SYSTEM AND METHOD FOR DELETING DATA IN A COMMUNICATION DEVICE
First Claim
Patent Images
1. A computing system for deleting data in a communication device, the computing system comprising:
- a setting module configured for setting a user name and a password, and setting a secure command for deleting the data stored in the communication device;
a comparing module configured for comparing textual data of a received short message with the secure command, and determining if the textual data of the received short message is substantially the same as the secure command;
an executing module configured for invoking the secure command to delete the data stored in the communication device if the textual data of the received short message is substantially the same as the secure command; and
at least one processor that executes the setting module, the comparing module, and the executing module.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for deleting data in a communication device sets a secure command in a predetermined communication device, determines if the predetermined communication device has been lost and/or stolen, invokes the secure command to delete data in the predetermined communication device if the predetermined communication device has been lost and/or stolen.
-
Citations
19 Claims
-
1. A computing system for deleting data in a communication device, the computing system comprising:
-
a setting module configured for setting a user name and a password, and setting a secure command for deleting the data stored in the communication device; a comparing module configured for comparing textual data of a received short message with the secure command, and determining if the textual data of the received short message is substantially the same as the secure command; an executing module configured for invoking the secure command to delete the data stored in the communication device if the textual data of the received short message is substantially the same as the secure command; and at least one processor that executes the setting module, the comparing module, and the executing module. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method for deleting data in a communication device, the method comprising:
-
setting a user name and a password, and setting a secure command for deleting the data stored in the communication device; receiving a short message by the communication device; comparing textual data of the received short message with the secure command, and determining if the textual data of the received short message is substantially the same as the secure command; and invoking the secure command to delete the data stored in the communication device if the textual data of the received short message is substantially the same as the secure command. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A storage medium having stored thereon instructions that, when executed by a processor, causing the processor to perform a method for deleting data in a communication device, the method comprising:
-
setting a user name and a password, and setting a secure command for deleting the data stored in the communication device; receiving a short message by the communication device; comparing textual data of the received short message with the secure command, and determining if the textual data of the received short message is substantially the same as the secure command; and invoking the secure command to delete the data stored in the communication device if the textual data of the received short message is substantially the same as the secure command. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification