System and method for creating and assigning a policy for a mobile communications device based on personal data
First Claim
Patent Images
1. A method comprising:
- identifying, by a policy management module on a mobile communications device, one or more locations for storing personal data on the mobile communications device;
identifying, by the policy management module, a first set of personal data stored at the one or more locations on the mobile communications device;
generating, by the policy management module, a policy for the mobile communications device based on an analysis by the policy management module of the first set of personal data, the generated policy for identifying a second set of personal data stored on the mobile communications device and for controlling access to the second set of personal data;
identifying, by the policy management module, the second set of personal data stored on the mobile communications device based on the generated policy, the second set of personal data being different from the first set of personal data;
monitoring, by the policy management module, the second set of personal data stored on the mobile communications device based on the generated policy; and
detecting, by the policy management module, a request for access to the monitored second set of personal data by an application executed on the mobile communications device.
8 Assignments
0 Petitions
Accused Products
Abstract
A system and method to create and assign a policy for a mobile communications device are disclosed. The policy may be created based on personal data associated with the mobile communications device. For example, known sources of personal data on the mobile communications device may be identified and a policy may be created based on the known personal data. The policy may then be used to identify additional personal data associated with the mobile communications device. Thus, the personal data associated with the mobile communications device may be monitored. If an application attempts to access the monitored personal data, the access will be detected.
-
Citations
20 Claims
-
1. A method comprising:
-
identifying, by a policy management module on a mobile communications device, one or more locations for storing personal data on the mobile communications device; identifying, by the policy management module, a first set of personal data stored at the one or more locations on the mobile communications device; generating, by the policy management module, a policy for the mobile communications device based on an analysis by the policy management module of the first set of personal data, the generated policy for identifying a second set of personal data stored on the mobile communications device and for controlling access to the second set of personal data; identifying, by the policy management module, the second set of personal data stored on the mobile communications device based on the generated policy, the second set of personal data being different from the first set of personal data; monitoring, by the policy management module, the second set of personal data stored on the mobile communications device based on the generated policy; and detecting, by the policy management module, a request for access to the monitored second set of personal data by an application executed on the mobile communications device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
identifying, by a policy management module on a mobile communications device, a first set of personal data associated with the mobile communications device; receiving, by the policy management module, from a server, an analysis associated with the mobile communications device; generating, by the policy management module, a policy for the mobile communications device based on the first set of personal data associated with the mobile communications device and based on the analysis received from the server, the generated policy for identifying a second set of personal data stored on the mobile communications device and for controlling access to the second set of personal data; assigning, by the policy management module, the policy to the mobile communications device; identifying, by the policy management module, the second set of personal data stored on the mobile communications device based on the generated policy, the second set of personal data being different from the first set of personal data; monitoring, by the policy management module, the second set of personal data stored on the mobile communications device based on the generated policy; and detecting, by the policy management module, a request for access to the monitored data by an application that is executed on the mobile communications device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
identifying, by a policy management module on a mobile communications device, a first set of personal data stored on the mobile communications device; generating, by the policy management module, a policy based on the identified first set of personal data stored on the mobile communications device, the generated policy for identifying a second set of personal data stored on the mobile communications device and for controlling access to the second set of personal data; identifying, by the policy management module, the second set of personal data stored on the mobile communications device based on the generated policy, wherein the second set of personal data includes the identified first set of personal data and additional personal data; monitoring the second set of personal data stored on the mobile communications device based on the generated policy; and detecting a request for access to the monitored second set of personal data by at least one application executed on the mobile communications device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification