Protecting sensitive data in a security area
First Claim
Patent Images
1. A method for managing data security on a mobile device, comprising:
- receiving data associated with a mobile device, the data comprising an identification (ID) of the mobile device and a location of the mobile device relative to one or more location sensor devices;
determining a path, relative to the one or more location sensor devices, through which the mobile device has traveled;
communicating an electronic security key to the mobile device based on determining that the path corresponds to a defined path associated with the mobile device;
updating the electronic security key based on a length of time remaining stationary;
receiving a communication from one or more location sensors that the mobile device has left a secure location;
generating an alert message to a system administrator;
reactivating a revoked electronic security key based on determining that the mobile device has returned to the secure location; and
invalidating the electronic key based on determining that the mobile device is not registered based on querying a registration database.
1 Assignment
0 Petitions
Accused Products
Abstract
Managing data security on a mobile device. Data associated with a mobile device is received; the data includes an identification (ID) of the mobile device and a location of the mobile device relative to one or more location sensor devices. A path is determined, relative to the one or more location sensor devices, through which the mobile device has traveled. An electronic security key is communicated to the mobile device based on determining that the path corresponds to a defined path associated with the mobile device.
-
Citations
17 Claims
-
1. A method for managing data security on a mobile device, comprising:
-
receiving data associated with a mobile device, the data comprising an identification (ID) of the mobile device and a location of the mobile device relative to one or more location sensor devices; determining a path, relative to the one or more location sensor devices, through which the mobile device has traveled; communicating an electronic security key to the mobile device based on determining that the path corresponds to a defined path associated with the mobile device; updating the electronic security key based on a length of time remaining stationary; receiving a communication from one or more location sensors that the mobile device has left a secure location; generating an alert message to a system administrator; reactivating a revoked electronic security key based on determining that the mobile device has returned to the secure location; and invalidating the electronic key based on determining that the mobile device is not registered based on querying a registration database. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer system for managing data security on a mobile device, comprising:
-
a computer device having a processor and a tangible storage device; and a program embodied on the storage device for execution by the processor, the program having a plurality of program instructions comprising program instructions for; receiving data associated with a mobile device, the data comprising an identification (ID) of the mobile device and a location of the mobile device relative to one or more location sensor devices; determining a path, relative to the one or more location sensor devices, through which the mobile device has traveled; communicating an electronic security key to the mobile device based on determining that the path corresponds to a defined path associated with the mobile device; updating the electronic security key based on a length of time remaining stationary; receiving a communication from one or more location sensors that the mobile device has left a secure location; generating an alert message to a system administrator; reactivating a revoked electronic security key based on determining that the mobile device has returned to the secure location; and invalidating the electronic key based on determining that the mobile device is not registered based on querying a registration database. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A computer program product for managing data security on a mobile device, comprising a non-transitory tangible storage device having program code embodied therewith, the program code executable by a processor of a computer to perform a method, the method comprising:
-
receiving data associated with a mobile device, by the processor, the data comprising an identification (ID) of the mobile device and a location of the mobile device relative to one or more location sensor devices; determining a path, relative to the one or more location sensor devices, through which the mobile device has traveled; communicating an electronic security key to the mobile device based on determining that the path corresponds to a defined path associated with the mobile device; updating the electronic security key based on a length of time remaining stationary; receiving a communication from one or more location sensors that the mobile device has left a secure location; generating an alert message to a system administrator; reactivating a revoked electronic security key based on determining that the mobile device has returned to the secure location; and invalidating the electronic key, by the processor, based on determining that the mobile device is not registered based on querying a registration database. - View Dependent Claims (14, 15, 16, 17)
-
Specification