METHOD FOR PERFORMING DEVICE SECURITY CORRECTIVE ACTIONS BASED ON LOSS OF PROXIMITY TO ANOTHER DEVICE
First Claim
6-1. The method of claim 4, further comprising:
- resetting the first timer for the first period of time based on the determination that the response to the request to the notification was not received within the second period of time.
7 Assignments
0 Petitions
Accused Products
Abstract
The method disclosed herein provides for performing device security corrective action based on loss of proximity to another device, such as a key device. While a mobile communication device is locked, a mobile communication device determines whether or not a key device is within a specified distance. If the key device is not within the specified distance from the mobile communication device, a notification may be displayed on the mobile communication device. If a user responds to the notification, the user may prevent or alter the mobile communication device from performing at least one device security corrective action. If, however, the user does not respond to the notification within a specified time period, the at least one device security corrective action is performed on the mobile communication device.
141 Citations
14 Claims
-
6-1. The method of claim 4, further comprising:
resetting the first timer for the first period of time based on the determination that the response to the request to the notification was not received within the second period of time.
-
9-1. The method of claim 1 wherein the step of detecting that the key device is not within the specified distance from the mobile communication device comprises:
-
broadcasting a message from the mobile communication device over the network for the key device; and not receiving a reply from the key device responsive to the broadcasted message.
-
-
10-1. The method of claim 1, wherein the notification causes the mobile communication device to generate an audible sound, a haptic behavior, or a visual stimulus.
Specification