Security for mobile communications device
First Claim
1. A mobile communications device for communicating with a wireless network, comprising:
- an electronic storage having data stored thereon;
a processor connected to the storage for accessing the data;
a communications sub-system connected to the processor for exchanging signals with the wireless network and with the processor;
a user input interface connected to send user input signals to the processor in response to user action; and
a security module associated with the processor for detecting a trigger condition and automatically taking a security action if a user bypass action is not detected through the user input interface after detection of the trigger condition.
3 Assignments
0 Petitions
Accused Products
Abstract
A mobile communications device for communicating with a wireless network, including an electronic storage having data stored thereon, a processor connected to the storage for accessing the data, a communications sub-system connected to the processor for exchanging signals with the wireless network and with the processor, a user input interface connected to send user input signals to the processor in response to user action, and a security module associated with the processor for detecting a trigger condition and automatically taking a security action if a bypass user action is not detected after detection of the trigger condition.
120 Citations
23 Claims
-
1. A mobile communications device for communicating with a wireless network, comprising:
-
an electronic storage having data stored thereon;
a processor connected to the storage for accessing the data;
a communications sub-system connected to the processor for exchanging signals with the wireless network and with the processor;
a user input interface connected to send user input signals to the processor in response to user action; and
a security module associated with the processor for detecting a trigger condition and automatically taking a security action if a user bypass action is not detected through the user input interface after detection of the trigger condition. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of providing security for a mobile communication device that is configured to communicate over a wireless communications network, including steps of:
-
(a) monitoring for a trigger condition;
(b) subsequent to occurrence of the trigger condition, monitoring for a predetermined user bypass action at the mobile communication device; and
(c) upon failure to detect the predetermined user bypass action within a predetermined time duration after occurrence of the trigger condition, automatically taking security action to protect data stored on the mobile communication device. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A computer program product including a computer readable medium carrying computer program code means for providing security for a mobile communication device that is configured to communicate over a wireless communications network, the computer program code means including means for:
-
(a) monitoring for a trigger condition;
(b) subsequent to occurrence of the trigger condition, monitoring for a user bypass action at the mobile communication device; and
(b) upon failure to detect the user bypass action within a predetermined time duration after occurrence of the trigger condition, automatically taking security action to protect data stored on the mobile communication device. - View Dependent Claims (23)
-
Specification