SECURE TRAVELER FRAMEWORK
First Claim
1. A method comprising:
- receiving, at a computing device and from a travel data source, travel data for a user;
receiving, at the computing device, a list of countries with a high level of security threats;
based on the travel data for the user and the list of countries with a high level of security threats, determining, by the computing device, whether the user is entering a country with a high level of security threats;
in response to determining that the user is entering a country with a high level of security threats, determining a user device associated with the user;
generating, at a first time, a first data security scan of the user device;
generating, at a second time later than the first time, a second data security scan of the user device; and
determining one or more data security issue of the user device based on a comparison of the first data security scan to the second data security scan.
1 Assignment
0 Petitions
Accused Products
Abstract
A user, such as an employee of an institution, may travel overseas where data or devices may be compromised. Described herein is a system and method for receiving travel data for the user from a travel data source and receiving a list of countries with a high level of security threats where data security may be an issue. Based on the travel data for the user and the list of countries with a high level of security threats, it may be determined whether the user is entering a country with a high level of security threats. If so, one or more user devices associated with the user may be determined, and data security scans of the devices may be generated before, during, and/or after travel. Data security issues may be determined based on a comparison of the scans. A report of the issues may optionally be generated.
11 Citations
20 Claims
-
1. A method comprising:
-
receiving, at a computing device and from a travel data source, travel data for a user; receiving, at the computing device, a list of countries with a high level of security threats; based on the travel data for the user and the list of countries with a high level of security threats, determining, by the computing device, whether the user is entering a country with a high level of security threats; in response to determining that the user is entering a country with a high level of security threats, determining a user device associated with the user; generating, at a first time, a first data security scan of the user device; generating, at a second time later than the first time, a second data security scan of the user device; and determining one or more data security issue of the user device based on a comparison of the first data security scan to the second data security scan. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus, comprising:
-
a processor; and memory storing computer-executable instructions that, when executed by the processor, cause the apparatus to; receive, from a travel data source, travel data for a user; receive a list of countries with a high level of security threats; based on the travel data for the user and the list of countries with a high level of security threats, determine whether the user is entering a country with a high level of security threats; in response to determining that the user is entering a country with a high level of security threats, determine a user device associated with the user; generate, at a first time, a first data security scan of the user device; generate, at a second time later than the first time, a second data security scan of the user device; and determine one or more data security issue of the user device based on a comparison of the first data security scan to the second data security scan. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium having instructions stored thereon that, when executed, cause a computing device to:
-
receive, from a travel data source, travel data for a user; receive a list of countries with a high level of security threats; based on the travel data for the user and the list of countries with a high level of security threats, determine whether the user is entering a country with a high level of security threats; in response to determining that the user is entering a country with a high level of security threats, determine a user device associated with the user; generate, at a first time, a first data security scan of the user device; generate, at a second time later than the first time, a second data security scan of the user device; and determine one or more data security issue of the user device based on a comparison of the first data security scan to the second data security scan. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification