System and method for preventing access to data on a compromised remote device
First Claim
Patent Images
1. A method, comprising:
- receiving an indication that a remote device is compromised;
selecting at least one subset of data from the remote device; and
transmitting;
to the remote device, a command-to prevent access to the at least one subset of data.
4 Assignments
0 Petitions
Accused Products
Abstract
This invention discloses a system and method for selective erasure, encryption and or copying of data on a remote device if the remote device has been compromised or the level of authorization of a roaming user in charge of the remote device has been modified.
120 Citations
48 Claims
-
1. A method, comprising:
-
receiving an indication that a remote device is compromised;
selecting at least one subset of data from the remote device; and
transmitting;
to the remote device, a command-to prevent access to the at least one subset of data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 40)
-
-
12. A computer-readable medium having stored thereon instructions to cause a computer to execute a method, the method comprising:
-
receiving an indication that a remote device is compromised;
selecting at least one subset of data from the remote device; and
transmitting, to the remote device, a command to prevent access to the at least one subset of data.
-
-
13. A system, comprising:
-
a procedures file indicating techniques for preventing at least a subset of data on a remote device from being accessed; and
a server, communicatively coupled to the procedure file and to the remote device, capable of receiving an indication that a remote device is compromised, selecting at least one subset of data from the remote device, and transmitting, to the remote device, a command to prevent access to the at least one subset of data according to the procedures file. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A system, comprising:
-
means for receiving an indication that a remote device is compromised;
means for selecting at least one subset of data from the remote device; and
means for transmitting, to the remote device, a command to prevent access to the at least one subset of data.
-
-
25. A method, comprising:
-
receiving a command to prevent access to at least one subset of data at a remote device when the remote device has been compromised; and
executing the command to prevent access to the at least one subset of data. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A computer-readable medium having instructions stored thereon for executing a method, the method comprising:
-
receiving, from a server, a command to prevent access to at least one subset of data at a remote device when the remote device has been compromised; and
executing the command to prevent access to the at least one subset of data.
-
-
36. A system, comprising:
-
a data tracker capable of tracking the location and type of data in a remote device; and
a client, communicatively coupled to the data tracker, capable of receiving a command to prevent access to at least one subset of data at the remote device when the remote device has been compromised and executing the command to prevent access to the at least one subset of data based on information generated by the data tracker. - View Dependent Claims (37, 38, 39, 41, 42, 43, 44, 45)
-
-
46. A system, comprising:
-
means for receiving, from a server, a command to prevent access to at least one subset of data at a remote device when the remote device has been compromised; and
means for executing the command to prevent access to the at least one subset of data.
-
-
47. A method, comprising:
-
receiving an indication that a remote device is compromised;
selecting at least one subset of data from the remote device; and
transmitting, to the remote device, a command to transmit to the at least one subset of data to another location.
-
-
48. A method, comprising:
-
receiving an indication that a remote device is compromised; and
transmitting, to the remote device, a command to sever access between the remote device and a network.
-
Specification