Proactive security for mobile devices
First Claim
1. A method executed by a mobile device, the method comprising:
- detecting a security event occurring at the mobile device that indicates an unauthorized access of the mobile device;
in response to detecting the security event, identifying, among a plurality of risk factors, a risk factor that corresponds to a level of the unauthorized access, wherein each risk factor of the plurality of risk factors corresponds to a respective different information security scheme; and
in response to identifying the risk factor;
performing at least one security act that includes sending a security alert to a server, wherein the security alert identifies a current security status of the mobile device and a description of the security event, andsetting the mobile device to a secure mode of operation that causes the mobile device to selectively protect individual data items managed by the mobile device in accordance with the respective different information security scheme.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods, program products, and systems for proactively securing mobile devices are described. A mobile device can proactively determine whether the mobile device is associated with a security risk and the level of the security risk. Upon determining a security risk, the mobile device can transmit coordinates of its current geographic location to a server. To protect privacy of authorized users, the transmission can be disabled by entering a password. If multiple failed password attempts are detected, the mobile device can proactively increase a security level of the device, and selectively protect files or other content stored on the mobile device. In some implementations, the mobile device can be transitioned into a surveillance mode where the mobile device records or captures information associated with one or more of user actions, ambient sound, images, a trajectory of the device, and transmits the recorded or captured information to the network resource.
23 Citations
20 Claims
-
1. A method executed by a mobile device, the method comprising:
-
detecting a security event occurring at the mobile device that indicates an unauthorized access of the mobile device; in response to detecting the security event, identifying, among a plurality of risk factors, a risk factor that corresponds to a level of the unauthorized access, wherein each risk factor of the plurality of risk factors corresponds to a respective different information security scheme; and in response to identifying the risk factor; performing at least one security act that includes sending a security alert to a server, wherein the security alert identifies a current security status of the mobile device and a description of the security event, and setting the mobile device to a secure mode of operation that causes the mobile device to selectively protect individual data items managed by the mobile device in accordance with the respective different information security scheme. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A mobile device, comprising:
-
at least one processor; and at least one memory configured to store instructions that, when executed by the at least one processor, cause the mobile device to carry out steps that include; detecting a security event occurring at the mobile device that indicates an unauthorized access of the mobile device; in response to detecting the security event, identifying, among a plurality of risk factors, a risk factor that corresponds to a level of the unauthorized access, wherein each risk factor of the plurality of risk factors corresponds to a respective different information security scheme; and in response to identifying the risk factor; performing at least one security act that includes sending a security alert to a server, wherein the security alert identifies a current security status of the mobile device and a description of the security event, and setting the mobile device to a secure mode of operation that causes the mobile device to selectively protect individual data items managed by the mobile device in accordance with the respective different information security scheme. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. At least one non-transitory computer readable storage medium configured to store instructions that, when executed by at least one processor included in a mobile device, cause the mobile device to carry out steps that include:
-
detecting a security event occurring at the mobile device that indicates an unauthorized access of the mobile device; in response to detecting the security event, identifying, among a plurality of risk factors, a risk factor that corresponds to a level of the unauthorized access, wherein each risk factor of the plurality of risk factors corresponds to a respective different information security scheme; and in response to identifying the risk factor; performing at least one security act that includes sending a security alert to a server, wherein the security alert identifies a current security status of the mobile device and a description of the security event, and setting the mobile device to a secure mode of operation that causes the mobile device to selectively protect individual data items managed by the mobile device in accordance with the respective different information security scheme. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification