System and method for handling data transfers
First Claim
Patent Images
1. A method of handling data transfers on a device, comprising:
- receiving, from an application that accesses data associated with a first location, a request to open a connection with a second location;
retrieving, from a data store on the device, one or more data transfer settings responsive to receiving the request;
wherein the one or more data transfer settings are indicative of a security-related policy for data transfers associated with the first location; and
determining whether to permit the request or not permit the request based upon the one or more data transfer settings.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for managing data transfers between a secure location and a less secure location. A data transfer checker operating on a mobile device determines whether an attempted data transfer between two locations is permitted. If it is not permitted, then the data transfer is prevented and the user may be notified of the data transfer prevention.
244 Citations
36 Claims
-
1. A method of handling data transfers on a device, comprising:
-
receiving, from an application that accesses data associated with a first location, a request to open a connection with a second location; retrieving, from a data store on the device, one or more data transfer settings responsive to receiving the request; wherein the one or more data transfer settings are indicative of a security-related policy for data transfers associated with the first location; and determining whether to permit the request or not permit the request based upon the one or more data transfer settings. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A device, comprising:
-
a data store that stores a data transfer setting, wherein the data transfer setting is indicative of a security-related policy for data transfers associated with a first location; and
;a processor configured to performs operations comprising; receiving, from an application that accesses data associated with the first location, a request to open a connection with a second location; retrieving, from the data store, the data transfer setting responsive to receiving the request; and determining whether to permit the request or not permit the request based upon the data transfer setting. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer storage device encoded with a computer program, the program comprising instructions that when executed by a communication device cause the communication device to perform operations comprising:
-
receiving, from an application that accesses data associated with a first location, a request to open a connection with a second location; retrieving, in response to receiving the request, once or more data transfer settings, which are indicative of a security-related policy for data transfers associated with the first location; and determining whether to permit the request or not permit the request based upon the one or more data transfer settings. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A method of handling data transfers on a device, comprising:
-
receiving a request to transfer data from a first application on the device to a second application on the device, the first application capable of accessing data associated with a first network and the second application capable of accessing data associated with a second network; determining that the requested data transfer from the first application to the second application violates a security-related policy associated with the first application; and prohibiting the requested data transfer in response to the determining. - View Dependent Claims (23, 24, 25, 26)
-
-
27. A device, comprising:
one or more processors configured to; receive a request to transfer data from a first application on the device to a second application on the device, the first application capable of accessing data associated with a first network and the second application capable of accessing data associated with a second network; determine that the requested data transfer from the first application to the second application violates a security-related policy associated with the first application; and prohibit the requested data transfer in response to the determination that the requested data transfer violates the security-related policy. - View Dependent Claims (28, 29, 30, 31)
-
32. A computer program product encoded on a non-transitory medium, the product comprising computer readable instructions for causing one or more processors to perform operations comprising:
-
receiving a request to transfer data from a first application on the device to a second application on the device, the first application capable of accessing data associated with a first network and the second application capable of accessing data associated with a second network; determining that the requested data transfer from the first application to the second application violates a security-related policy associated with the first application; and prohibiting the requested data transfer in response to the determining. - View Dependent Claims (33, 34, 35, 36)
-
Specification