Method and system for ensuring mobile data security
First Claim
Patent Images
1. A system for protecting information from unauthorized access, the system comprising:
- storage external to a mobile telecommunications device, the external storage encoding a backup of the information stored locally on the mobile telecommunications device; and
a communications interface operable to supply the mobile telecommunications device with a protective action directive via a wireless communication network, the protective action directive configured to trigger a functional sequence executable on the mobile telecommunications device to ensure that a current backup of the locally stored information has been transferred to the external storage and to thereafter render inaccessible the locally stored information.
1 Assignment
0 Petitions
Accused Products
Abstract
In some embodiments systems and methods are provided for protecting data stored locally on mobile telecommunications or personal information devices. Data may be protected from loss by an automatic backup procedure implemented on a predetermined schedule or in response to a trigger. Information stored on a lost or stolen portable information device may be rendered inaccessible in response to a protective action directive. Access to locally stored information may be denied while emergency telecommunications service remains active.
-
Citations
31 Claims
-
1. A system for protecting information from unauthorized access, the system comprising:
-
storage external to a mobile telecommunications device, the external storage encoding a backup of the information stored locally on the mobile telecommunications device; and
a communications interface operable to supply the mobile telecommunications device with a protective action directive via a wireless communication network, the protective action directive configured to trigger a functional sequence executable on the mobile telecommunications device to ensure that a current backup of the locally stored information has been transferred to the external storage and to thereafter render inaccessible the locally stored information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for protecting information from unauthorized access, the method comprising:
-
receiving, via a wireless communication network, for storage external to a mobile telecommunications device, at least a partial copy of the information stored locally on the mobile telecommunications device; and
supplying, via a wireless communication network, the mobile telecommunications device with a protective action directive configured to cause the mobile telecommunications device to execute a protective action rendering the locally stored information inaccessible. - View Dependent Claims (9, 10, 11)
-
-
12. A mobile telecommunications device comprising:
-
local storage for encoding information of a subscriber;
a communications interface operable to receive a protective action directive via a wireless communication network; and
a functional sequence executable on the mobile telecommunications device in response to the protective action directive to ensure that a current backup of the information exists on storage external to the mobile telecommunications device and to thereafter render inaccessible the information encoded in the local storage. - View Dependent Claims (13, 14)
-
-
15. A method for protecting information from unauthorized access, the method comprising:
-
storing information locally on a mobile telecommunications device;
receiving a protective action directive via a wireless communication network;
ensuring that a current backup of the stored information exists on storage external to the mobile telecommunications device; and
in response to the received protective action directive, executing on the mobile telecommunications device a protective action in accordance with the protective action directive, the protective action rendering the stored information inaccessible. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A method for protecting information from loss, the method comprising:
-
storing information locally on a mobile telecommunications device;
receiving a protective action directive via a wireless communication network;
automatically ensuring that a current backup of the stored information exists on storage external to the mobile telecommunications device. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification