Systems and methods for securing data on mobile devices
First Claim
1. A computer-implemented method for securing data on mobile devices, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- identifying a first mobile computing device and a second mobile computing device paired via a wireless communication technology that facilitates communication between the first mobile computing device and the second mobile computing device;
identifying a maximum expected distance between the first and second mobile computing devices;
calculating a current distance between the first and second mobile computing devices;
determining that the current distance between the first and second mobile computing devices exceeds the maximum expected distance between the first and second mobile computing devices;
backing up data stored on the first mobile computing device in response to the determination that the current distance exceeds the maximum expected distance.
6 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for securing data on mobile devices may include (1) identifying a first computing device and a second computing device paired via a wireless communication technology that facilitates communication between the first computing device and the second computing device, (2) identifying a maximum expected distance between the first and second computing devices, (3) calculating a current distance between the first and second computing devices, (4) determining that the current distance between the first and second computing devices exceeds the maximum expected distance between the first and second computing devices, and (5) backing up data stored on the first computing device in response to the determination that the current distance exceeds the maximum expected distance. Various other methods, systems, and computer-readable media are also disclosed.
-
Citations
20 Claims
-
1. A computer-implemented method for securing data on mobile devices, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
identifying a first mobile computing device and a second mobile computing device paired via a wireless communication technology that facilitates communication between the first mobile computing device and the second mobile computing device; identifying a maximum expected distance between the first and second mobile computing devices; calculating a current distance between the first and second mobile computing devices; determining that the current distance between the first and second mobile computing devices exceeds the maximum expected distance between the first and second mobile computing devices; backing up data stored on the first mobile computing device in response to the determination that the current distance exceeds the maximum expected distance. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for securing data on mobile devices, the system comprising:
-
an identification module programmed to; identify a first mobile computing device and a second mobile computing device paired via a wireless communication technology that facilitates communication between the first mobile computing device and the second mobile computing device; identify a maximum expected distance between the first and second mobile computing devices; a calculation module programmed to calculate a current distance between the first and second mobile computing devices; a determination module programmed to determine that the current distance between the first and second mobile computing devices exceeds the maximum expected distance between the first and second mobile computing devices; a backup module programmed to back up data stored on the first mobile computing device in response to the determination that the current distance exceeds the maximum expected distance; at least one processor configured to execute the identification module, the calculation module, the determination module, and the backup module. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable-storage medium comprising one or more computer-executable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
identify a first mobile computing device and a second mobile computing device paired via a wireless communication technology that facilitates communication between the first mobile computing device and the second mobile computing device; identify a maximum expected distance between the first and second mobile computing devices; calculate a current distance between the first and second mobile computing devices; determine that the current distance between the first and second mobile computing devices exceeds the maximum expected distance between the first and second mobile computing devices; back up data stored on the first mobile computing device in response to the determination that the current distance exceeds the maximum expected distance. - View Dependent Claims (18, 19, 20)
-
Specification