Protecting data on a mobile device
First Claim
1. A method of protecting data on a mobile computing device, comprising:
- configuring a data protection profile that identifies at least one event, and at least one action to be taken with respect to data specified in the data protection profile upon occurrence of the at least one event;
determining whether the at least one event has occurred; and
if the at least one event has occurred, enforcing the at least one action to inhibit unauthorized access to the data.
1 Assignment
0 Petitions
Accused Products
Abstract
A password protection application is executed on a mobile device and provides an interface by which an authorized user can define and configure a “data protection profile” for the device. This profile defines at least one security event (criteria or condition) associated with the device, and at least one protection action that should occur to protect data on the device upon the triggering of the event. Once defined in a profile, the application monitors for the occurrence of the security event. Upon the occurrence of the specified event, the protection action is enforced on the device to protect the data.
-
Citations
7 Claims
-
1. A method of protecting data on a mobile computing device, comprising:
-
configuring a data protection profile that identifies at least one event, and at least one action to be taken with respect to data specified in the data protection profile upon occurrence of the at least one event; determining whether the at least one event has occurred; and if the at least one event has occurred, enforcing the at least one action to inhibit unauthorized access to the data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification