System and method for secure control of resources of wireless mobile communication devices
First Claim
1. A method comprising:
- storing corporate data and other data on a wireless communication device, wherein the corporate data is stored in a corporate domain of the wireless communication device and the other data is not stored in the corporate domain, wherein the corporate data is controlled by a corporate entity and the other data is controlled by a user of the wireless communication device;
receiving, from a software application, a request to access the corporate data; and
controlling access, using a security firewall, to the corporate data based on whether the corporate data is digitally signed using a private key, wherein the corporate data that is digitally signed is verified using a corresponding public key.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless mobile communication device asset. When a request to perform an operation affecting at least one of the assets is received, it is determined whether the request is permitted by the domain that includes the at least one affected asset, by determining whether the entity with which the request originated has a trust relationship with the domain, for example. The operation is completed where it is permitted by the domain. Wireless mobile communication device assets include software applications, persistent data, communication pipes, and configuration data, properties or user or subscriber profiles.
-
Citations
20 Claims
-
1. A method comprising:
-
storing corporate data and other data on a wireless communication device, wherein the corporate data is stored in a corporate domain of the wireless communication device and the other data is not stored in the corporate domain, wherein the corporate data is controlled by a corporate entity and the other data is controlled by a user of the wireless communication device; receiving, from a software application, a request to access the corporate data; and controlling access, using a security firewall, to the corporate data based on whether the corporate data is digitally signed using a private key, wherein the corporate data that is digitally signed is verified using a corresponding public key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A wireless communication device, comprising:
-
at least one memory storing corporate data and other data on the wireless communication device, wherein the corporate data is stored in a corporate domain of the wireless communication device and the other data is not stored in the corporate domain, wherein the corporate data is controlled by a corporate entity and the other data is controlled by a user of the wireless communication device; and a controller configured to; receive, from a software application, a request to access the corporate data; and control access to the corporate data, using a security firewall, based on whether the corporate data is digitally signed using a private key, wherein the corporate data that is digitally signed is verified using a corresponding public key. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A non-transitory computer readable medium, comprising program code executable by a processor such that when executed, cause a wireless communication device to:
-
store corporate data and other data on the wireless communication device, wherein the corporate data is stored in a corporate domain of the wireless communication device and the other data is not stored in the corporate domain, wherein the corporate data is controlled by a corporate entity and the other data is controlled by a user of the wireless communication device; receive, from a software application, a request to access the corporate data; and control access, using a security firewall, to the corporate data based on whether the corporate data is digitally signed using a private key, wherein the corporate data that is digitally signed is verified using a corresponding public key. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification