System And Method For Protecting Files Stored On An Electronic Device
First Claim
1. A method of protecting a file stored on an electronic device, the method comprising:
- receiving user input selecting a file for protection processing, wherein the file is stored in the electronic device and the user input is received before the electronic device has been stolen;
after receiving the user input selecting the file for protection processing, automatically receiving theft information from a remote server, wherein the theft information indicates whether the electronic device has been reported stolen;
automatically determining, at the electronic device, whether the electronic device has been reported stolen, based on the theft information from the remote server; and
after determining whether the electronic device has been reported stolen, automatically processing the selected file according to the selected protection processing, wherein the processing is contingent on whether the electronic device has been reported stolen;
wherein the operation of receiving user input selecting the file for protection processing comprises receiving user input selecting the file for at least one protection technique from the groups consisting of;
encryption of the selected file and automatic decryption of the selected file under certain predetermined conditions; and
automatic saving of the selected file from the electronic device to a remote storage device after the device has been reported stolen.
4 Assignments
0 Petitions
Accused Products
Abstract
An electronic device includes a security system which provides for protection of designated files stored on an electronic device. For example, an electronic device may receive user input selecting a file for protection processing. The user input may select the file for encryption and automatic decryption under certain predetermined conditions and/or for automatic saving to a remote storage device after the device has been reported stolen, for instance. After receiving the user input selecting the file for protection processing, the electronic device may automatically receive theft information from a remote server, wherein the theft information indicates whether the electronic device has been reported stolen. After determining whether the electronic device has been reported stolen, the electronic device may automatically process the selected file according to the selected protection processing, wherein the processing is contingent on whether the electronic device has been reported stolen. Other embodiments are described and claimed.
-
Citations
25 Claims
-
1. A method of protecting a file stored on an electronic device, the method comprising:
-
receiving user input selecting a file for protection processing, wherein the file is stored in the electronic device and the user input is received before the electronic device has been stolen; after receiving the user input selecting the file for protection processing, automatically receiving theft information from a remote server, wherein the theft information indicates whether the electronic device has been reported stolen; automatically determining, at the electronic device, whether the electronic device has been reported stolen, based on the theft information from the remote server; and after determining whether the electronic device has been reported stolen, automatically processing the selected file according to the selected protection processing, wherein the processing is contingent on whether the electronic device has been reported stolen; wherein the operation of receiving user input selecting the file for protection processing comprises receiving user input selecting the file for at least one protection technique from the groups consisting of; encryption of the selected file and automatic decryption of the selected file under certain predetermined conditions; and automatic saving of the selected file from the electronic device to a remote storage device after the device has been reported stolen. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An electronic device, comprising:
-
memory; a network interface; a processor operably coupled to the memory and to the network interface; and instructions stored in the memory and executable on the processor to perform operations comprising; receiving user input selecting a file for protection processing, wherein the file is stored in the electronic device and the user input is received before the electronic device has been stolen; after receiving the user input selecting the file for protection processing, automatically receiving theft information from a remote server, wherein the theft information indicates whether the electronic device has been reported stolen; automatically determining, at the electronic device, whether the electronic device has been reported stolen, based on the theft information from the remote server; and after determining whether the electronic device has been reported stolen, automatically processing the selected file according to the selected protection processing, wherein the processing is contingent on whether the electronic device has been reported stolen; wherein the operation of receiving user input selecting the file for protection processing comprises receiving user input selecting the file for at least one protection technique from the groups consisting of; encryption of the selected file and automatic decryption of the selected file under certain predetermined conditions; and automatic saving of the selected file from the electronic device to a remote storage device after the device has been reported stolen. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. An apparatus, comprising:
-
a tangible, machine-readable medium; and instructions stored in the tangible, machine-readable medium and operable, when executed by an electronic device, to perform operations comprising; receiving user input selecting a file for protection processing, wherein the file is stored in the electronic device and the user input is received before the electronic device has been stolen; after receiving the user input selecting the file for protection processing, automatically receiving theft information from a remote server, wherein the theft information indicates whether the electronic device has been reported stolen; automatically determining, at the electronic device, whether the electronic device has been reported stolen, based on the theft information from the remote server; and after determining whether the electronic device has been reported stolen, automatically processing the selected file according to the selected protection processing, wherein the processing is contingent on whether the electronic device has been reported stolen; wherein the operation of receiving user input selecting the file for protection processing comprises receiving user input selecting the file for at least one protection technique from the groups consisting of; encryption of the selected file and automatic decryption of the selected file under certain predetermined conditions; and automatic saving of the selected file from the electronic device to a remote storage device after the device has been reported stolen. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
Specification