METHOD AND APPARATUS FOR PROTECTING DATA IN A PORTABLE ELECTRONIC DEVICE
First Claim
1. A method for protecting stored data in a portable electronic device, wherein the data is encrypted with an encryption key stored in the portable electronic device, the method comprising the steps of:
- receiving a direct call at the portable electronic device from a user who is entitled to protect the data on the portable electronic device;
receiving an explicit indication from the user over the received direct call that the portable electronic device is any of misplaced, lost or stolen;
responsive to the receipt of the explicit indication, destroying the encryption key at the portable electronic device, wherein access to the encrypted stored data is prevented.
0 Assignments
0 Petitions
Accused Products
Abstract
Data in a portable electronic device is protected by using external and internal status detection means to determine if the device is misplaced, lost, or stolen. The device then takes, singly or in combination, one of several actions to protect the data on the device, including declaring its location to an owner or service provider, locking the device or specific functions of the device to disable all data retrieval functionality, erasing or overwriting all the stored data in the device or, where the data has been stored in the device in an encrypted format, destroying an internally-stored encryption key, thereby preventing unauthorized access to the encrypted data in the device.
22 Citations
30 Claims
-
1. A method for protecting stored data in a portable electronic device, wherein the data is encrypted with an encryption key stored in the portable electronic device, the method comprising the steps of:
-
receiving a direct call at the portable electronic device from a user who is entitled to protect the data on the portable electronic device; receiving an explicit indication from the user over the received direct call that the portable electronic device is any of misplaced, lost or stolen; responsive to the receipt of the explicit indication, destroying the encryption key at the portable electronic device, wherein access to the encrypted stored data is prevented. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for protecting stored data in a portable electronic device, the method comprising the steps of:
-
receiving a direct call at the portable electronic device from an authorized user of the portable electronic device; receiving an explicit indication from the authorized user over the received direct call that the portable electronic device is any of misplaced, lost or stolen; and responsive to receipt of the explicit indication, taking at least one action at the portable electronic device to protect the stored data on the portable electronic device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A portable electronic device, comprising:
-
a mechanism for storing an encryption key; a mechanism for storing data, wherein at least a portion of the data is encrypted with the stored encryption key; a mechanism for receiving an incoming call; at least one processor, wherein the processor is programmed to destroy the encryption key if an incoming call is received by a user who is entitled to protect the data on the portable electronic device, wherein the incoming call comprises an explicit indication that the portable electronic device is any of misplaced, lost, or stolen; and wherein destruction of the encryption key prevents access to the encrypted stored data.
-
-
19. A portable electronic device, comprising:
-
a mechanism for storing data; and at least one processor, wherein the processor is programmed to determine a current status of the portable electronic device, and take one or more actions to protect the stored data on the device, based upon the determined current status, when the determined current status indicates that the portable electronic device is any of misplaced, stolen, or lost. - View Dependent Claims (20)
-
-
21. A method for protecting data in a portable electronic device, the method comprising the steps of:
-
encrypting the data in the portable electronic device with an encryption key that is stored in the portable electronic device; determining the current status of the portable electronic device; and destroying the encryption key whenever the status of the portable electronic device is determined to be undesirable, to protect the stored encrypted data. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification