Controlling mobile device access to secure data
First Claim
1. A method, comprising:
- receiving, by a mobile device via an access gateway, policy information that defines a management framework for executing a managed application of the mobile device; and
as part of a process that configures the mobile device such that the managed application is able to be executed in accordance with the management framework;
configuring, based on at least one first setting of the policy information, a private secure container, which is to be private to the managed application, such that a first type of read or write operation from the managed application is to be redirected to the private secure container;
configuring, based on at least one second setting of the policy information, a shared secure container, which is to be accessible by the managed application and at least one other managed application of the mobile device, such that a second type of read or write operation from the managed application is to be redirected to the shared secure container;
determining that legacy data, which is associated with an application of the mobile device that was executed not in accordance with the management framework, is to be configured for the managed application;
responsive to determining that the legacy data is to be configured for the managed application, encrypting the legacy data, resulting in encrypted legacy data;
storing a first set of the encrypted legacy data in the private secure container; and
storing a second set of the encrypted legacy data in the shared secure container.
7 Assignments
0 Petitions
Accused Products
Abstract
Various aspects of the disclosure relate to providing secure containers or data vaults for data of one or more managed applications. In some embodiments, each managed application may be assigned its own private data vault and/or may be assigned a shared data vault that is accessible to at least one other managed application. As the managed application executes, calls for access to the data may be intercepted and redirected to the secure containers. Data stored in a secure container may be encrypted according to a policy. Other aspects relate to deleting data from a secure container, such as via a selective wipe of data associated with a managed application. Further aspects relate to configuring and creating the secure containers, retrieving key information required to encrypt/decrypt the data stored in the secure containers, and publishing the managed applications, policy information and key information for download to a mobile device.
537 Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a mobile device via an access gateway, policy information that defines a management framework for executing a managed application of the mobile device; and as part of a process that configures the mobile device such that the managed application is able to be executed in accordance with the management framework; configuring, based on at least one first setting of the policy information, a private secure container, which is to be private to the managed application, such that a first type of read or write operation from the managed application is to be redirected to the private secure container; configuring, based on at least one second setting of the policy information, a shared secure container, which is to be accessible by the managed application and at least one other managed application of the mobile device, such that a second type of read or write operation from the managed application is to be redirected to the shared secure container; determining that legacy data, which is associated with an application of the mobile device that was executed not in accordance with the management framework, is to be configured for the managed application; responsive to determining that the legacy data is to be configured for the managed application, encrypting the legacy data, resulting in encrypted legacy data; storing a first set of the encrypted legacy data in the private secure container; and storing a second set of the encrypted legacy data in the shared secure container. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus, comprising:
-
at least one processor; and memory storing executable instructions configured to, when executed by the at least one processor, cause the apparatus to; receive, via an access gateway, policy information that defines a management framework for executing a managed application of the apparatus; and as part of a process that configures the apparatus such that the managed application is able to be executed in accordance with the management framework; configure, based on at least one first setting of the policy information, a private secure container, which is to be private to the managed application, such that a first type of read or write operation from the managed application is to be redirected to the private secure container; configure, based on at least one second setting of the policy information, a shared secure container, which is to be accessible by the managed application and at least one other managed application of the apparatus, such that a second type of read or write operation from the managed application is to be redirected to the shared secure container; determine that legacy data, which is associated with an application of the apparatus that was executed not in accordance with the management framework, is to be configured for the managed application; responsive to determining that the legacy data is to be configured for the managed application, encrypt the legacy data, resulting in encrypted legacy data; store a first set of the encrypted legacy data in the private secure container; and store a second set of the encrypted legacy data in the shared secure container. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. One or more non-transitory computer readable media storing executable instructions configured to, when executed, cause an apparatus to:
-
receive, via an access gateway, policy information that defines a management framework for executing a managed application of the apparatus; and as part of a process that configures the apparatus such that the managed application is able to be executed in accordance with the management framework; configure, based on at least one first setting of the policy information, a private secure container, which is to be private to the managed application, such that a first type of read or write operation from the managed application is to be redirected to the private secure container; configure, based on at least one second setting of the policy information, a shared secure container, which is to be accessible by the managed application and at least one other managed application, such that a second type of read or write operation from the managed application is to be redirected to the shared secure container; determine that legacy data, which is associated with an application of the apparatus that was executed not in accordance with the management framework, is to be configured for the managed application; responsive to determining that the legacy data is to be configured for the managed application, encrypt the legacy data, resulting in encrypted legacy data; store a first set of the encrypted legacy data in the private secure container; and store a second set of the encrypted legacy data in the shared secure container. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification