Method for establishing a plurality of modes of operation on a mobile device
First Claim
Patent Images
1. A system comprising:
- a first device configured to receive restricted data; and
a second device;
wherein the first device includes;
a first processor; and
first memory;
wherein the first processor and first memory cooperate to;
restrict data on the first device to be accessible by only a subset of applications based on a designated mode for an application; and
enable server software for controlling access to the restricted data; and
wherein the second device includes;
a second processor; and
second memory;
wherein the second processor and second memory cooperate to;
associate a subset of applications on the second device as associated with a trusted mode, the subset of applications associated with the trusted mode configured to use both restricted and unrestricted data; and
enable a client on the second device capable of both communicating with the server software on the first device and providing policy management on the second device to restrict access to the restricted data on the first device to the subset of applications on the second device associated with the trusted mode,wherein access to restricted data by applications on the second device is provided only while a connection between the first device and second device is maintained.
4 Assignments
0 Petitions
Accused Products
Abstract
A method, device and system for establishing plural modes of operation on a mobile device, including: associating each application on the mobile device with one of a plurality of modes; and restricting access to data on the mobile device to only a subset of applications based on the mode associated for the each application. A system includes connection of an untrusted device to a trusted device and restricting data access for restricted data to a subset of trusted applications on the untrusted device.
-
Citations
20 Claims
-
1. A system comprising:
-
a first device configured to receive restricted data; and a second device; wherein the first device includes; a first processor; and first memory; wherein the first processor and first memory cooperate to; restrict data on the first device to be accessible by only a subset of applications based on a designated mode for an application; and enable server software for controlling access to the restricted data; and wherein the second device includes; a second processor; and second memory; wherein the second processor and second memory cooperate to; associate a subset of applications on the second device as associated with a trusted mode, the subset of applications associated with the trusted mode configured to use both restricted and unrestricted data; and enable a client on the second device capable of both communicating with the server software on the first device and providing policy management on the second device to restrict access to the restricted data on the first device to the subset of applications on the second device associated with the trusted mode, wherein access to restricted data by applications on the second device is provided only while a connection between the first device and second device is maintained. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
at a first device configured to receive restricted data; restricting data on the first device to be accessible by only a subset of applications based on a designated mode for an application; and enabling server software for controlling access to the restricted data; and at a second device; associating a subset of applications on the second device as associated with a trusted mode, the subset of applications associated with the trusted mode configured to use both restricted and unrestricted data; and enabling a client on the second device capable of both communicating with the server software on the first device and providing policy management on the second device to restrict access to the restricted data on the first device to the subset of applications on the second device associated with the trusted mode, wherein access to restricted data by applications on the second device is provided only while a connection between the first device and second device is maintained. - View Dependent Claims (17, 18, 19)
-
-
20. A non-transitory computer readable medium for storing program instruction which, when executed by a first processor on a first computing device are configured to:
-
restrict data on the first device to be accessible by only a subset of applications based on a designated mode for an application; and enable server software for controlling access to the restricted data, the non-transitory computer readable medium further storing program instruction which, when executed by a second processor on a second computing device are configured to; associate a subset of applications on the second device as associated with a trusted mode, the subset of applications associated with the trusted mode configured to use both restricted and unrestricted data; and enable a client on the second device capable of both communicating with the server software on the first device and providing policy management on the second device to restrict access to the restricted data on the first device to the subset of applications on the second device associated with the trusted mode, wherein the program instructions provide access to restricted data by applications on the second device only while a connection between the first device and second device is maintained.
-
Specification