Method and apparatus for providing subscriber identity module-based data encryption and remote management of portable storage devices
First Claim
1. A method for remotely managing a portable storage device, the method comprising:
- receiving, by a processor, a request from an endpoint device to send a command to the portable storage device;
authenticating, by the processor, the endpoint device that has sent the request; and
transmitting, by the processor, the command to the portable storage device, wherein the command is transmitted wirelessly, wherein the command comprises an unlock command for unlocking the portable storage device, wherein the portable storage device is a subscriber identity module card.
1 Assignment
0 Petitions
Accused Products
Abstract
Portable storage devices and methods for remotely managing such portable storage devices are disclosed. For example, a method receives a request from an endpoint device to send a command to a portable storage device. The method then authenticates the endpoint device that has sent the request. The method then transmits the command wirelessly to the portable storage device. Similarly, a portable storage device includes a processor and a computer-readable medium in communication with the processor, the computer-readable medium to store instructions. The instructions, when executed by the processor, cause the processor to perform operations that include: wirelessly receiving a command related to an access of a memory of the portable storage device, verifying an authenticity of the command and executing the command when the authenticity of the command is verified.
25 Citations
20 Claims
-
1. A method for remotely managing a portable storage device, the method comprising:
-
receiving, by a processor, a request from an endpoint device to send a command to the portable storage device; authenticating, by the processor, the endpoint device that has sent the request; and transmitting, by the processor, the command to the portable storage device, wherein the command is transmitted wirelessly, wherein the command comprises an unlock command for unlocking the portable storage device, wherein the portable storage device is a subscriber identity module card. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A portable storage device, comprising:
-
a processor; and a computer-readable medium storing a plurality of instructions which, when executed by the processor, cause the processor to perform operations, the operations comprising; receiving a command related to an access of a memory of the portable storage device, wherein the command is received wirelessly, wherein the command comprises an unlock command for unlocking the portable storage device, wherein the portable storage device is a subscriber identity module card; verifying an authenticity of the command; and executing the command when the authenticity of the command is verified. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A portable storage device, comprising:
-
a processor; and a computer-readable medium storing a plurality of instructions which, when executed by the processor, cause the processor to perform operations, the operations comprising; detecting a usage of the portable storage device, wherein the portable storage device is a subscriber identity module card; gathering usage information relating to the portable storage device, wherein the usage information comprises information related to a document that is accessed in the portable storage device; and transmitting the usage information that is gathered to a management server, wherein the usage information is transmitted wirelessly. - View Dependent Claims (20)
-
Specification