The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Nov. 09, 2021

Filed:

Oct. 18, 2018
Applicant:

L3 Technologies, Inc., New York, NY (US);

Inventors:

Glenn Coleman, Berwyn, PA (US);

Peter Martz, Marlton, NJ (US);

Kenneth Moritz, Lansdowne, PA (US);

Assignee:

L3 Technologies, Inc., New York, NY (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/53 (2013.01); H04L 29/06 (2006.01); H04L 29/08 (2006.01); H04W 12/06 (2021.01); H04W 12/088 (2021.01);
U.S. Cl.
CPC ...
G06F 21/53 (2013.01); H04L 63/0263 (2013.01); H04L 63/0281 (2013.01); H04L 63/083 (2013.01); H04L 63/0853 (2013.01); H04L 67/12 (2013.01); H04L 67/125 (2013.01); H04L 67/34 (2013.01); H04W 12/06 (2013.01); H04W 12/088 (2021.01); G06F 2221/2149 (2013.01);
Abstract

Systems, methods, and instrumentalities are disclosed for providing configurable and customizable internet isolation and security schemes for a mobile device. A mobile device (e.g., a cell phone, smart phone, tablet, Internet of Things (IoT) device, etc.) may include a processor and a memory. The mobile device may be configured to implement a workspace and an isolated computing environment. The workspace may enable operation of a set of applications (e.g., trusted applications) via a memory space (e.g., a trusted memory space). The isolated computing environment may enable operation of a set of one or more applications (e.g., untrusted applications) via a memory space (e.g., an untrusted memory space). The untrusted applications may include, for example, one or more of an Internet browser, an email application, a document editing application, or a social media application. The untrusted applications may communicate with one or more untrusted network destinations via a network.


Find Patent Forward Citations

Loading…