Method and system for mobile data security
First Claim
Patent Images
1. A computer-implemented method for mobile data security comprising the steps of:
- storing a computer software program and database on a mobile device comprising a software license key and a mobile device serial number;
connecting the mobile device to a first PC comprising a first PC serial number, the first PC operable to validate the device based on security settings that are accessed from a remote computing device;
determining that the mobile device is authorized to be used on the first PC based on the combination of the software license key, the mobile device serial number and the first PC serial number;
transferring data from the first PC onto the mobile device;
communicating to the remote computing device details related to the data that was transferred to the mobile device;
storing details related to the data that was transferred from the first PC to the mobile device on the remote computing device as meta-data logs;
storing details related to the data that was transferred from the first PC to the mobile device into the database on the mobile storage device;
disconnecting the mobile device from the first PC;
connecting the mobile device to a second PC comprising a second PC serial number, the second PC operable to validate the device based on security settings that are accessed from the remote computing device;
determining that the mobile device is authorized to be used on the second PC based on the software license key, the mobile device serial number, and the second PC serial number;
transferring files from the mobile device to the second PC;
communicating to the remote computing device the details related to the data that was transferred from the mobile device to the second PC;
storing the details related to the data that was transferred from the mobile device to the second PC on the remote computing device as meta-data logs; and
storing details related to the data that was transferred from the mobile device to the second PC into the database on the mobile storage device.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and from a variety of computing and storage devices.
-
Citations
8 Claims
-
1. A computer-implemented method for mobile data security comprising the steps of:
-
storing a computer software program and database on a mobile device comprising a software license key and a mobile device serial number; connecting the mobile device to a first PC comprising a first PC serial number, the first PC operable to validate the device based on security settings that are accessed from a remote computing device; determining that the mobile device is authorized to be used on the first PC based on the combination of the software license key, the mobile device serial number and the first PC serial number; transferring data from the first PC onto the mobile device; communicating to the remote computing device details related to the data that was transferred to the mobile device; storing details related to the data that was transferred from the first PC to the mobile device on the remote computing device as meta-data logs; storing details related to the data that was transferred from the first PC to the mobile device into the database on the mobile storage device; disconnecting the mobile device from the first PC; connecting the mobile device to a second PC comprising a second PC serial number, the second PC operable to validate the device based on security settings that are accessed from the remote computing device; determining that the mobile device is authorized to be used on the second PC based on the software license key, the mobile device serial number, and the second PC serial number; transferring files from the mobile device to the second PC; communicating to the remote computing device the details related to the data that was transferred from the mobile device to the second PC; storing the details related to the data that was transferred from the mobile device to the second PC on the remote computing device as meta-data logs; and storing details related to the data that was transferred from the mobile device to the second PC into the database on the mobile storage device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method for multi-factor remote data access, comprising the steps of:
-
storing a computer software program and database on a mobile device comprising a mobile device serial number and a software license key; connecting the mobile device to a first PC comprising a first serial number and operable to validate the device based on security settings that are accessed from a remote computing device comprising remote security settings and a remote storage device; determining that the mobile device is authorized to be used on the first PC based on the mobile device serial number, the first PC serial number and the software license key; transferring data from the first PC onto the remote storage device; communicating to the remote computing device the details related to the data that was transferred to the remote storage device; storing details related to the data that was transferred from the first PC to the remote storage device on the remote computing device as meta-data logs; disconnecting the mobile device from the first PC; connecting the mobile device to a second PC comprising a second serial number and operable to validate the device based on security settings that are accessed from the remote computing device; determining that the mobile device is authorized to be used on the second PC based on the mobile device serial number, the software license key, and the second serial number; receiving data transferred from the remote storage device to the second PC; communicating to the remote computing device the details related to the data that was transferred from the remote storage device; and storing the details related to the data that was transferred from the remote storage device to the second PC on the remote computing device as meta-data logs.
-
Specification