Dynamic interface for mobile devices
First Claim
1. A method of enforcing security and confidentiality on a communications device using a dynamic interface application, comprising:
- receiving, by a provider security component stored on a non-transitory computer readable medium and executable by a processor, a first message indicating that the security of the communications device has been compromised, wherein the first message is generated in response to the security of the communications device being compromised, and wherein the first message identifies panes of the dynamic interface application to be marked confidential, and selected functionality of the dynamic interface application and underlying communications functionality to be disabled;
authenticating, by the provider security component, the first message;
processing, by the provider security component, first instructions contained in the first message to safeguard content associated with the panes of the dynamic interface application to be marked confidential;
sending, by the provider security component, second instructions based on the first instructions to a device security component executing on the communications device to render inaccessible the panes of the dynamic interface application marked confidential by deleting or temporarily disabling access to the panes marked confidential and to disable the selected functionality of the dynamic interface application and the underlying communications functionality of the communications device until receiving further instruction, wherein the second instructions list the panes marked confidential that are to be rendered inaccessible, and the selected functionality of the dynamic interface application and the underlying communications functionality to be disabled;
rendering inaccessible, by the device security component, the panes marked confidential by one of deleting and temporarily disabling access to the panes marked confidential pursuant to the second instructions;
disabling, by the device security component, the selected functionality of the dynamic interface application and the underlying communications functionality of the communications device until receiving further instruction pursuant to the second instructions;
receiving, by the provider security component, a second message indicating that the security of the communications device is no longer compromised;
sending, by the provider security component, third instructions to the device security component to enable previously disabled functionality and restore the panes previously disabled pursuant to the second instructions; and
enabling, by the device security component, previously disabled functionality and restoring previously disabled panes pursuant to the third instructions.
5 Assignments
0 Petitions
Accused Products
Abstract
A method of enforcing security and confidentiality on a communications device using a dynamic interface application comprises a first external device receiving a first message from a second external device indicating that the security of the communications device has been compromised, and the first external device authenticating the first message and processing the instructions contained in the first message to safeguard content marked confidential. The method also comprises the first external device sending a second message to a device security component executing on the communications device, the second message containing instructions to render inaccessible tiles marked confidential by one of deleting and temporarily disabling access to marked tiles, and disable selected functionality of the dynamic interface application and underlying communications functionality of the communications device until receiving further instruction. The method also comprises the device security component carrying out the instructions contained in the second message.
-
Citations
16 Claims
-
1. A method of enforcing security and confidentiality on a communications device using a dynamic interface application, comprising:
-
receiving, by a provider security component stored on a non-transitory computer readable medium and executable by a processor, a first message indicating that the security of the communications device has been compromised, wherein the first message is generated in response to the security of the communications device being compromised, and wherein the first message identifies panes of the dynamic interface application to be marked confidential, and selected functionality of the dynamic interface application and underlying communications functionality to be disabled; authenticating, by the provider security component, the first message; processing, by the provider security component, first instructions contained in the first message to safeguard content associated with the panes of the dynamic interface application to be marked confidential; sending, by the provider security component, second instructions based on the first instructions to a device security component executing on the communications device to render inaccessible the panes of the dynamic interface application marked confidential by deleting or temporarily disabling access to the panes marked confidential and to disable the selected functionality of the dynamic interface application and the underlying communications functionality of the communications device until receiving further instruction, wherein the second instructions list the panes marked confidential that are to be rendered inaccessible, and the selected functionality of the dynamic interface application and the underlying communications functionality to be disabled; rendering inaccessible, by the device security component, the panes marked confidential by one of deleting and temporarily disabling access to the panes marked confidential pursuant to the second instructions; disabling, by the device security component, the selected functionality of the dynamic interface application and the underlying communications functionality of the communications device until receiving further instruction pursuant to the second instructions; receiving, by the provider security component, a second message indicating that the security of the communications device is no longer compromised; sending, by the provider security component, third instructions to the device security component to enable previously disabled functionality and restore the panes previously disabled pursuant to the second instructions; and enabling, by the device security component, previously disabled functionality and restoring previously disabled panes pursuant to the third instructions. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of enforcing security and confidentiality on a communications device using a dynamic interface application, comprising:
-
receiving, by a provider security component stored on a non-transitory computer readable medium and executable by a processor, a first message indicating that the security of the communications device has been compromised, wherein the first message is generated in response to the security of the communications device being compromised, and wherein the first message identifies panes of the dynamic interface application to be marked confidential, and selected functionality of the dynamic interface application and underlying communications functionality to be disabled; authenticating, by the provider security component, the first message; processing, by the provider security component, first instructions contained in the first message to safeguard content associated with the panes of the dynamic interface application to be marked confidential; sending, by the provider security component, the first instructions to a device security component executing on the communications device to render inaccessible the panes of the dynamic interface application marked confidential by deleting or temporarily disabling access to marked panes and to disable the selected functionality of the dynamic interface application and the underlying communications functionality of the communications device until receiving further instruction; receiving, by the provider security component, a second message indicating that the security of the communications device is no longer compromised; and sending, by the provider security component, second instructions to the device security component to enable previously disabled functionality and restore panes previously disabled pursuant to the first instructions. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A method of enforcing security and confidentiality on a communications device using a dynamic interface application, comprising:
-
receiving, by a provider security component stored on a non-transitory computer readable medium and executable by a processor, a first message indicating that the security of the communications device has been compromised, wherein the first message is generated in response to the security of the communications device being compromised, and wherein the first message identifies panes of the dynamic interface application to be marked confidential, and selected functionality of the dynamic interface application and underlying communications functionality to be disabled; processing, by the provider security component, first instructions contained in the first message to safeguard content associated with the panes of the dynamic interface application to be marked confidential; sending, by the provider security component, second instructions based on the first instructions to a device security component executing on the communications device to render inaccessible the panes of the dynamic interface application marked confidential by deleting or temporarily disabling access to the panes marked confidential and to disable the selected functionality of the dynamic interface application and the underlying communications functionality of the communications device until receiving further instruction, wherein the second instructions list the panes marked confidential that are to be rendered inaccessible, and the selected functionality of the dynamic interface application and the underlying communications functionality to be disabled; receiving, by a device security component executing on the communications device, the second instructions; carrying out, by the device security component, the second instructions; receiving, by the device security component, third instructions to enable previously disabled functionality and restore panes previously disabled pursuant to the second instructions in response to an indication that the security of the communications device is no longer compromised; and carrying out, by the device security component, the third instructions. - View Dependent Claims (14, 15, 16)
-
Specification