Methods and systems for remotely securing data in a wireless device in a communications network
First Claim
1. A method for remotely securing data, including personal data, in a wireless device in a communications network, the method comprising:
- receiving a request for securing the data in the wireless device;
generating a message including request data for communication to the wireless device;
determining a registration status of the wireless device in the communications network;
if the registration status of the wireless device is active, then sending the message to the wireless device for securing the data;
if the registration status of the wireless device is inactive, then storing the message in a pending messages database until the registration status of the wireless device is active; and
executing an application program, wherein the application program is operative for;
receiving the message;
parsing the message for the request data, the request data including identification data;
determining whether the identification data in the received message matches identification data resident in the wireless device;
if the received identification data matches the identification data resident in the wireless device, then retrieving the data in the wireless device and sending a return message by accessing a memory in the wireless device and initiating commands to make a copy of the data on the memory, the return message including the data retrieved from the wireless device;
determining whether the request data includes a request to purge the data stored in the wireless device;
if the request data includes a request to purge the data stored in the wireless device, the application program executing a delete command from a menu in the wireless device to purge the data from the wireless device based on the request data, wherein the return message further includes an acknowledgement that the data is purged from the wireless device; and
if the request data does not include a request to purge the data stored in the wireless device, the application program refraining from executing the delete command.
6 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for remotely securing data in a wireless device. A user sends a data message containing instructions for securing data to a remotely located wireless device. Securing data includes recovering data, purging data, locking the wireless device, and locating the wireless device within a communications network. After the data message is sent, a determination is then made as to whether the wireless device is active in the communications network. If the wireless device is active, the data message is sent to the wireless device. If the wireless device is inactive, the data message is temporarily stored in a database until the wireless device is determined to be active. An application program resident on the wireless device is executed upon receiving the data message to secure the data. The data message also includes instructions for retrieving data for identifying an owner of the wireless device.
156 Citations
13 Claims
-
1. A method for remotely securing data, including personal data, in a wireless device in a communications network, the method comprising:
-
receiving a request for securing the data in the wireless device; generating a message including request data for communication to the wireless device; determining a registration status of the wireless device in the communications network; if the registration status of the wireless device is active, then sending the message to the wireless device for securing the data; if the registration status of the wireless device is inactive, then storing the message in a pending messages database until the registration status of the wireless device is active; and executing an application program, wherein the application program is operative for; receiving the message; parsing the message for the request data, the request data including identification data; determining whether the identification data in the received message matches identification data resident in the wireless device; if the received identification data matches the identification data resident in the wireless device, then retrieving the data in the wireless device and sending a return message by accessing a memory in the wireless device and initiating commands to make a copy of the data on the memory, the return message including the data retrieved from the wireless device; determining whether the request data includes a request to purge the data stored in the wireless device; if the request data includes a request to purge the data stored in the wireless device, the application program executing a delete command from a menu in the wireless device to purge the data from the wireless device based on the request data, wherein the return message further includes an acknowledgement that the data is purged from the wireless device; and if the request data does not include a request to purge the data stored in the wireless device, the application program refraining from executing the delete command. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for remotely securing data, including personal data, in a wireless device in a communications network, the system comprising:
-
a node operative to receive a request for recovering the data from the wireless device, generate a message including request data for communication to the wireless device, determine a registration status of the wireless device in the communications network, and send the message to the wireless device for securing the data if the registration status of the wireless device is active; a registration database, in communication with the node and the wireless device, operative to store data pertinent to an operating status of the wireless device; and a pending messages database, in communication with the node, operative to store the message comprising request data for securing the data in the wireless device if the registration status of the wireless device is inactive; wherein the wireless device is operative to execute an application program and wherein the application program is operative to receive the message from the node, parse the message for the request data, the request data including identification data, determine whether the identification data in the received message matches identification data resident in the wireless device, if the received identification data matches the identification data resident in the wireless device, then retrieve the data in the wireless device and send a return message by accessing a memory in the wireless device and initiating commands to make a copy of the data on the memory, the return message including the data retrieved from the wireless device, determine whether the request data includes a request to purge the data stored in the wireless device, if the request data includes a request to purge the data stored in the wireless device the application program executes a delete command from a menu in the wireless device to purge the data from the wireless device based on the request data, wherein the return message further includes an acknowledgement that the data is purged from the wireless device, if the request data does not include a request to purge the data stored in the wireless device the application program does not execute the delete command. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
Specification