Proactive Security for Mobile Devices
First Claim
1. A computer-implemented method, comprising:
- on a server computer, transmitting a first security command to a mobile device in response to a security request from a requester;
receiving one or more security parameters from the mobile device in response to the first security command;
determining a security status of the mobile device based on the received one or more security parameters; and
providing the security status to the requester.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, program products, and systems for proactively securing mobile devices are described. A mobile device can proactively determine whether the mobile device is associated with a security risk and the level of the security risk. Upon determining a security risk, the mobile device can transmit coordinates of its current geographic location to a server. To protect privacy of authorized users, the transmission can be disabled by entering a password. If multiple failed password attempts are detected, the mobile device can proactively increase a security level of the device, and selectively protect files or other content stored on the mobile device. In some implementations, the mobile device can be transitioned into a surveillance mode where the mobile device records or captures information associated with one or more of user actions, ambient sound, images, a trajectory of the device, and transmits the recorded or captured information to the network resource.
223 Citations
46 Claims
-
1. A computer-implemented method, comprising:
-
on a server computer, transmitting a first security command to a mobile device in response to a security request from a requester; receiving one or more security parameters from the mobile device in response to the first security command; determining a security status of the mobile device based on the received one or more security parameters; and providing the security status to the requester. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-implemented method executed by a mobile device, comprising:
-
detecting a security event; evaluating a risk factor of the security event; performing at least one security act, including sending a security alert to a server, the security alert identifying a current security status of the mobile device and a description of the security event; and setting the mobile device to a secure mode of operation, including selectively protecting information from being accessed according to an information protection scheme and the risk factor. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system, comprising:
-
one or more computers configured to perform operations comprising; transmitting a first security command to a mobile device in response to a security request from a requester; receiving one or more security parameters from the mobile device in response to the first security command; determining a security status of the mobile device based on the received one or more security parameters; and providing the security status to the requester. - View Dependent Claims (20, 21, 22, 23, 24)
-
-
25. A system comprising:
-
a mobile device configured to perform operations comprising; detecting a security event; evaluating a risk factor of the security event; performing at least one security act, including sending a security alert to a server, the security alert identifying a current security status of the mobile device and a description of the security event; and setting the mobile device to a secure mode of operation, including selectively protecting information from being accessed according to an information protection scheme and the risk factor. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32)
-
-
33. A computer program product tangibly stored on a storage device, operable to cause a computer to perform operations comprising:
-
transmitting a first security command to a mobile device in response to a security request from a requester; receiving one or more security parameters from the mobile device in response to the first security command; determining a security status of the mobile device based on the received one or more security parameters; and providing the security status to the requester. - View Dependent Claims (34, 35, 36, 37, 38)
-
-
39. A computer program product tangibly stored on a storage device, operable to cause a mobile device to perform operations comprising:
-
detecting a security event; evaluating a risk factor of the security event; performing at least one security act, including sending a security alert to a server, the security alert identifying a current security status of the mobile device and a description of the security event; and setting the mobile device to a secure mode of operation, including selectively protecting information from being accessed according to an information protection scheme and the risk factor. - View Dependent Claims (40, 41, 42, 43, 44, 45, 46)
-
Specification