System for securing a mobile terminal
First Claim
Patent Images
1. A method for securing a mobile terminal comprising:
- after detecting loss of Bluetooth proximity from a previously connected authentication device determine the current location of the mobile terminal,whereby if the current location is in a predefined zone, lock access to at least one application,whereby if the current location is outside a predefined zone, go to an alert mode, wherein when in alert mode the mobile terminal locks access to at least one application,wherein after a predetermined period of time, a call is made to a first remote device,wherein after a predetermined period of time, a call is made to a second remote device,wherein after a predetermined period of time,an email message comprising information about the current location of the mobile terminal is sent,a Short Message Service message comprising information about the current location of the mobile terminal is sent,wherein said current location is determined using a means selected from the group consisting of onboard GPS and Wifi,wherein after a predetermined period of time, data can be deleted,whereby when the previously connected authentication device is detected using Bluetooth protocol, the mobile terminal aborts the alert mode.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for securing user data on a mobile device using a Bluetooth fob. The method and apparatus enables robust access security, issues alerts when the user leaves proximity of his/her terminal, and can delete confidential data. The method also teaches using a Bluetooth smart phone soft token for securing data on a mobile device.
-
Citations
20 Claims
-
1. A method for securing a mobile terminal comprising:
-
after detecting loss of Bluetooth proximity from a previously connected authentication device determine the current location of the mobile terminal, whereby if the current location is in a predefined zone, lock access to at least one application, whereby if the current location is outside a predefined zone, go to an alert mode, wherein when in alert mode the mobile terminal locks access to at least one application, wherein after a predetermined period of time, a call is made to a first remote device, wherein after a predetermined period of time, a call is made to a second remote device, wherein after a predetermined period of time, an email message comprising information about the current location of the mobile terminal is sent, a Short Message Service message comprising information about the current location of the mobile terminal is sent, wherein said current location is determined using a means selected from the group consisting of onboard GPS and Wifi, wherein after a predetermined period of time, data can be deleted, whereby when the previously connected authentication device is detected using Bluetooth protocol, the mobile terminal aborts the alert mode. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for securing a mobile terminal comprising:
after detecting loss of Bluetooth proximity from a previously connected authentication device, determine the current location of the mobile terminal, whereby if the current location is in a predefined zone, lock access to at least one application, whereby if the current location is outside a predefined zone, go to an alert mode, wherein when in alert mode the mobile terminal locks access to at least one application, wherein after a predetermined period of time, a call is made to a first remote device, wherein after a predetermined period of time, a call is made to a second remote device wherein the mobile terminal sends at least one email message comprising information about the current location of the mobile terminal, and/or sends at least one a Short Message Service message comprising information about the current location of the mobile terminal, wherein after a predetermined period of time, data can be deleted, whereby when a previously connected authentication device is detected using Bluetooth protocol, the mobile terminal aborts the alert mode, the method further comprises provisioning the authentication device with user data wherein said user data is selected from the group consisting of; password, One-time-password, certificate, response to a challenge question, challenge authentication results, biometric reading, biometric authentication results, motion information, acceleration information, interface ID, encryption protocol, obfuscation protocol.
-
10. A method for securing a mobile terminal comprising:
-
after detecting loss of proximity from a previously connected short wireless authentication device, determine the current location of the mobile terminal, whereby if the current location is in a predefined zone, lock access to at least one application, whereby if the current location is outside a predefined zone, go to an alert mode, wherein when in alert mode the mobile terminal locks access to at least one application, wherein after a predetermined period of time, a call is made to a first remote device, wherein after a predetermined period of time, a call is made to a second remote device and wherein after a predetermined period of time, the mobile terminal performs an action selected from the group consisting of; send an email message comprising information about the current location of the mobile terminal, send a Short Message Service message comprising information about the current location of the mobile terminal, wherein after a predetermined period of time, data can be deleted; whereby when a short wireless authentication device is detected, the mobile terminal aborts the alert mode; whereby after a request for access onboard thethe mobile terminal if a first authentication device is not connected to the mobile terminal using a short wireless connection, and a second authentication mobile phone is not connected to the mobile terminal using a short wireless connection, access is locked, whereby if a first authentication device is connected to the mobile terminal using a short wireless connection, or if a second authentication mobile phone is connected to the mobile terminal using a short wireless connection, information is requested from a connected device, whereby after receipt of a wireless response from the connected device, and after successful authentication, access is authorized. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification