System and method for ensuring security of data stored on electronic computing devices
First Claim
1. A method for using a host electronic computing device to prevent access to data in a preselected memory portion of an electronic computing device remote from the host electronic computing device, each of the electronic computing devices adapted for selective electronic communication with the other, comprising the steps of:
- providing a self-cannibalizing software program for the remote device, the self-cannibalizing software program comprising a unique identifier, a current expiration time value, a comparator for comparing the current expiration time value against a time-based parameter of the remote device, and a security trigger configured to be activated by the self-cannibalizing software at a preset expiration time;
providing a second software program for the host device, the second software program comprising an identifier and an expiration time reset schedule, including at least a day of a week list, which is stored at the host device and configured to control when the expiration time of the self-cannibalizing software must be reset in order to prevent an automatic launch of the security trigger at the remote device;
establishing an initial current expiration time value in the self-cannibalizing software program by establishing selective electronic communication from the host device to the remote device;
identifying a periodic signal from the remote device by comparing a received identifier signal against the unique identifier;
interrogating the remote device for a status signal from the comparator;
receiving the status signal from the remote device; and
in response to the time-based parameter not exceeding the current expiration time value, sending a signal to the remote device to reset the current time expiration value; and
in response to the time-based parameter exceeding the current expiration time value, launching a data erase program configured to erase or render unrecoverable at least a portion of the data stored in the remote device.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method for using a host electronic computing device to prevent access to data in a preselected memory portion of an electronic computing device remote from the host electronic computing device. Each of the electronic computing devices is adapted for selective electronic communication with the other. The system and method comprises a first software program for the remote device, the first software program comprising a unique identifier, a current expiration time value, a comparator for comparing the current expiration time value against a time-based parameter of the remote device, and a security trigger. The system and method further comprises a second software program for the host device, where the second software program includes means for identifying the remote device, means for accessing an expiration time reset schedule, and means for resetting the current expiration time value.
-
Citations
32 Claims
-
1. A method for using a host electronic computing device to prevent access to data in a preselected memory portion of an electronic computing device remote from the host electronic computing device, each of the electronic computing devices adapted for selective electronic communication with the other, comprising the steps of:
-
providing a self-cannibalizing software program for the remote device, the self-cannibalizing software program comprising a unique identifier, a current expiration time value, a comparator for comparing the current expiration time value against a time-based parameter of the remote device, and a security trigger configured to be activated by the self-cannibalizing software at a preset expiration time; providing a second software program for the host device, the second software program comprising an identifier and an expiration time reset schedule, including at least a day of a week list, which is stored at the host device and configured to control when the expiration time of the self-cannibalizing software must be reset in order to prevent an automatic launch of the security trigger at the remote device; establishing an initial current expiration time value in the self-cannibalizing software program by establishing selective electronic communication from the host device to the remote device; identifying a periodic signal from the remote device by comparing a received identifier signal against the unique identifier; interrogating the remote device for a status signal from the comparator; receiving the status signal from the remote device; and in response to the time-based parameter not exceeding the current expiration time value, sending a signal to the remote device to reset the current time expiration value; and in response to the time-based parameter exceeding the current expiration time value, launching a data erase program configured to erase or render unrecoverable at least a portion of the data stored in the remote device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for using a host electronic computing device to prevent access to data in a preselected memory portion of an electronic computing device remote from the host electronic computing device, each of the electronic computing devices adapted for selective electronic communication with the other, comprising;
-
a self-cannibalizing software program for the remote device, the self-cannibalizing software program comprising a unique identifier, a current expiration time value, a comparator for comparing the current expiration time value against a time-based parameter of the remote device, and a security trigger configured to be activated by the self-cannibalizing software at a preset expiration time; and a second software program for the host device, where the second software program comprises; means for identifying the remote device via the unique identifier; means for accessing an expiration time reset schedule, including at least a day of a week list, which is stored at the host device and configured to control when the expiration time of the self-cannibalizing software must be reset in order to prevent an automatic launch of the security trigger at the remote device; means for resetting the current expiration time value in response to the time-based parameter not exceeding the current expiration time value; and means for launching a data erase program configured to erase or render unrecoverable at least a portion of the data stored in the remote device in response to the time-based parameter exceeding the current expiration time value. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A computer program product embodied in at least one computer-readable storage device for using a host electronic computing device to prevent access to data in a preselected memory portion of an electronic computing device remote from the host electronic computing device, each of the electronic computing devices configured for selective electronic communication with the other, the computer program product comprising;
-
a self-cannibalizing software program for the remote device, the self-cannibalizing software program comprising a unique identifier, a current expiration time value, a comparator for comparing the current expiration time value against a time-based parameter of the remote device, and a security trigger configured to be activated by the self-cannibalizing software at a preset expiration time; and a second software program for the host device, where the second software program, when executed by a processor, is configured to perform the functions comprising; identifying the remote device via the unique identifier; accessing an expiration time reset schedule, including at least a day of a week list, stored at the host device and configured to control when the expiration time of the self-cannibalizing software must be reset in order to prevent an automatic launch of the security trigger at the remote device; resetting the current expiration time value in response to the time-based parameter not exceeding the current expiration time value; and launching a data erase program configured to erase or render unrecoverable at least a portion of the data stored in the remote device in response to the time-based parameter exceeding the current expiration time value. - View Dependent Claims (29, 30, 31, 32)
-
Specification