SYSTEM AND METHOD FOR PROTECTING DATA IN WIRELESS DEVICES
First Claim
1. A method of protecting data on a network-based wireless device comprising the steps of:
- providing a security manager with an identification of the wireless device;
determining whether the wireless device contains data that is to be protected;
securing the data that is to be protected;
receiving an acknowledgment at the security manager that the data has been secured; and
refusing network access to the wireless device.
6 Assignments
0 Petitions
Accused Products
Abstract
When a network-based wireless device such as a mobile phone or data terminal is reported lost or stolen or is determined to be malfunctioning, a service provider can immediately deny the device access to the network. However, any management operation to secure data carried by the wireless device cannot be carried out as the device is no longer reachable from the network. Therefore, the data should be secured before the device is rendered inoperable. Apparatus and methods are provided to back-up the data or wipe the data before the system denies access to the device. A system and method are provided by which a security manager works in conjunction with an equipment register of the network to lock and wipe data on the wireless device before the device is denied access to the network. Similarly, for a wireless device that is later recovered or determined to be operable, the device can be granted access to the network again and any data that was locked or wiped can be unlocked or restored over the network.
-
Citations
20 Claims
-
1. A method of protecting data on a network-based wireless device comprising the steps of:
-
providing a security manager with an identification of the wireless device; determining whether the wireless device contains data that is to be protected; securing the data that is to be protected; receiving an acknowledgment at the security manager that the data has been secured; and refusing network access to the wireless device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of restoring data in a network-based wireless device comprising the steps of:
-
providing a security manager with an identification of the wireless device; determining whether data is to be restored to the wireless device; permitting network access to the wireless device; restoring data to the wireless device; and receiving an acknowledgment at the security manager that the data has been restored. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification