System and method of data security in synchronizing data with a wireless device
First Claim
Patent Images
1. A wireless device comprising:
- a client application;
a first database configured to store data for access by the client application;
a second database to store data in an encrypted format;
a replicator to synchronize data stored in the first database with encrypted data stored in the second database; and
a synchronizer to synchronize the encrypted data stored in the second database with data stored by a server,the wireless device being configured such that;
when the wireless device is operating in a first state, the synchronizer synchronizes the encrypted data stored in the second database with the data stored by the server, and the replicator synchronizes data stored in the first database with the encrypted data stored in the second database; and
when the wireless device is operating in a second state, different from the first state, the synchronizer synchronizes the encrypted data stored in the second database with the data stored by the server, and the wireless device is configured to restrict synchronization, by the replicator, of the data stored in the first database with the encrypted data stored in the second database.
8 Assignments
0 Petitions
Accused Products
Abstract
A system is disclosed. The system includes a server, a client application, and a first database. The first database is associated with the client application. The system further includes a second database to store data in an encrypted format, and a replicator to synchronize the data stored in the first and second databases. The system also includes a synchronizer to synchronize the data stored in the second database and the server based on a current security level.
12 Citations
19 Claims
-
1. A wireless device comprising:
-
a client application; a first database configured to store data for access by the client application; a second database to store data in an encrypted format; a replicator to synchronize data stored in the first database with encrypted data stored in the second database; and a synchronizer to synchronize the encrypted data stored in the second database with data stored by a server, the wireless device being configured such that; when the wireless device is operating in a first state, the synchronizer synchronizes the encrypted data stored in the second database with the data stored by the server, and the replicator synchronizes data stored in the first database with the encrypted data stored in the second database; and when the wireless device is operating in a second state, different from the first state, the synchronizer synchronizes the encrypted data stored in the second database with the data stored by the server, and the wireless device is configured to restrict synchronization, by the replicator, of the data stored in the first database with the encrypted data stored in the second database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
a server configured to store data; and a wireless device communicatively coupled to the server, the wireless device including; a client application; a first database configured to store data for access by the client application; a second database configured to store data in an encrypted format; a replicator to synchronize the data stored in the first database with encrypted data stored in the second database; and a synchronizer to synchronize the encrypted data stored in the second database with the data stored by the server, the wireless device being configured such that; when the wireless device is operating in a first security level, the synchronizer synchronizes the encrypted data stored in the second database with the data stored by the server, and the replicator synchronizes data stored in the first database with the encrypted data stored in the second database; and when the wireless device is operating in a second security level, different from the first security level, the synchronizer synchronizes the encrypted data stored in the second database with the data stored by the server, and the wireless device is configured to restrict synchronization, by the replicator, of the data stored in the first database with the encrypted data stored in the second database.
-
-
10. A method of controlling access to data held on a wireless device, the wireless device comprising a first database and a second database, different from the first database, the second database being configured to store data in an encrypted format, the wireless device being capable of operating in a first security mode and a second, different, security mode, wherein, when operating in the first security mode, the wireless device synchronizes the data stored in the first database with encrypted data stored in the second database and synchronizes encrypted data stored in the second database with data stored by a server remote from the wireless device, the method comprising:
-
determining whether the wireless device is operating in the first security mode or the second security mode; and responsive to a determination that the wireless device is operating in the second security mode, configuring the wireless device so as to restrict the synchronization of the data stored in the first database with the encrypted data stored in the second database, and to synchronize the encrypted data in the second database with data stored by said server. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer readable storage medium storing computer readable instructions thereon for execution on a wireless device to implement a method of controlling access to data stored thereon, the wireless device comprising a first database configured to store data and a second database, different from the first database, the second database being configured to store data in an encrypted form, the device being capable of operating in a first mode and a second, different, mode, wherein, when operating in the first mode, the device synchronizes the data stored in the first database with the encrypted data stored in the second database and synchronizes the encrypted data stored in the second database with data stored by a server remote from the wireless device,
the computer readable instructions, when executed on a processor of the wireless device, causing the processor to perform the method comprising: -
receiving an indication of a change of mode from the first to the second mode; and responsive to receipt of said indication, configuring the device so as to restrict synchronization of the data stored in the first database with the encrypted data stored in the second database, and to maintain said synchronization of the encrypted data stored in the second database with data stored by the remote server. - View Dependent Claims (19)
-
Specification