Selectively wiping a remote device
First Claim
1. A method of securing data on a client device, the client device storing data of a plurality of data types, the method comprising:
- determining, at a server, an authorization level for a command issuer when the command issuer logs into the server, the command issuer being associated with one of a plurality of authorization levels;
creating, at the server, a securing command for securing at least one data type based on the determined authorization level associated with the command issuer by;
determining that a subset of data types in the plurality of data types is available to be secured based on the determined authorization level associated with the command issuer;
receiving a selection of the at least one data type from the determined subset of data types; and
generating the securing command for securing the at least one data type from the subset of data types; and
sending the securing command from the server to the client device.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for selectively securing data from unauthorized access on a client device storing a plurality of data types with reference to an authorization level indicated in a command. A command is received at a client device comprising an authorization level indicator. Based on at least one predefined rule, which may be implemented in an IT policy stored at the client device, each of the plurality of data types to be secured is determined, and then the data corresponding to those types is secured. The data may be secured by encrypting and/or deleting the data at the client device. The predefined rules associated with each authorization level may be configured by a user or administrator having an authorization level that exceeds the associated authorization level.
-
Citations
20 Claims
-
1. A method of securing data on a client device, the client device storing data of a plurality of data types, the method comprising:
-
determining, at a server, an authorization level for a command issuer when the command issuer logs into the server, the command issuer being associated with one of a plurality of authorization levels; creating, at the server, a securing command for securing at least one data type based on the determined authorization level associated with the command issuer by; determining that a subset of data types in the plurality of data types is available to be secured based on the determined authorization level associated with the command issuer; receiving a selection of the at least one data type from the determined subset of data types; and generating the securing command for securing the at least one data type from the subset of data types; and sending the securing command from the server to the client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A server comprising:
-
a memory; a communication subsystem; and a processor operatively connected to the memory and the communication subsystem, the processor being configured to; determine an authorization level for a command issuer when the command issuer logs into the server, the command issuer being associated with one of a plurality of authorization levels; create a securing command for securing at least one data type based on the determined authorization level associated with the command issuer by; determining that a subset of data types in the plurality of data types is available to be secured based on the determined authorization level associated with the command issuer; receiving a selection of the at least one data type from the determined subset of data types; and generating the securing command for securing the at least one data type from the subset of data types; and send the securing command from the server to a client device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable medium storing code which, when executed by one or more processor of a server, cause the server to perform operations comprising:
-
determining an authorization level for a command issuer when the command issuer logs into the server, the command issuer being associated with one of a plurality of authorization levels; creating a securing command for securing at least one data type based on the determined authorization level associated with the command issuer by; determining that a subset of data types in the plurality of data types is available to be secured based on the determined authorization level associated with the command issuer; receiving a selection of the at least one data type from the determined subset of data types; and generating the securing command for securing the at least one data type from the subset of data types; and sending the securing command from the server to a client device.
-
Specification