SELECTIVELY WIPING A REMOTE DEVICE
First Claim
1. A method, comprising:
- initiating, at a sending device, transmission of a securing command to a receiving device, the securing command being provided with an indicator of an authorization level;
receiving the securing command at the receiving device;
in response to the securing command, the receiving device;
setting a flag indicating which of a plurality of data types is to be secured based on the authorization level indicated by the securing command, each of the plurality of data types being associated with at least one of a plurality of authorization levels;
securing data of each of the plurality of data types thus indicated; and
clearing the flag upon completion of said securing.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for selectively securing data from unauthorized access on a client device storing a plurality of data types with reference to an authorization level indicated in a command. A command is received at a client device comprising an authorization level indicator. Based on at least one predefined rule, which may be implemented in an IT policy stored at the client device, each of the plurality of data types to be secured is determined, and then the data corresponding to those types is secured. The data may be secured by encrypting and/or deleting the data at the client device. The predefined rules associated with each authorization level may be configured by a user or administrator having an authorization level that exceeds the associated authorization level.
83 Citations
22 Claims
-
1. A method, comprising:
-
initiating, at a sending device, transmission of a securing command to a receiving device, the securing command being provided with an indicator of an authorization level; receiving the securing command at the receiving device; in response to the securing command, the receiving device; setting a flag indicating which of a plurality of data types is to be secured based on the authorization level indicated by the securing command, each of the plurality of data types being associated with at least one of a plurality of authorization levels; securing data of each of the plurality of data types thus indicated; and clearing the flag upon completion of said securing. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system, comprising:
-
a sending device configured to; initiate transmission of a securing command to a receiving device, the securing command being provided with an indicator of an authorization level; and a receiving device configured to; receive the securing command; in response to the securing command; set a flag indicating which of a plurality of data types is to be secured based on the authorization level indicated by the securing command, each of the plurality of data types being associated with at least one of a plurality of authorization levels; secure data of each of the plurality of data types thus indicated; and clear the flag upon completion of said securing. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification