MOBILE DEVICE DATA SECURITY SYSTEM
First Claim
1. A mobile device data security system, the system comprising:
- at least one non-transitory storage device;
at least one processor; and
at least one module stored in said storage device and comprising instruction code that is executable by the at least one processor and configured to cause said at least one processor to;
provide a data security application for installation on a mobile device of a user;
establish a communication link with the mobile device, wherein establishing further comprises creating a wireless data channel with the mobile device;
receive, via the established communication link, information associated with one or more third-party applications stored on the mobile device;
initiate a scan, via the established communication link, to determine whether the one or more third-party applications are associated with a malicious code;
transmit control signals, via the established communication link, configured to cause the data security application to begin running in the background of the mobile device in response to determining that the one or more third-party applications are associated with the malicious code; and
initiate, via the data security application, one or more actions to be executed on the mobile device of the user based on at least determining that the one or more third-party applications are associated with the malicious code, wherein the one or more actions limit one or more functionalities of the mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, computer program products, and methods are described herein for a mobile device data security system. The present invention is configured to establish a communication link with the mobile device; receive, via the established communication link, information associated with one or more third-party applications stored on the mobile device; initiate a scan, via the established communication link, to determine whether the one or more third-party applications are associated with a malicious code; transmit control signals, via the established communication link, configured to cause the data security application to begin running in the background of the mobile device in response to determining that the one or more third-party applications are associated with the malicious code; and initiate, via the data security application, one or more actions to be executed on the mobile device of the user, wherein the one or more actions limit one or more functionalities of the mobile device.
-
Citations
20 Claims
-
1. A mobile device data security system, the system comprising:
-
at least one non-transitory storage device; at least one processor; and at least one module stored in said storage device and comprising instruction code that is executable by the at least one processor and configured to cause said at least one processor to; provide a data security application for installation on a mobile device of a user; establish a communication link with the mobile device, wherein establishing further comprises creating a wireless data channel with the mobile device; receive, via the established communication link, information associated with one or more third-party applications stored on the mobile device; initiate a scan, via the established communication link, to determine whether the one or more third-party applications are associated with a malicious code; transmit control signals, via the established communication link, configured to cause the data security application to begin running in the background of the mobile device in response to determining that the one or more third-party applications are associated with the malicious code; and initiate, via the data security application, one or more actions to be executed on the mobile device of the user based on at least determining that the one or more third-party applications are associated with the malicious code, wherein the one or more actions limit one or more functionalities of the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computerized method for remotely controlling access to a mobile device, the method comprising:
-
providing, using a computing device processor, a data security application for installation on a mobile device of a user; establishing, using a computing device processor, a communication link with the mobile device, wherein establishing further comprises creating a wireless data channel with the mobile device; receiving, via the established communication link, information associated with one or more third-party applications stored on the mobile device; initiating a scan, via the established communication link, to determine whether the one or more third-party applications are associated with a malicious code; transmitting control signals, via the established communication link, configured to cause the data security application to begin running in the background of the mobile device in response to determining that the one or more third-party applications are associated with the malicious code; and initiating, via the data security application, one or more actions to be executed on the mobile device of the user based on at least determining that the one or more third-party applications are associated with the malicious code, wherein the one or more actions limit one or more functionalities of the mobile device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product for mobile device data security system, the computer program product comprising a non-transitory computer-readable medium comprising code causing a first apparatus to:
-
provide a data security application for installation on a mobile device of a user; establish a communication link with the mobile device, wherein establishing further comprises creating a wireless data channel with the mobile device; receive, via the established communication link, information associated with one or more third-party applications stored on the mobile device; initiate a scan, via the established communication link, to determine whether the one or more third-party applications are associated with a malicious code; transmit control signals, via the established communication link, configured to cause the data security application to begin running in the background of the mobile device in response to determining that the one or more third-party applications are associated with the malicious code; and initiate, via the data security application, one or more actions to be executed on the mobile device of the user based on at least determining that the one or more third-party applications are associated with the malicious code, wherein the one or more actions limit one or more functionalities of the mobile device. - View Dependent Claims (18, 19, 20)
-
Specification