Systems and methods to synchronize data to a mobile device based on a device usage context
First Claim
Patent Images
1. A method for selectively synchronizing data to a device by polling a server, comprising:
- applying initial policy data to the device via a policy engine;
determining applicable device contexts based on the policy data;
detecting the presence of an applicable device context based on at least one of a device state or event;
determining a time to synchronize policy data with the server based on the detected device context;
synchronizing policy data with the server at the determined time to generate updated policy data, wherein one or more aspects of synchronizing the policy data is secured via an external security module connected to the device, and wherein securing the one or more aspects of synchronizing the policy data comprises one or more of encrypting a request to the server, authenticating the device to the server, authenticating the server to the device, verifying the integrity of data received from the server, or verifying the context of the device;
applying updated policy data to the device via the policy engine; and
determining updated applicable device contexts based on the updated policy data,wherein communications with the server are encrypted by an encryption element within a trusted code zone of the device, and one or more aspects of the device context are verified by a verification element within the trusted code zone of the device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system, and computer-readable medium for synchronizing policy data on a device based on device usage context. By synchronizing policy data on the device based on device usage context, security, bandwidth and energy efficiency concerns associated with the current data synchronization art by intelligently organizing and prioritizing the updating of policy data in compliance with policy data.
101 Citations
15 Claims
-
1. A method for selectively synchronizing data to a device by polling a server, comprising:
-
applying initial policy data to the device via a policy engine; determining applicable device contexts based on the policy data; detecting the presence of an applicable device context based on at least one of a device state or event; determining a time to synchronize policy data with the server based on the detected device context; synchronizing policy data with the server at the determined time to generate updated policy data, wherein one or more aspects of synchronizing the policy data is secured via an external security module connected to the device, and wherein securing the one or more aspects of synchronizing the policy data comprises one or more of encrypting a request to the server, authenticating the device to the server, authenticating the server to the device, verifying the integrity of data received from the server, or verifying the context of the device; applying updated policy data to the device via the policy engine; and determining updated applicable device contexts based on the updated policy data, wherein communications with the server are encrypted by an encryption element within a trusted code zone of the device, and one or more aspects of the device context are verified by a verification element within the trusted code zone of the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable storage medium comprising:
- instructions executable by one or more processors to cause the one or more processors to;
apply initial policy data to a device via a policy engine; determine applicable device contexts based on the policy data; detect the presence of an applicable device context based on at least one of a device state or event; determine a time to synchronize policy data with a server based on the detected device context; synchronize policy data with the server at the determined time to generate updated policy data, wherein one or more aspects of synchronizing the policy data is secured via an external security module connected to the device, and wherein securing the one or more aspects of synchronizing the policy data comprises one or more of encrypting a request to the server, authenticating the device to the server, authenticating the server to the device, verifying the integrity of data received from the server, or verifying the context of the device; apply updated policy data to the device via the policy engine; and determine updated applicable device contexts based on the updated policy data, wherein communications with the server are encrypted by an encryption element within a trusted code zone of the device, and one or more aspects of the device context are verified by a verification element within the trusted code zone of the device. - View Dependent Claims (12, 13)
- instructions executable by one or more processors to cause the one or more processors to;
-
14. A system for accessing a file system, comprising:
- one or more hardware processors communicatively coupled to a file system, wherein the hardware processors are additionally communicatively coupled to a server via a network, wherein the one or more hardware processors are configured to;
apply initial policy data to a device via a policy engine; determine applicable device contexts based on the policy data; detect the presence of an applicable device context based on at least one of a device state or event; determine a time to synchronize policy data with the server based on the detected device context; synchronize policy data with the server at the determined time to generate updated policy data, wherein one or more aspects of synchronizing the policy data is secured via an external security module connected to the device, and wherein securing the one or more aspects of synchronizing the policy data comprises one or more of encrypting a request to the server, authenticating the device to the server, authenticating the server to the device, verifying the integrity of data received from the server, or verifying the context of the device; apply updated policy data to the device via the policy engine; and determine updated applicable device contexts based on the updated policy data, wherein communications with the server are encrypted by an encryption element within a trusted code zone of the device, and one or more aspects of the device context are verified by a verification element within the trusted code zone of the device. - View Dependent Claims (15)
- one or more hardware processors communicatively coupled to a file system, wherein the hardware processors are additionally communicatively coupled to a server via a network, wherein the one or more hardware processors are configured to;
Specification