By a News Reporter-Staff News Editor at Politics & Government Week -- A patent application by the inventor Desai, Nitin (Coral Springs, FL), filed on December 12, 2013, was made available online on June 25, 2015, according to news reporting originating from Washington, D.C., by VerticalNews correspondents.
This patent application is assigned to Citrix Systems, Inc.
The following quote was obtained by the news editors from the background information supplied by the inventors: "The securing of data is an important asset for any enterprise. Many Information Technology ('IT') departments attempt to be in complete control over company data, especially with regard to employees' mobile or portable devices, which can be easily lost or stolen. Innovations exist for securing data on an end-user device. For example, there are encryption features and applications that may wipe data in case of theft or loss. However, there is a need for better solutions for sending data messages that include highly-sensitive data to unsecured or Bring Your Own Device ('BYOD') devices without data leakage."
In addition to the background information obtained for this patent application, VerticalNews journalists also obtained the inventor's summary information for this patent application: "The following presents a simplified summary of various aspects described herein. This summary is not an extensive overview, and is not intended to identify key or critical elements or to delineate the scope of the claims. The following summary merely presents some concepts in a simplified form as an introductory prelude to the more detailed description provided below.
"To overcome limitations in the prior art described above, and to overcome other limitations that will be apparent upon reading and understanding the present specification, the specification is directed to adding an additional level of security for highly sensitive data. According to one aspect, once sent, data messages may self-destruct upon meeting certain destruction criteria on a receiving device. This self-destruction would allow data messages to be sent to unsecured and/or BYOD devices without fear of data leakage.
"Aspects of this disclosure relate to the automatic destruction of data messages sent to unsecured or BYOD devices.
"In one embodiment, an application on a first mobile device sends a message to a managed application on a separate mobile device that has policy files that instruct the managed application to delete the message when certain destruction criteria in the policy files are met. The criteria may include a restriction as to receipt from a particular application or device, a limit as to the length of time the data message has been viewed, the number of times a data message has been viewed, or the knowledge of a security threat to the second device.
"Additionally, or in the alternative, a first application on a first mobile device creates a data message including destruction criteria to send to a managed application on a second mobile device. These criteria, if met, cause the self-destruction of the message. A managed application on a separate mobile device receives the data message and receives policy files instructing the managed application as to the criteria of the data message. The managed application uses those criteria to determine whether the data message should be deleted.
BRIEF DESCRIPTION OF THE DRAWINGS
"A more complete understanding of the present disclosure and the advantages thereof may be acquired by referring to the following description in consideration of the accompanying drawings, in which like reference numbers indicate like features, and wherein:
"FIG. 1 depicts an illustrative computer system architecture that may be used in accordance with one or more illustrative aspects described herein.
"FIG. 2 depicts an illustrative enterprise mobility management system.
"FIG. 3 depicts another illustrative enterprise mobility management system.
"FIG. 4 depicts an illustrative data message transference between an application and a managed application on mobile devices.
"FIGS. 5A-5B depict a method in which a data message is deleted if certain criteria in the managed application's policy files are met.
"FIG. 6 depicts an illustrative data message transfer between an application and a managed application on mobile devices such that the data message includes destruction criteria.
"FIGS. 7A-7B depict a method in which a data message is deleted if certain criteria in the policy files and the data message are met."
URL and more information on this patent application, see: Desai, Nitin. Securing Sensitive Data on a Mobile Device. Filed December 12, 2013 and posted June 25, 2015. Patent URL: http://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&r=3397&p=68&f=G&l=50&d=PG01&S1=20150618.PD.&OS=PD/20150618&RS=PD/20150618
Keywords for this news article include: Citrix Systems Inc.
Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2015, NewsRx LLC