METHOD AND SYSTEM FOR RENDERING A STOLEN MOBILE COMMUNICATIONS DEVICE INOPERATIVE
First Claim
Patent Images
1. A method comprising:
- determining, at a security component on a mobile communications device, that the mobile communications device is in a first state; and
causing, at the security component, a removal of a cryptographic key on the mobile communications device.
9 Assignments
0 Petitions
Accused Products
Abstract
A method and system for rendering a stolen mobile communications device inoperative is presented. A determination that the mobile communications device is in a first state is made at a security component on the mobile communications device. A removal of a cryptographic key is affected at the security component on the mobile communications device.
76 Citations
21 Claims
-
1. A method comprising:
-
determining, at a security component on a mobile communications device, that the mobile communications device is in a first state; and causing, at the security component, a removal of a cryptographic key on the mobile communications device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
determining, at a security component on a mobile communications device, that the mobile communications device is not in the possession of an authorized user; when the mobile communications device is determined to not be in the possession of an authorized user, receiving, from a server and at the security component, a cryptographic key; encrypting, at the security component, device storage contents with the cryptographic key; and after encrypting the device storage contents, causing, at the security component, a removal of the cryptographic key on the mobile communications device. - View Dependent Claims (15, 16)
-
-
17. A non-transitory computer-readable medium encoded with a plurality of instructions which, when executed by a processor, cause the processor to perform a method comprising:
-
receiving, at a server, an indication that a mobile communications device is not in the possession of an authorized user; sending, from the server, a first command for the mobile communications device to encrypt data stored on the mobile communications device using a cryptographic key from the server; and upon receiving from the mobile communications device confirmation that the data stored has been encrypted, sending, from the server, a second command for the mobile communications device to remove the cryptographic key. - View Dependent Claims (18, 19, 20, 21)
-
Specification