×

System and method for ensuring security of data stored on electronic computing devices

  • US 7,930,755 B1
  • Filed: 12/31/2007
  • Issued: 04/19/2011
  • Est. Priority Date: 11/02/2007
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for using a host electronic computing device to prevent access to data in a preselected memory portion of an electronic computing device remote from the host electronic computing device, each of the electronic computing devices adapted for selective electronic communication with the other, comprising the steps of:

  • providing a self-cannibalizing software program for the remote device, the self-cannibalizing software program comprising a unique identifier, a current expiration time value, a comparator for comparing the current expiration time value against a time-based parameter of the remote device, and a security trigger configured to be activated by the self-cannibalizing software at a preset expiration time;

    providing a second software program for the host device, the second software program comprising an identifier and an expiration time reset schedule, including at least a day of a week list, which is stored at the host device and configured to control when the expiration time of the self-cannibalizing software must be reset in order to prevent an automatic launch of the security trigger at the remote device;

    establishing an initial current expiration time value in the self-cannibalizing software program by establishing selective electronic communication from the host device to the remote device;

    identifying a periodic signal from the remote device by comparing a received identifier signal against the unique identifier;

    interrogating the remote device for a status signal from the comparator;

    receiving the status signal from the remote device; and

    in response to the time-based parameter not exceeding the current expiration time value, sending a signal to the remote device to reset the current time expiration value; and

    in response to the time-based parameter exceeding the current expiration time value, launching a data erase program configured to erase or render unrecoverable at least a portion of the data stored in the remote device.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×