Apparatus and methods for protecting data on a wireless device
First Claim
1. A wireless communication device, comprising:
- a memory comprising protected data and a monitoring and lock management configuration; and
a lock management engine resident in the memory and operable to monitor a protected data access attempt and record data access information based upon execution of the monitoring and lock management configuration.
1 Assignment
0 Petitions
Accused Products
Abstract
Apparatus, methods, and programs for protecting data on a wireless device may include a wireless device having a computer platform with a processing engine operable, based upon configurable parameters, to log data access attempt on the wireless device and transmit the log to a remote device. Furthermore, the wireless device may be configured to execute locally and remotely generated control commands on the wireless device, the commands operable to modify an operation of the wireless device. The embodiment may also include an apparatus operable to receive the transmitted log, analyze the received log and transmit a control command to the wireless device. The apparatus may further generate a data access report and make the report available to an authorized user.
119 Citations
47 Claims
-
1. A wireless communication device, comprising:
-
a memory comprising protected data and a monitoring and lock management configuration; and
a lock management engine resident in the memory and operable to monitor a protected data access attempt and record data access information based upon execution of the monitoring and lock management configuration. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of protecting data on a wireless device, comprising:
-
receiving on a wireless device a monitoring and lock management configuration operable to configure the wireless device to monitor protected data stored thereon;
collecting data access information based on an execution of the configuration on the wireless device; and
transmitting the collected data access information to another device to determine whether or not the data access is authorized. - View Dependent Claims (20, 21, 22)
-
-
23. A wireless device, comprising:
-
a means for receiving on a wireless device a monitoring and lock management configuration operable to configure the wireless device to monitor protected data stored thereon;
a means for collecting data access information based on an execution of the configuration on the wireless device; and
a means for transmitting the collected data access information to another device to determine whether or not the data access is authorized.
-
-
24. A computer-readable medium including instructions stored thereon, comprising:
-
a first set of the instructions for receiving on a wireless device a monitoring and lock management configuration operable to configure the wireless device to monitor protected data stored thereon;
a second set of the instructions for collecting data access information based on an execution of the configuration on the wireless device; and
a third set of the instructions for transmitting the collected data access information to another device to determine whether or not the data access attempt is authorized.
-
-
25. At least one processor configured to perform the actions of:
-
receiving on a wireless device a monitoring and lock management configuration operable to configure the wireless device to monitor protected data stored thereon;
collecting data access information based on an execution of the configuration on the wireless device; and
transmitting the collected data access information to another device to determine whether or not the data access attempt is authorized.
-
-
26. A method of protecting data on a wireless device, comprising:
-
receiving data access information from a wireless device, based on execution of a monitoring and lock management configuration by the wireless device;
analyzing the received data access information based upon a predetermined standard; and
transmitting a control command to the wireless device, the control command operable to change a predetermined operational functionality of the wireless device based on the analysis. - View Dependent Claims (27, 28, 29, 30, 31)
-
-
32. A computer program resident in a computer readable medium that, when executed, directs a computer device to perform the actions of:
-
receiving data access information from a wireless device, based on execution of a monitoring and lock management configuration by the wireless device;
analyzing the received data access information based upon a predetermined standard; and
transmitting a control command to the wireless device, the control command operable to change a predetermined operational functionality of the wireless device based on the analysis.
-
-
33. A data manager module, comprising:
-
a means for receiving data access information from a wireless device, based on execution of a monitoring and lock management configuration by the wireless device;
a means for analyzing the received data access information based upon a predetermined standard; and
a means for transmitting a control command to the wireless device, the control command operable to change a predetermined operational functionality of the wireless device based on the analysis.
-
-
34. An apparatus for protecting data on a wireless device, comprising:
-
a processor;
a data manager module executable by the processor, the data manager further comprising;
an information repository operable to receive and store data access information collected from the wireless device based upon execution on the wireless device of a monitoring and lock management configuration;
an analyzer operable to generate a data access report based on the access information; and
a remote device control module operable to transmit a control command to the wireless device, the control command operable to generate and send a control command to change an operational characteristic of the wireless device based on at least one of the data access report and the access information. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
Specification