Selectively wiping a remote device
First Claim
1. A method of securing data on a client device, the method comprising:
- determining, at a server, an authorization level for a command issuer when the command issuer logs into the server, the command issuer being associated with one of a plurality of authorization levels;
creating, at the server, a securing command for securing the client device; and
transmitting the securing command from the server to the client device, wherein the securing command for securing the client device secures at least one data type in a plurality of data types that is not user-created data, and wherein the determined authorization level associated with the command issuer is an administrator authorization level, and wherein creating the securing command includes generating the securing command to secure data that is not user-created data and preventing the securing of user-created data.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for selectively securing data from unauthorized access on a client device storing a plurality of data types with reference to an authorization level indicated in a command. A command is received at a client device comprising an authorization level indicator. Based on at least one predefined rule, which may be implemented in an IT policy stored at the client device, each of the plurality of data types to be secured is determined, and then the data corresponding to those types is secured. The data may be secured by encrypting and/or deleting the data at the client device. The predefined rules associated with each authorization level may be configured by a user or administrator having an authorization level that exceeds the associated authorization level.
-
Citations
20 Claims
-
1. A method of securing data on a client device, the method comprising:
-
determining, at a server, an authorization level for a command issuer when the command issuer logs into the server, the command issuer being associated with one of a plurality of authorization levels; creating, at the server, a securing command for securing the client device; and transmitting the securing command from the server to the client device, wherein the securing command for securing the client device secures at least one data type in a plurality of data types that is not user-created data, and wherein the determined authorization level associated with the command issuer is an administrator authorization level, and wherein creating the securing command includes generating the securing command to secure data that is not user-created data and preventing the securing of user-created data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A server comprising:
-
a memory; a communication subsystem; and a processor operatively connected to the memory and the communication subsystem, the processor being configured to; determine an authorization level for a command issuer when the command issuer logs into the server, the command issuer being associated with one of a plurality of authorization levels; create a securing command for securing a client device; and transmit the securing command from the server to the client device, wherein the securing command for securing the client device secures at least one data type in a plurality of data types that is not user-created data, and wherein the determined authorization level associated with the command issuer is an administrator authorization level, and wherein creating the securing command includes generating the securing command to secure data that is not user-created data and preventing the securing of user-created data. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable medium storing code which, when executed by one or more processor of a server, cause the server to perform operations comprising:
-
determining an authorization level for a command issuer when the command issuer logs into the server, the command issuer being associated with one of a plurality of authorization levels; creating a securing command for securing a client device; and transmitting the securing command from the server to the client device, wherein the securing command for securing the client device secures at least one data type in a plurality of data types that is not user-created data, and wherein the determined authorization level associated with the command issuer is an administrator authorization level, and wherein creating the securing command includes generating the securing command to secure data that is not user-created data and preventing the securing of user-created data.
-
Specification