System and method for secure control of resources of wireless mobile communication devices
First Claim
1. A method implemented on a wireless communication device, the method comprising:
- storing corporate data and other data on the wireless communication device, wherein the corporate data is stored in a corporate domain of the wireless communication device and the other data is not stored in the corporate domain, wherein the corporate data is controlled by a corporate entity and the other data is controlled by a user of the wireless communication device;
receiving, via a communication pipe, a request to access the corporate data; and
controlling access, by a mobile device security firewall, to the corporate data based on whether the communication pipe is in the corporate domain.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless mobile communication device asset. When a request to perform an operation affecting at least one of the assets is received, it is determined whether the request is permitted by the domain that includes the at least one affected asset, by determining whether the entity with which the request originated has a trust relationship with the domain, for example. The operation is completed where it is permitted by the domain. Wireless mobile communication device assets include software applications, persistent data, communication pipes, and configuration data, properties or user or subscriber profiles.
101 Citations
20 Claims
-
1. A method implemented on a wireless communication device, the method comprising:
-
storing corporate data and other data on the wireless communication device, wherein the corporate data is stored in a corporate domain of the wireless communication device and the other data is not stored in the corporate domain, wherein the corporate data is controlled by a corporate entity and the other data is controlled by a user of the wireless communication device; receiving, via a communication pipe, a request to access the corporate data; and controlling access, by a mobile device security firewall, to the corporate data based on whether the communication pipe is in the corporate domain. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A wireless communication device, comprising:
-
at least one memory storing corporate data and other data on the wireless communication device, wherein the corporate data is stored in a corporate domain of the wireless communication device and the other data is not stored in the corporate domain, wherein the corporate data is controlled by a corporate entity and the other data is controlled by a user of the wireless communication device; and a controller configured to receive, via a communication pipe, a request to access the corporate data, and to control access, via a mobile device security firewall, to the corporate data based on whether the communication pipe is in the corporate domain. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium, comprising:
-
program code executable by a processor such that when executed, cause a wireless communication device to; store corporate data and other data on the wireless communication device, wherein the corporate data is stored in a corporate domain of the wireless communication device and the other data is not stored in the corporate domain, wherein the corporate data is controlled by a corporate entity and the other data is controlled by a user of the wireless communication device; receive, via a communication pipe, a request to access the corporate data; and control access, by a mobile device security firewall, to the corporate data based on whether the communication pipe is in the corporate domain. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification