STATEFUL DATA GEOFENCING
First Claim
1. An apparatus comprising:
- a mobile device comprising;
a boundary module, implemented in hardware, that determines if the mobile device is within a secure area, the mobile device comprising a computing device capable of connecting to a wireless network;
a download module, implemented in hardware, that downloads a latest version of a file from a secure server to the mobile device in response to the boundary module determining that the mobile device has entered the secure area;
a copy module, implemented in hardware, that copies the file from the mobile device to the secure server in response to the boundary module determining that the mobile device has left the secure area, wherein the copy module copies the file from the mobile device to the secure server using one or more of a wireless network independent from a wireless network available in the secure area and a secured wireless network available in the secure area, the secured wireless network extending beyond the secure area; and
a deletion module, implemented in hardware, that deletes the file from the mobile device in response to the boundary module determining that the mobile device has left the secure area and in response to the copy module completing copying the file from the mobile device to the secure server.
2 Assignments
0 Petitions
Accused Products
Abstract
An apparatus includes a boundary module that determines if a mobile device is within a secure area. The mobile device includes a computing device capable of connecting to a wireless network. The apparatus includes a download module that downloads a latest version of a file from a secure server to the mobile device in response to the boundary module determining that the mobile device has entered the secure area. The apparatus includes a copy module that copies the file from the mobile device to the secure server in response to the boundary module determining that the mobile device has left the secure area and a deletion module that deletes the file from the mobile device in response to the boundary module determining that the mobile device has left the secure area and in response to the copy module completing copying the file from the mobile device to the secure server.
6 Citations
20 Claims
-
1. An apparatus comprising:
a mobile device comprising; a boundary module, implemented in hardware, that determines if the mobile device is within a secure area, the mobile device comprising a computing device capable of connecting to a wireless network; a download module, implemented in hardware, that downloads a latest version of a file from a secure server to the mobile device in response to the boundary module determining that the mobile device has entered the secure area; a copy module, implemented in hardware, that copies the file from the mobile device to the secure server in response to the boundary module determining that the mobile device has left the secure area, wherein the copy module copies the file from the mobile device to the secure server using one or more of a wireless network independent from a wireless network available in the secure area and a secured wireless network available in the secure area, the secured wireless network extending beyond the secure area; and a deletion module, implemented in hardware, that deletes the file from the mobile device in response to the boundary module determining that the mobile device has left the secure area and in response to the copy module completing copying the file from the mobile device to the secure server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
14. A method comprising:
-
determining if a mobile device is within a secure area, the mobile device comprising a computing device capable of connecting to a wireless network; downloading a latest version of a file from a secure server to the mobile device in response to determining that the mobile device has entered the secure area; copying the file from mobile device to the secure server in response to determining that the mobile device has left the secure area, wherein copying the file from the mobile device to the secure server comprises using one or more of a wireless network independent from a wireless network available in the secure area and a secured wireless network available in the secure area, the secured wireless network extending beyond the secure area; and deleting the file from the mobile device in response to determining that the mobile device has left the secure area and in response to completing copying the file from the mobile device to the secure server. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions readable/executable by a processor to cause the processor to:
-
determine if a mobile device is within a secure area, the mobile device comprising a computing device with a wireless connection to a network; download a latest version of a file from a secure server to the mobile device in response to determining that the mobile device has entered the secure area; copy the file to the secure server in response to determining that the mobile device has left the secure area, wherein copying the file from the mobile device to the secure server comprises using one or more of a wireless network independent from a wireless network available in the secure area and a secured wireless network available in the secure area, the secured wireless network extending beyond the secure area; and delete the file from the mobile device in response to determining that the mobile device has left the secure area and in response to completing copying the file from the mobile device to the secure server.
-
Specification