OFFLINE DATA DELETE WITH FALSE TRIGGER PROTECTION
First Claim
1. A method for protecting data stored on an electronic device from access by an illegitimate user by activating an offline data delete module installed in the electronic device to conditionally delete the data, the method comprising the steps of:
- establishing a first communication between an agent installed in the electronic device and a remote server;
obtaining a password from a user if a second communication is not established between the agent and the remote server within a predetermined period of time for establishing a communication between the agent and the remote server;
deleting data stored on the electronic device after a second communication is not established between the agent and the remote server within the predetermined period of time and a predetermined number of incorrect passwords has been obtained.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for protecting data stored on an electronic device from access by an illegitimate user are presented. The data is protected by activating an offline data delete module installed in the electronic device to conditionally delete the data according to the following criteria: after establishing a first communication between an agent installed in the electronic device and a remote server, obtaining a password from a user if a second communication is not established between the agent and the remote server within a predetermined period of time. After obtaining a password from the user, deleting at least some data stored on the electronic device after a second communication is not established between the agent and the remote server within the predetermined period of time and a predetermined number of incorrect passwords has been obtained.
73 Citations
20 Claims
-
1. A method for protecting data stored on an electronic device from access by an illegitimate user by activating an offline data delete module installed in the electronic device to conditionally delete the data, the method comprising the steps of:
-
establishing a first communication between an agent installed in the electronic device and a remote server; obtaining a password from a user if a second communication is not established between the agent and the remote server within a predetermined period of time for establishing a communication between the agent and the remote server; deleting data stored on the electronic device after a second communication is not established between the agent and the remote server within the predetermined period of time and a predetermined number of incorrect passwords has been obtained. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An electronic device comprising a memory for the storage of data, an output interface, an input interface, an agent, and an offline data delete module, wherein the agent is configured to communicate with a remote server and the offline data delete module is configured to:
-
establish a first communication between an agent installed in the electronic device and a remote server; obtain a password from a user if a second communication is not established between the agent and the remote server within a predetermined period of time for establishing a communication between the agent and the remote server; delete at least some data stored on the electronic device after a second communication is not established between the agent and the remote server within the predetermined period of time and a predetermined number of incorrect passwords has been obtained. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for protecting data stored in an electronic device from unauthorized access, the system comprising a memory for the storage of said data, an output interface, and an input interface, the system further comprising an offline data delete module installed in the device, an agent installed in the device, and a server remote from the device;
-
wherein the agent is configured to communicate with the server; and wherein the offline data delete module is configured to; (a) detect the elapse of a predetermined period of time since the agent last communicated with the server; (b) detect the input of a predetermined number of incorrect passwords by a user; and (c) delete at least some of the data upon the detection of (a) and then (b).
-
-
18. A system for the protection of data stored in an electronic device from unauthorized access, the system comprising:
-
a remote server; and an electronic device, the electronic comprising a processor, a memory storing data to be protected, an output interface, and a user input interface; said system comprising an offline data delete module and an agent installed in the electronic device, wherein; the agent is configured to communicate with the remote server; and the offline data delete module is configured to; establish a first communication between the agent and remote server; obtain a password from a user via the user interface if a second communication is not established between the agent and remote server within a predetermined period of time for establishing a communication between the agent and the remote server; delete data stored in the memory after a second communication is not established between the agent and remote server within the predetermined period of time and a predetermined number of incorrect passwords has been obtained. - View Dependent Claims (19)
-
-
20. A tangible computer-readable medium carrying computer-executable instructions which, when executed on an electronic device comprising a processor and a memory, the memory storing data to be protected from unauthorized access, carry out a method comprising:
-
establishing a first communication between an agent installed in the electronic device and a remote server; obtaining a password from a user if a second communication is not established between the agent and the remote server within a predetermined period of time for establishing a communication between the agent and the remote server; deleting at least some data stored in the memory after a second communication is not established between the agent and the remote server within the predetermined period of time and a predetermined number of incorrect passwords has been obtained.
-
Specification