PROACTIVE SECURITY FOR MOBILE DEVICES
First Claim
1. A method executed by a mobile device, the method comprising:
- detecting a security event;
evaluating a risk factor of the security event;
performing at least one security act, including sending a security alert to a server, the security alert identifying a current security status of the mobile device and a description of the security event; and
setting the mobile device to a secure mode of operation, including selectively protecting information from being accessed according to an information protection scheme and the risk factor.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods, program products, and systems for proactively securing mobile devices are described. A mobile device can proactively determine whether the mobile device is associated with a security risk and the level of the security risk. Upon determining a security risk, the mobile device can transmit coordinates of its current geographic location to a server. To protect privacy of authorized users, the transmission can be disabled by entering a password. If multiple failed password attempts are detected, the mobile device can proactively increase a security level of the device, and selectively protect files or other content stored on the mobile device. In some implementations, the mobile device can be transitioned into a surveillance mode where the mobile device records or captures information associated with one or more of user actions, ambient sound, images, a trajectory of the device, and transmits the recorded or captured information to the network resource.
22 Citations
20 Claims
-
1. A method executed by a mobile device, the method comprising:
-
detecting a security event; evaluating a risk factor of the security event; performing at least one security act, including sending a security alert to a server, the security alert identifying a current security status of the mobile device and a description of the security event; and setting the mobile device to a secure mode of operation, including selectively protecting information from being accessed according to an information protection scheme and the risk factor. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A mobile device, comprising:
a processor configured to cause the mobile device to carry out steps that include; detecting a security event; evaluating a risk factor of the security event; performing at least one security act, including sending a security alert to a server, the security alert identifying a current security status of the mobile device and a description of the security event; and setting the mobile device to a secure mode of operation, including selectively protecting information from being accessed according to an information protection scheme and the risk factor. - View Dependent Claims (9, 10, 11, 12, 13)
-
14. A non-transitory computer readable storage medium configured to store instructions that, when executed by a processor included in a mobile device, cause the mobile device to carry out steps that include:
-
detecting a security event; evaluating a risk factor of the security event; performing at least one security act, including sending a security alert to a server, the security alert identifying a current security status of the mobile device and a description of the security event; and setting the mobile device to a secure mode of operation, including selectively protecting information from being accessed according to an information protection scheme and the risk factor. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification