×

Mobile device data security system

  • US 10,002,248 B2
  • Filed: 01/04/2016
  • Issued: 06/19/2018
  • Est. Priority Date: 01/04/2016
  • Status: Active Grant
First Claim
Patent Images

1. A mobile device data security system, the system comprising:

  • at least one non-transitory storage device;

    at least one processor; and

    at least one module stored in said storage device and comprising instruction code that is executable by the at least one processor and configured to cause said at least one processor to;

    provide a data security application for installation on a mobile device of a user;

    establish a communication link with the mobile device, wherein establishing further comprises creating a wireless data channel with the mobile device;

    receive, via the established communication link, information associated with one or more third-party applications stored on the mobile device;

    initiate a scan, via the established communication link, to determine whether the one or more third-party applications and one or more components associated with the mobile device are associated with a malicious code;

    transmit control signals, via the established communication link, configured to cause the data security application to begin running in the background of the mobile device in response to determining that the one or more third-party applications and the one or more components associated with the mobile device are associated with the malicious code;

    initiate, via the data security application, one or more actions to be executed on the mobile device of the user based on at least determining that the one or more third-party applications and the one or more components associated with the mobile device are associated with the malicious code, wherein initiating further comprises retrieving one or more user preferences associated with the one or more actions to be executed on the mobile device of the user, wherein the one or more actions limit one or more functionalities of the mobile device, wherein limiting further comprises disabling user access to one or more specific features associated with the one or more third-party applications, wherein the one or more user preferences comprises identifying the one or more specific features in each of the one or more third-party applications to be disabled;

    determine a sensitivity score associated with the one or more third-party applications indicating which of the one or more third-party applications requires protection from unauthorized access to safeguard privacy and/or security of the user;

    determine one or more specific features associated with the one or more third-party applications to disable based on at least the sensitivity score associated with the one or more third-party applications;

    execute, via the data security application, the one or more actions on the mobile device of the user;

    receive, via the data security application, a user input requesting access to at least one of the one or more specific features disabled due to the malicious code;

    determine a level of authentication required to access the at least one of the one or more specific features disabled due to the malicious code;

    receive, via the data security application, one or more authentication credentials associated with the user;

    determine that the one or more authentication credentials received from the user meets the level of authentication required to access the at least one of the one or more specific features disabled due to the malicious code; and

    restore user access to the at least one of the one or more specific features disabled due to the malicious code based on at least determining that the one or more authentication credentials meets the level of authentication required to access the at least one of the one or more specific features,wherein limiting further comprises disabling all wireless communication transmitted or receive from the mobile device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×