plurality of conditions is satisfied in said portable device, wherein said determining determines at a first time instance that the duration of said data file on said portable device has exceeded said retention duration; and performing on said data file, the security action associated with a condition determined to have been satisfied prior to permitting access to said data file, wherein said performing performs said delete action by deleting said data file on said portable device after said first time instance, wherein said data file is available on said portable device only for said retention duration, thereby protecting said data file downloaded to said portable device. - View Dependent Claims (14, 15, 16, 17)
-
Specification