System and method for handling data transfers
First Claim
Patent Images
1. A method of handling data transfers on a device, comprising:
- receiving, from an application that accesses data associated with a first location, a request to open a connection with a second location;
retrieving, from a data store on the device, one or more data transfer settings responsive to receiving the request;
wherein the one or more data transfer settings are indicative of a security-related policy for data transfers, the security-related policy being associated with the first location; and
determining whether to permit the request or not permit the request based upon the one or more data transfer settings.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for managing data transfers between a secure location and a less secure location. A data transfer checker operating on a mobile device determines whether an attempted data transfer between two locations is permitted. If it is not permitted, then the data transfer is prevented and the user may be notified of the data transfer prevention.
-
Citations
43 Claims
-
1. A method of handling data transfers on a device, comprising:
-
receiving, from an application that accesses data associated with a first location, a request to open a connection with a second location; retrieving, from a data store on the device, one or more data transfer settings responsive to receiving the request; wherein the one or more data transfer settings are indicative of a security-related policy for data transfers, the security-related policy being associated with the first location; and determining whether to permit the request or not permit the request based upon the one or more data transfer settings. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A device, comprising:
-
a data store that stores a data transfer setting, wherein the data transfer setting is indicative of a security-related policy for data transfers, the security-related policy being associated with a first location; and a processor configured to perform operations comprising; receiving, from an application that accesses data associated with the first location, a request to open a connection with a second location; retrieving, from the data store, the data transfer setting responsive to receiving the request; and determining whether to permit the request or not permit the request based upon the data transfer setting. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer storage device encoded with a computer program, the program comprising instructions that when executed by a communication device cause the communication device to perform operations comprising:
-
receiving, from an application that accesses data associated with a first location, a request to open a connection with a second location; retrieving, in response to receiving the request, one or more data transfer settings, which are indicative of a security-related policy for data transfers, the security-related policy being associated with the first location; and determining whether to permit the request or not permit the request based upon the one or more data transfer settings. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A method of handling data transfers on a device, comprising:
-
receiving, from an application that accesses data associated with a first location, a request to open a connection with a second location, wherein the request includes at least one of copying, cutting, or pasting data; retrieving, from a data store on the device, one or more data transfer settings responsive to receiving the request; wherein the one or more data transfer settings are indicative of a security-related policy for data transfers, the security-related policy being associated with the first location; and determining whether to permit the request or not permit the request based upon the one or more data transfer settings.
-
-
23. A method of handling data transfers on a device, comprising:
-
receiving a request associated with transferring data between a first application and a second application, the first application accessing data associated with a first network and the second application accessing data associated with a second network; retrieving, from memory of the device, one or more data transfer settings in response to the request, the one or more data transfer settings indicative of a security-related policy for data transfers, the security-related policy associated with the first network; and determining whether to execute the request based on the one or more data transfer settings. - View Dependent Claims (24, 25, 26, 27, 28, 29)
-
-
30. A device, comprising:
-
a data store that stores one or more data transfer settings indicative of a security-related policy for data transfers, the security-related policy associated with the first network; and a processor configured to; receive a request associated with transferring data between a first application and a second application, the first application accessing data associated with a first network and the second application accessing data associated with a second network; retrieve, from the data store, the one or more data transfer settings in response to the request; and determine whether to execute the request based on the one or more data transfer settings. - View Dependent Claims (31, 32, 33, 34, 35, 36)
-
-
37. A computer program product encoded on a tangible, non-transitory storage medium, the product comprising computer readable instructions for causing one or more processors to perform operations comprising:
-
receiving a request associated with transferring data between a first application and a second application, the first application accessing data associated with a first network and the second application accessing data associated with a second network; retrieving, from memory of the device, one or more data transfer settings in response to the request, wherein the one or more data transfer settings are indicative of a security-related policy for data transfers, the security-related policy associated with the first network; and determining whether to execute the request based on the one or more data transfer settings. - View Dependent Claims (38, 39, 40, 41, 42, 43)
-
Specification