Method and apparatus for data protection for mobile devices
First Claim
Patent Images
1. A method for protecting data stored in a device, comprising:
- backing up data by the device to a backup system upon the device being connected to the backup system;
detecting by the device that the device has been lost or stolen;
generating by the device an encryption key from the backed up data upon the detection that the device has been lost or stolen;
encrypting by the device non-backed up data stored on the device that has not been stored on the backup system using the generated encryption key; and
deleting by the device the backed up data and the encryption key from the device with the encrypted non-backed up data remaining stored on the device for later recovery by the backup system.
23 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus protect data stored in a device by storing data from the device on a backup system upon the device being connected to the backup system; detecting that the device has been lost or stolen; encrypting a set of data stored on the device that has not been stored on the backup system using an encryption key based on another set of data stored on the device and also stored on the backup system; and deleting the other set of data and encryption key from the device.
-
Citations
18 Claims
-
1. A method for protecting data stored in a device, comprising:
-
backing up data by the device to a backup system upon the device being connected to the backup system; detecting by the device that the device has been lost or stolen; generating by the device an encryption key from the backed up data upon the detection that the device has been lost or stolen; encrypting by the device non-backed up data stored on the device that has not been stored on the backup system using the generated encryption key; and deleting by the device the backed up data and the encryption key from the device with the encrypted non-backed up data remaining stored on the device for later recovery by the backup system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory processor-readable medium for protecting data stored in a device, comprising processor-executable instructions configured for:
-
backing up data by processor-executable instructions on the device to a backup system upon the device being connected to the backup system; detecting by processor-executable instructions on the device that the device has been lost or stolen; generating by processor-executable instructions on the device an encryption key from the backed up data upon the detection that the device has been lost or stolen; encrypting by processor-executable instructions on the device a non-backed up data stored on the device that has not been stored on the backup system using the generated encryption key; and deleting by processor-executable instructions on the device the backed up data and the encryption key from the device with the encrypted non-backed up data remaining stored on the device for later recovery by the backup system. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification