Mobile device data security system
First Claim
1. A mobile device data security system, the system comprising:
- at least one non-transitory storage device;
at least one processor; and
at least one module stored in said storage device and comprising instruction code that is executable by the at least one processor and configured to cause said at least one processor to;
provide a data security application for installation on a mobile device of a user;
establish a communication link with the mobile device, wherein establishing further comprises creating a wireless data channel with the mobile device;
receive, via the established communication link, information associated with one or more third-party applications stored on the mobile device;
initiate a scan, via the established communication link, to determine whether the one or more third-party applications and one or more components associated with the mobile device are associated with a malicious code;
transmit control signals, via the established communication link, configured to cause the data security application to begin running in the background of the mobile device in response to determining that the one or more third-party applications and the one or more components associated with the mobile device are associated with the malicious code;
initiate, via the data security application, one or more actions to be executed on the mobile device of the user based on at least determining that the one or more third-party applications and the one or more components associated with the mobile device are associated with the malicious code, wherein initiating further comprises retrieving one or more user preferences associated with the one or more actions to be executed on the mobile device of the user, wherein the one or more actions limit one or more functionalities of the mobile device, wherein limiting further comprises disabling user access to one or more specific features associated with the one or more third-party applications, wherein the one or more user preferences comprises identifying the one or more specific features in each of the one or more third-party applications to be disabled;
determine a sensitivity score associated with the one or more third-party applications indicating which of the one or more third-party applications requires protection from unauthorized access to safeguard privacy and/or security of the user;
determine one or more specific features associated with the one or more third-party applications to disable based on at least the sensitivity score associated with the one or more third-party applications;
execute, via the data security application, the one or more actions on the mobile device of the user;
receive, via the data security application, a user input requesting access to at least one of the one or more specific features disabled due to the malicious code;
determine a level of authentication required to access the at least one of the one or more specific features disabled due to the malicious code;
receive, via the data security application, one or more authentication credentials associated with the user;
determine that the one or more authentication credentials received from the user meets the level of authentication required to access the at least one of the one or more specific features disabled due to the malicious code; and
restore user access to the at least one of the one or more specific features disabled due to the malicious code based on at least determining that the one or more authentication credentials meets the level of authentication required to access the at least one of the one or more specific features,wherein limiting further comprises disabling all wireless communication transmitted or receive from the mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, computer program products, and methods are described herein for a mobile device data security system. The present invention is configured to establish a communication link with the mobile device; receive, via the established communication link, information associated with one or more third-party applications stored on the mobile device; initiate a scan, via the established communication link, to determine whether the one or more third-party applications are associated with a malicious code; transmit control signals, via the established communication link, configured to cause the data security application to begin running in the background of the mobile device in response to determining that the one or more third-party applications are associated with the malicious code; and initiate, via the data security application, one or more actions to be executed on the mobile device of the user, wherein the one or more actions limit one or more functionalities of the mobile device.
60 Citations
14 Claims
-
1. A mobile device data security system, the system comprising:
-
at least one non-transitory storage device; at least one processor; and at least one module stored in said storage device and comprising instruction code that is executable by the at least one processor and configured to cause said at least one processor to; provide a data security application for installation on a mobile device of a user; establish a communication link with the mobile device, wherein establishing further comprises creating a wireless data channel with the mobile device; receive, via the established communication link, information associated with one or more third-party applications stored on the mobile device; initiate a scan, via the established communication link, to determine whether the one or more third-party applications and one or more components associated with the mobile device are associated with a malicious code; transmit control signals, via the established communication link, configured to cause the data security application to begin running in the background of the mobile device in response to determining that the one or more third-party applications and the one or more components associated with the mobile device are associated with the malicious code; initiate, via the data security application, one or more actions to be executed on the mobile device of the user based on at least determining that the one or more third-party applications and the one or more components associated with the mobile device are associated with the malicious code, wherein initiating further comprises retrieving one or more user preferences associated with the one or more actions to be executed on the mobile device of the user, wherein the one or more actions limit one or more functionalities of the mobile device, wherein limiting further comprises disabling user access to one or more specific features associated with the one or more third-party applications, wherein the one or more user preferences comprises identifying the one or more specific features in each of the one or more third-party applications to be disabled; determine a sensitivity score associated with the one or more third-party applications indicating which of the one or more third-party applications requires protection from unauthorized access to safeguard privacy and/or security of the user; determine one or more specific features associated with the one or more third-party applications to disable based on at least the sensitivity score associated with the one or more third-party applications; execute, via the data security application, the one or more actions on the mobile device of the user; receive, via the data security application, a user input requesting access to at least one of the one or more specific features disabled due to the malicious code; determine a level of authentication required to access the at least one of the one or more specific features disabled due to the malicious code; receive, via the data security application, one or more authentication credentials associated with the user; determine that the one or more authentication credentials received from the user meets the level of authentication required to access the at least one of the one or more specific features disabled due to the malicious code; and restore user access to the at least one of the one or more specific features disabled due to the malicious code based on at least determining that the one or more authentication credentials meets the level of authentication required to access the at least one of the one or more specific features, wherein limiting further comprises disabling all wireless communication transmitted or receive from the mobile device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computerized method for remotely controlling access to a mobile device, the method comprising:
-
providing, using a computing device processor, a data security application for installation on a mobile device of a user; establishing, using a computing device processor, a communication link with the mobile device, wherein establishing further comprises creating a wireless data channel with the mobile device; receiving, via the established communication link, information associated with one or more third-party applications stored on the mobile device; initiating a scan, via the established communication link, to determine whether the one or more third-party applications and one or more components associated with the mobile device are associated with a malicious code; transmitting control signals, via the established communication link, configured to cause the data security application to begin running in the background of the mobile device in response to determining that the one or more third-party applications and one or more components associated with the mobile device are associated with the malicious code; and initiating, via the data security application, one or more actions to be executed on the mobile device of the user based on at least determining that the one or more third-party applications and one or more components associated with the mobile device are associated with the malicious code, wherein initiating further comprises retrieving one or more user preferences associated with the one or more actions to be executed on the mobile device of the user, wherein the one or more actions limit one or more functionalities of the mobile device, wherein limiting further comprises disabling user access to one or more specific features associated with the one or more third-party applications, wherein the one or more user preferences comprises identifying the one or more specific features in each of the one or more third-party applications to be disabled; determining, using a computing device processor, a sensitivity score associated with the one or more third-party applications indicating which of the one or more third-party applications requires protection from unauthorized access to safeguard privacy and/or security of the user; determining, using a computing device processor, one or more specific features associated with the one or more third-party applications to disable based on at least the sensitivity score associated with the one or more third-party applications; executing, via the data security application, the one or more actions on the mobile device of the user; receiving, via the data security application, a user input requesting access to at least one of the one or more specific features disabled due to the malicious code; determining, using a computing device processor, a level of authentication required to access the at least one of the one or more specific features disabled due to the malicious code; receiving, via the data security application, one or more authentication credentials associated with the user; determining, using a computing device processor, that the one or more authentication credentials received from the user meets the level of authentication required to access the at least one of the one or more specific features disabled due to the malicious code; and restoring, via the data security application, user access to the at least one of the one or more specific features disabled due to the malicious code based on at least determining that the one or more authentication credentials meets the level of authentication required to access the at least one of the one or more specific features, wherein limiting further comprises disabling all wireless communication transmitted or receive from the mobile device. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer program product for mobile device data security system, the computer program product comprising a non-transitory computer-readable medium comprising code causing a first apparatus to:
-
provide a data security application for installation on a mobile device of a user; establish a communication link with the mobile device, wherein establishing further comprises creating a wireless data channel with the mobile device; receive, via the established communication link, information associated with one or more third-party applications stored on the mobile device; initiate a scan, via the established communication link, to determine whether the one or more third-party applications and one or more components associated with the mobile device are associated with a malicious code; transmit control signals, via the established communication link, configured to cause the data security application to begin running in the background of the mobile device in response to determining that the one or more third-party applications and the one or more components associated with the mobile device are associated with the malicious code; initiate, via the data security application, one or more actions to be executed on the mobile device of the user based on at least determining that the one or more third-party applications and the one or more components associated with the mobile device are associated with the malicious code, wherein initiating further comprises retrieving one or more user preferences associated with the one or more actions to be executed on the mobile device of the user, wherein the one or more actions limit one or more functionalities of the mobile device, wherein limiting further comprises disabling user access to one or more specific features associated with the one or more third-party applications, wherein the one or more user preferences comprises identifying the one or more specific features in each of the one or more third-party applications to be disabled; determine a sensitivity score associated with the one or more third-party applications indicating which of the one or more third-party applications requires protection from unauthorized access to safeguard privacy and/or security of the user; determine one or more specific features associated with the one or more third-party applications to disable based on at least the sensitivity score associated with the one or more third-party applications; execute, via the data security application, the one or more actions on the mobile device of the user; receive, via the data security application, a user input requesting access to at least one of the one or more specific features disabled due to the malicious code; determine a level of authentication required to access the at least one of the one or more specific features disabled due to the malicious code; receive, via the data security application, one or more authentication credentials associated with the user; determine that the one or more authentication credentials received from the user meets the level of authentication required to access the at least one of the one or more specific features disabled due to the malicious code; and restore user access to the at least one of the one or more specific features disabled due to the malicious code based on at least determining that the one or more authentication credentials meets the level of authentication required to access the at least one of the one or more specific features, wherein limiting further comprises disabling all wireless communication transmitted or receive from the mobile device. - View Dependent Claims (12, 13, 14)
-
Specification