SIM level mobile security
First Claim
1. One or more non-transitory computer storage devices storing computer-executable instructions that, when executed, cause one or more processors to perform acts comprising:
- receiving a service request to perform a security function that affects a service provided to a first mobile device by a telecommunication network,wherein the service is provided by the telecommunication network to the first mobile device based on a subscriber identity module (SIM) card, andwherein the service request is responsive to a determination that the SIM card has been removed from a second mobile device;
receiving a geolocation of the first mobile device and locations included in a database of locations stored in the first mobile device;
determining, based at least in part on the geolocation and the locations, a nearest location for returning the first mobile device;
sending an activation command that triggers the first mobile device to display information that indicates the nearest location for returning the first mobile device; and
performing the security function that affects the service provided to the first mobile device in response to determining that at least one of a plurality of preconditions are satisfied.
3 Assignments
0 Petitions
Accused Products
Abstract
Mobile security techniques may protect information stored on a subscriber identity module (SIM) card as well as services that are accessible through the SIM card from unauthorized use. The techniques include receiving a service request to perform a security function at a server. The security function may affect a service provided to a mobile device by a telecommunication network, in which the mobile device obtains the service using a SIM card. The techniques further include performing the security function. The performance of the SIM function may be terminated in response to the server receiving a reversion command or an expiration of a predetermined time period.
59 Citations
20 Claims
-
1. One or more non-transitory computer storage devices storing computer-executable instructions that, when executed, cause one or more processors to perform acts comprising:
-
receiving a service request to perform a security function that affects a service provided to a first mobile device by a telecommunication network, wherein the service is provided by the telecommunication network to the first mobile device based on a subscriber identity module (SIM) card, and wherein the service request is responsive to a determination that the SIM card has been removed from a second mobile device; receiving a geolocation of the first mobile device and locations included in a database of locations stored in the first mobile device; determining, based at least in part on the geolocation and the locations, a nearest location for returning the first mobile device; sending an activation command that triggers the first mobile device to display information that indicates the nearest location for returning the first mobile device; and performing the security function that affects the service provided to the first mobile device in response to determining that at least one of a plurality of preconditions are satisfied. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer-implemented method, comprising:
-
receiving a service request to perform a security function at a security server, wherein the security function affects a service provided to a first mobile device by a telecommunication network based on a subscriber identity module (SIM) card, and wherein the service request is responsive to a determination that the SIM card has been removed from a second mobile device; receiving a geolocation of the first mobile device and locations included in a database of locations stored in the first mobile device; determining, based at least in part on the geolocation and the locations, a nearest location for returning the first mobile device; sending an activation command that triggers the first mobile device to display information that indicates the nearest location for returning the first mobile device; and performing the security function that affects the service provided to the first mobile device in response to determining that at least one of a plurality of preconditions are satisfied. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A mobile device, comprising:
-
one or more processors; a subscriber identity module (SIM) card; and memory that includes a plurality of computer-executable components comprising; a security component that performs actions in response to receiving an activation command from the security server, the actions including displaying information that indicates a nearest location for returning the mobile device, the nearest location being determined in part by providing a geolocation of the mobile device and locations that are stored in a database of the mobile device to the security server; wherein the security component performs the actions in response to determining that at least one of a plurality of preconditions are satisfied; and wherein the mobile device is configured to determine that the SIM card has been removed from another mobile device. - View Dependent Claims (19, 20)
-
Specification