SIM Level Mobile Security
First Claim
1. One or more computer storage devices storing computer-executable instructions that, when executed, cause one or more processors to perform acts comprising:
- receiving a service request to perform a security function that affects a service provided to a mobile device by a telecommunication network, the service being provided by the telecommunication network to the mobile device based on a subscriber identity module (SIM) card;
performing the security function that affects the service provided to the mobile device; and
terminating the security function in response to receiving a reversion command or an expiration of a predetermined time period.
7 Assignments
0 Petitions
Accused Products
Abstract
Mobile security techniques may protect information stored on a subscriber identity module (SIM) card as well as services that are accessible through the SIM card from unauthorized use. The techniques include receiving a service request to perform a security function at a server. The security function may affect a service provided to a mobile device by a telecommunication network, in which the mobile device obtains the service using a SIM card. The techniques further include performing the security function. The performance of the SIM function may be terminated in response to the server receiving a reversion command or an expiration of a predetermined time period.
-
Citations
20 Claims
-
1. One or more computer storage devices storing computer-executable instructions that, when executed, cause one or more processors to perform acts comprising:
-
receiving a service request to perform a security function that affects a service provided to a mobile device by a telecommunication network, the service being provided by the telecommunication network to the mobile device based on a subscriber identity module (SIM) card; performing the security function that affects the service provided to the mobile device; and terminating the security function in response to receiving a reversion command or an expiration of a predetermined time period. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer-implemented method, comprising:
-
receiving a service request to perform a security function at a security server, the security function affecting a service provided to a mobile device by a telecommunication network based on a subscriber identity module (SIM) card; performing the security function that affects the service provided to the mobile device; and terminating the security function in response to receiving a reversion command or an expiration of a predetermined time period, wherein at least one of the service request or the reversion command is received from a client device. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A mobile device, comprising:
-
one or more processors; and memory that includes a plurality of computer-executable components comprising; a locking component that locks a subscriber identity module (SIM) card installed on the mobile device in response to a locking command from a security server of a telecommunication network; and a security component that performs an action in response to an activation command from the security server, the action including disabling a power port of the mobile device to prevent charging of a battery of the mobile device, disabling a communication port of the mobile device to prevent loading of applications into the memory of the mobile device, or disabling a boot loader of the mobile device to prevent an updating of an operating system of the mobile device. - View Dependent Claims (20)
-
Specification