IN2014CN00388A - - Google Patents

Info

Publication number
IN2014CN00388A
IN2014CN00388A IN388CHN2014A IN2014CN00388A IN 2014CN00388 A IN2014CN00388 A IN 2014CN00388A IN 388CHN2014 A IN388CHN2014 A IN 388CHN2014A IN 2014CN00388 A IN2014CN00388 A IN 2014CN00388A
Authority
IN
India
Prior art keywords
secure
data
mobile device
methods
devices
Prior art date
Application number
Inventor
Charles C Kelly
Joshua R Davis
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of IN2014CN00388A publication Critical patent/IN2014CN00388A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/082Access security using revocation of authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

Methods and devices provide a secure virtual environment within a mobile device for processing documents and conducting secure activities. The methods and devices create a secure application environment in which secure data and documents may be segregated from unsecured data using document encryption allowing the application of security policies to only the secure application environment. The creation of a secure application environment allows users to access and manipulate secure data on any mobile device not just specifically designated secure devices without having to secure all data on the mobile device while providing the corporate entity with necessary document security. The methods and devices provide for securing data on a mobile device at the data level using encryption.
IN388CHN2014 2011-08-10 2012-08-10 IN2014CN00388A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/207,134 US8949929B2 (en) 2011-08-10 2011-08-10 Method and apparatus for providing a secure virtual environment on a mobile device
PCT/US2012/050440 WO2013023179A1 (en) 2011-08-10 2012-08-10 Method and apparatus for providing a secure virtual environment on a mobile device

Publications (1)

Publication Number Publication Date
IN2014CN00388A true IN2014CN00388A (en) 2015-04-03

Family

ID=46750474

Family Applications (1)

Application Number Title Priority Date Filing Date
IN388CHN2014 IN2014CN00388A (en) 2011-08-10 2012-08-10

Country Status (7)

Country Link
US (1) US8949929B2 (en)
EP (1) EP2742710B1 (en)
JP (1) JP6014671B2 (en)
KR (1) KR101571641B1 (en)
CN (2) CN103733663A (en)
IN (1) IN2014CN00388A (en)
WO (1) WO2013023179A1 (en)

Families Citing this family (90)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8650620B2 (en) 2010-12-20 2014-02-11 At&T Intellectual Property I, L.P. Methods and apparatus to control privileges of mobile device applications
US9339727B2 (en) 2011-06-15 2016-05-17 Microsoft Technology Licensing, Llc Position-based decision to provide service
US8843764B2 (en) 2011-07-15 2014-09-23 Cavium, Inc. Secure software and hardware association technique
US8700709B2 (en) 2011-07-29 2014-04-15 Microsoft Corporation Conditional location-based reminders
US20130045729A1 (en) * 2011-08-17 2013-02-21 Microsoft Corporation Location-based promotion of applications
US8898459B2 (en) 2011-08-31 2014-11-25 At&T Intellectual Property I, L.P. Policy configuration for mobile device applications
US8918841B2 (en) * 2011-08-31 2014-12-23 At&T Intellectual Property I, L.P. Hardware interface access control for mobile applications
US9489541B2 (en) * 2011-09-09 2016-11-08 Nvidia Corporation Content protection via online servers and code execution in a secure operating system
US10165007B2 (en) * 2011-09-15 2018-12-25 Microsoft Technology Licensing, Llc Securing data usage in computing devices
US9280377B2 (en) 2013-03-29 2016-03-08 Citrix Systems, Inc. Application with multiple operation modes
US8869235B2 (en) 2011-10-11 2014-10-21 Citrix Systems, Inc. Secure mobile browser for protecting enterprise data
US9215225B2 (en) * 2013-03-29 2015-12-15 Citrix Systems, Inc. Mobile device locking with context
US8832799B2 (en) * 2011-10-31 2014-09-09 Motorola Mobility Llc Methods and apparatuses for hybrid desktop environment data usage authentication
US8893261B2 (en) 2011-11-22 2014-11-18 Vmware, Inc. Method and system for VPN isolation using network namespaces
KR101947651B1 (en) * 2012-03-21 2019-02-13 삼성전자주식회사 Trusted Mobile Web Client and Web Server System
US20130254906A1 (en) * 2012-03-22 2013-09-26 Cavium, Inc. Hardware and Software Association and Authentication
EP2836968B1 (en) 2012-04-13 2020-05-06 OLogN Technologies AG Apparatuses, methods and systems for computer-based secure transactions
TW201349009A (en) 2012-04-13 2013-12-01 Ologn Technologies Ag Secure zone for digital communications
TW201403375A (en) 2012-04-20 2014-01-16 歐樂岡科技公司 Secure zone for secure purchases
CN103596170A (en) * 2012-08-17 2014-02-19 中兴通讯股份有限公司 Method and system employing SIM card to encrypt terminal
US20140108558A1 (en) 2012-10-12 2014-04-17 Citrix Systems, Inc. Application Management Framework for Secure Data Sharing in an Orchestration Framework for Connected Devices
US9774658B2 (en) 2012-10-12 2017-09-26 Citrix Systems, Inc. Orchestration framework for connected devices
US8910239B2 (en) 2012-10-15 2014-12-09 Citrix Systems, Inc. Providing virtualized private network tunnels
US9971585B2 (en) 2012-10-16 2018-05-15 Citrix Systems, Inc. Wrapping unmanaged applications on a mobile device
US20140108793A1 (en) 2012-10-16 2014-04-17 Citrix Systems, Inc. Controlling mobile device access to secure data
CN104854561B (en) 2012-10-16 2018-05-11 思杰系统有限公司 Application program for application management framework encapsulates
EP2914942B1 (en) 2012-11-02 2023-06-14 Variable Inc. Computer-implemented system and method for color sensing, storage and comparison
US20140173692A1 (en) * 2012-12-15 2014-06-19 Sudharshan Srinivasan Bring your own device system using a mobile accessory device
US20140282543A1 (en) * 2013-03-15 2014-09-18 Ologn Technologies Ag Secure zone on a virutal machine for digital communications
CA2902292A1 (en) 2013-03-15 2014-09-18 Ologn Technologies Ag Systems, methods and apparatuses for securely storing and providing payment information
US8849978B1 (en) 2013-03-29 2014-09-30 Citrix Systems, Inc. Providing an enterprise application store
US9985850B2 (en) * 2013-03-29 2018-05-29 Citrix Systems, Inc. Providing mobile device management functionalities
US10284627B2 (en) 2013-03-29 2019-05-07 Citrix Systems, Inc. Data management for an application with multiple operation modes
US9355223B2 (en) 2013-03-29 2016-05-31 Citrix Systems, Inc. Providing a managed browser
KR102095912B1 (en) * 2013-05-15 2020-04-02 삼성전자 주식회사 Operating Method of Secure Indicator and Electronic Device supporting the same
US9927995B2 (en) * 2013-06-19 2018-03-27 Telefonaktiebolaget Lm Ericsson (Publ) Method and an integrated circuit for executing a trusted application within a trusted runtime environment
WO2015015473A1 (en) 2013-08-02 2015-02-05 Ologn Technologies Ag A secure server on a system with virtual machines
US9674323B1 (en) * 2013-08-29 2017-06-06 Variable, Inc. Modular multi-functional device, method, and system
EP2851833B1 (en) * 2013-09-20 2017-07-12 Open Text S.A. Application Gateway Architecture with Multi-Level Security Policy and Rule Promulgations
US10116697B2 (en) 2013-09-20 2018-10-30 Open Text Sa Ulc System and method for geofencing
US10824756B2 (en) 2013-09-20 2020-11-03 Open Text Sa Ulc Hosted application gateway architecture with multi-level security policy and rule promulgations
US9218494B2 (en) 2013-10-16 2015-12-22 Citrix Systems, Inc. Secure client drive mapping and file storage system for mobile device management type security
US9342331B2 (en) * 2013-10-21 2016-05-17 International Business Machines Corporation Secure virtualized mobile cellular device
US9729551B1 (en) * 2013-11-26 2017-08-08 Mobile Iron, Inc. Virtual mailbox
US9785794B2 (en) * 2013-12-12 2017-10-10 Citrix Systems, Inc. Securing sensitive data on a mobile device
US8886933B1 (en) * 2013-12-17 2014-11-11 Google Inc. Streamlined provisioning and configuration of computing devices
US9832172B2 (en) 2013-12-24 2017-11-28 Intel Corporation Content protection for data as a service (DaaS)
US9311484B2 (en) 2014-01-09 2016-04-12 International Business Machines Corporation Enhanced security and resource utilization in a multi-operating system environment
US9697374B2 (en) * 2014-02-19 2017-07-04 Microsoft Technology Licensing, Llc Data proxy service
US9760710B2 (en) * 2014-02-28 2017-09-12 Sap Se Password recovering for mobile applications
WO2015143554A1 (en) * 2014-03-24 2015-10-01 TrustPoint Innovation Technologies, Ltd. Management and distribution of security policies in a communication system
US9521116B2 (en) * 2014-06-11 2016-12-13 Verizon Patent And Licensing Inc. Apparatus, method, and system for securing a public wireless network
US9715597B2 (en) * 2014-09-25 2017-07-25 Mcafee, Inc. Data verification using enclave attestation
US9785999B2 (en) * 2014-10-02 2017-10-10 Coupa Software Incorporated Providing access to a networked application without authentication
US9507951B2 (en) * 2014-10-20 2016-11-29 Intel Corporation Technologies for secure input and display of virtual touch user interfaces
CN104331667B (en) * 2014-10-24 2018-10-26 宇龙计算机通信科技(深圳)有限公司 Data save method based on dual system and system
US9767324B2 (en) * 2014-11-22 2017-09-19 Intel Corporation Transparent execution of secret content
CN105762928B (en) * 2014-12-15 2019-07-26 国家电网公司 A kind of energy-accumulating power station monitoring system
CN107873079B (en) 2015-05-01 2019-08-02 变量公司 Intelligence is to Barebone and for the method for colored sensing device
BR102015015270B1 (en) * 2015-06-24 2022-11-29 Samsung Eletrônica Da Amazônia Ltda METHOD FOR PROVIDING A SECURITY MODE FOR MOBILE DEVICE APPLICATIONS
US11593075B2 (en) 2015-11-03 2023-02-28 Open Text Sa Ulc Streamlined fast and efficient application building and customization systems and methods
KR102088290B1 (en) * 2016-01-07 2020-03-12 한국전자통신연구원 Method of providing trusted service based on security area and apparatus using the same
US10419401B2 (en) * 2016-01-08 2019-09-17 Capital One Services, Llc Methods and systems for securing data in the public cloud
US11797706B2 (en) * 2016-02-09 2023-10-24 Health2047, Inc. Mobile device network traffic modification and user based restrictions on data access
DE102016210788B4 (en) * 2016-02-18 2023-06-07 Volkswagen Aktiengesellschaft Component for processing data worthy of protection and method for implementing a security function for protecting data worthy of protection in such a component
US11388037B2 (en) 2016-02-25 2022-07-12 Open Text Sa Ulc Systems and methods for providing managed services
US10498726B2 (en) * 2016-03-22 2019-12-03 International Business Machines Corporation Container independent secure file system for security application containers
US9769131B1 (en) * 2016-08-02 2017-09-19 Architecture Technology Corporation Fast reconfiguring environment for mobile computing devices
US10592639B2 (en) 2016-09-06 2020-03-17 Intel Corporation Blockchain-based shadow images to facilitate copyright protection of digital content
GB2555569B (en) * 2016-10-03 2019-06-12 Haddad Elias Enhanced computer objects security
US10574689B1 (en) * 2016-10-06 2020-02-25 Hoyos Vsn Corp. Mitigating mobile OS intrusions from user space applications using secure services and biometric identification
US10733284B2 (en) * 2016-10-06 2020-08-04 Samsung Electronics Co., Ltd. Trusted execution environment secure element communication
JP2018106455A (en) * 2016-12-27 2018-07-05 株式会社ケイエスジェイ Built-in apparatus
TWI673667B (en) * 2017-01-25 2019-10-01 楊建綱 Built-in smart security mobile device
US11122013B2 (en) * 2017-02-16 2021-09-14 Emerald Cactus Ventures, Inc. System and method for encrypting data interactions delineated by zones
US11165825B2 (en) 2017-02-16 2021-11-02 Emerald Cactus Ventures, Inc. System and method for creating encrypted virtual private network hotspot
WO2018151851A1 (en) * 2017-02-16 2018-08-23 Tenta, Llc System and method for establishing simultaneous encrypted virtual private networks from a single computing device
CN110463163B (en) * 2017-03-28 2022-08-05 Netapp股份有限公司 Method and system for providing wake-on-demand access to a session server
GB2561396B (en) 2017-04-13 2020-07-15 Barclays Execution Services Ltd Data security using two operating environments operating in parallel
CN107229863A (en) * 2017-06-12 2017-10-03 济南浪潮高新科技投资发展有限公司 A kind of secure operating environment virtual method
KR20190044815A (en) * 2017-10-23 2019-05-02 삼성전자주식회사 System for manageing security license for controlling security service and method for operating thereof
CN110362976B (en) * 2018-04-11 2021-05-07 旭景科技股份有限公司 Biometric security device
CN110765439B (en) * 2018-08-17 2023-01-31 安天科技集团股份有限公司 Method, device and storage medium for encrypting and authenticating mobile storage
US10746599B2 (en) 2018-10-30 2020-08-18 Variable, Inc. System and method for spectral interpolation using multiple illumination sources
US11586750B2 (en) * 2019-03-21 2023-02-21 Blackberry Limited Managing access to protected data file content
FR3100901B1 (en) * 2019-09-12 2021-08-27 Stmicroelectronics Grand Ouest Sas Memory protection system
US11012326B1 (en) 2019-12-17 2021-05-18 CloudFit Software, LLC Monitoring user experience using data blocks for secure data access
CN111756718B (en) * 2020-06-15 2022-09-30 深信服科技股份有限公司 Terminal, access method, system, server and computer readable storage medium
US11716355B1 (en) 2020-11-24 2023-08-01 Wells Fargo Bank, N.A. Company controlled virtual computer over a network
FR3128040B1 (en) * 2021-10-08 2023-10-27 Cyferall Security application for a computing device, security system and corresponding security architecture

Family Cites Families (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040163087A1 (en) * 2003-02-14 2004-08-19 Carl Sandland Computer program code and method for delivering external data to a process running on a virtual machine
WO2006018890A1 (en) * 2004-08-20 2006-02-23 Mitsubishi Denki Kabushiki Kaisha Memory card, data exchanging system, and data exchanging method
EP1811387A4 (en) * 2004-08-25 2016-04-13 Nec Corp Information communication device, and program execution environment control method
CN100388666C (en) * 2004-12-09 2008-05-14 腾讯科技(深圳)有限公司 Method and system for controlling data transmission procedure
US8060683B2 (en) * 2004-12-17 2011-11-15 International Business Machines Corporation System, method and program to preserve a cache of a virtual machine
US7823214B2 (en) * 2005-01-07 2010-10-26 Apple Inc. Accessory authentication for electronic devices
US7693838B2 (en) * 2005-11-12 2010-04-06 Intel Corporation Method and apparatus for securely accessing data
US7984109B2 (en) 2006-02-24 2011-07-19 Qualcomm Incorporated System and method for storing and accessing data files at wireless devices
US7779252B2 (en) 2006-03-21 2010-08-17 Harris Corporation Computer architecture for a handheld electronic device with a shared human-machine interface
GB2440170B8 (en) 2006-07-14 2014-07-16 Vodafone Plc Digital rights management
US8126506B2 (en) * 2007-02-14 2012-02-28 Nuance Communications, Inc. System and method for securely managing data stored on mobile devices, such as enterprise mobility data
JP4987555B2 (en) * 2007-04-27 2012-07-25 株式会社東芝 Information processing apparatus and information processing system
US8769268B2 (en) * 2007-07-20 2014-07-01 Check Point Software Technologies, Inc. System and methods providing secure workspace sessions
EP2183695B1 (en) * 2007-07-20 2014-11-12 Nxp B.V. Device with a secure virtual machine
US8554176B2 (en) * 2007-09-18 2013-10-08 Qualcomm Incorporated Method and apparatus for creating a remotely activated secure backup service for mobile handsets
US9003173B2 (en) 2007-09-28 2015-04-07 Microsoft Technology Licensing, Llc Multi-OS (operating system) boot via mobile device
JP2009169841A (en) * 2008-01-18 2009-07-30 Panasonic Corp Information processor and portable telephone device
JP2009223776A (en) * 2008-03-18 2009-10-01 Univ Of Tsukuba Information processing system, program for information processing system, and access control method for client device
KR101331032B1 (en) * 2008-07-30 2013-11-19 삼성전자주식회사 Method for executing application associated with virtualized environment
US8453144B1 (en) * 2008-09-23 2013-05-28 Gogrid, LLC System and method for adapting a system configuration using an adaptive library
US9026918B2 (en) * 2008-10-16 2015-05-05 Accenture Global Services Limited Enabling a user device to access enterprise data
JP2010097567A (en) * 2008-10-20 2010-04-30 Hitachi Ltd Device connection control method
JP2010257289A (en) * 2009-04-27 2010-11-11 Nec Corp Communication apparatus, method for controlling communication apparatus, and program
US8107927B2 (en) 2009-06-18 2012-01-31 T-Mobile Usa, Inc. Dedicated memory partitions for users of a shared mobile device
US8302094B2 (en) * 2009-06-26 2012-10-30 Vmware, Inc. Routing a physical device request using transformer stack to an equivalent physical device in a virtualized mobile device
WO2011007017A1 (en) 2009-07-13 2011-01-20 Zitralia Seguridad Informática, S.L. Electronic device for generating a secure environment
US8689213B2 (en) * 2009-12-14 2014-04-01 Citrix Systems, Inc. Methods and systems for communicating between trusted and non-trusted virtual machines
US8307169B2 (en) * 2011-03-10 2012-11-06 Safenet, Inc. Protecting guest virtual machine memory
US10503343B2 (en) * 2011-07-06 2019-12-10 Microsoft Technology Licensing, Llc Integrated graphical user interface

Also Published As

Publication number Publication date
JP2014525612A (en) 2014-09-29
CN110598395A (en) 2019-12-20
EP2742710A1 (en) 2014-06-18
WO2013023179A1 (en) 2013-02-14
US20130042295A1 (en) 2013-02-14
JP6014671B2 (en) 2016-10-25
CN103733663A (en) 2014-04-16
US8949929B2 (en) 2015-02-03
EP2742710B1 (en) 2020-09-23
KR101571641B1 (en) 2015-11-24
KR20140058623A (en) 2014-05-14

Similar Documents

Publication Publication Date Title
IN2014CN00388A (en)
AU2018256568A1 (en) Systems and methods for software based encryption
WO2012016091A3 (en) Protecting documents using policies and encryption
WO2017034642A3 (en) Optimizable full-path encryption in a virtualization environment
EP2565862A4 (en) Encryption processing system, key generation device, encryption device, decryption device, signature processing system, signature device and verification device
EP2525340A4 (en) Confidential search system and encryption processing system
EP3118771A4 (en) Confidential data management method and device, and security authentication method and system
WO2011083343A3 (en) System and method of enforcing a computer policy
GB2534470A (en) Method and apparatus for managing access to electronic content
GB2496354B (en) A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
EP2884690A4 (en) Re-encryption key generation device, re-encryption device, encryption device, decryption device, and program
GB2506066A (en) Zero sign-on authentication
WO2014009813A3 (en) Secure storage system and uses thereof
WO2016122747A3 (en) Storage for encrypted data with enhanced security
EP2524334A4 (en) System and methods for generating unclonable security keys in integrated circuits
EP3036703A4 (en) System and method for graduated security in user authentication
EP3627843A3 (en) Systems and methods for performing transport i/o
EP2882132A4 (en) Shared secret key generation device, encryption device, decryption device, shared secret key generation method, encryption method, decryption method, and program
PH12018550176A1 (en) Using hardware based secure isolated region to prevent piracy and cheating on electronic devices
GB201414383D0 (en) Encrypted biometric data management and retrieval
EP2947810A4 (en) Encryption system, re-encryption key generation device, re-encryption device, encryption method and encryption program
WO2013130561A3 (en) Method of operating a computing device, computing device and computer program
EP3017562A4 (en) A method and apparatus for anonymous authentication on trust in social networking
EP2874344A4 (en) User terminal device and encryption method for encrypting in cloud computing environment
MX2016009066A (en) Systems and methods with cryptography and tamper resistance software security.