Method and system for providing a honeypot mode for an electronic device
First Claim
1. A method for surreptitiously tracking usage of a mobile communication electronic device, the electronic device being capable of communicating with at least one external system, the method comprising:
- providing the electronic device with a software environment having a normal mode of operation and a honeypot mode of operation and with a predetermined condition, wherein, in said normal mode of operation, said software environment provides a plurality of user-invokable operations, and wherein, in said honeypot mode of operation, said software environment provides at least one of said user-invokable operations;
detecting, at the electronic device, the predetermined condition, wherein the predetermined condition includes receipt, from an external device, of a message including a honeypot-triggering command;
authenticating the message to verify that the message is a legitimate honeypot-triggering command sent by an authorized sender;
in response to the authentication of the message, switching the software environment to said honeypot mode of operation; and
,when in said honeypot mode of operation the electronic device is enabled to automatically and surreptitiously send a usage report regarding an unauthorized usage of said at least one of said user-invokable operations to a predetermined external system.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and system are described of providing an electronic device with a software environment having a honeypot mode of operation to which the device is capable of switching upon recognition of a message from an external device or of a pre-determined internal state. Switching to the honeypot mode of operation may include instituting an automatic sending of reports based on usage of the electronic device to an external device, modifying the non-user-observable behavior of certain user-invokable operations, and manipulating data stored on the electronic device.
43 Citations
35 Claims
-
1. A method for surreptitiously tracking usage of a mobile communication electronic device, the electronic device being capable of communicating with at least one external system, the method comprising:
-
providing the electronic device with a software environment having a normal mode of operation and a honeypot mode of operation and with a predetermined condition, wherein, in said normal mode of operation, said software environment provides a plurality of user-invokable operations, and wherein, in said honeypot mode of operation, said software environment provides at least one of said user-invokable operations; detecting, at the electronic device, the predetermined condition, wherein the predetermined condition includes receipt, from an external device, of a message including a honeypot-triggering command; authenticating the message to verify that the message is a legitimate honeypot-triggering command sent by an authorized sender; in response to the authentication of the message, switching the software environment to said honeypot mode of operation; and
,when in said honeypot mode of operation the electronic device is enabled to automatically and surreptitiously send a usage report regarding an unauthorized usage of said at least one of said user-invokable operations to a predetermined external system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 17, 18)
-
-
15. A method for surreptitiously tracking usage of a mobile communication electronic device, the electronic device being capable of communicating with at least one external system, the method comprising:
-
providing the electronic device with a software environment having a normal mode of operation and a honeypot mode of operation and with a predetermined condition, wherein, in said normal mode of operation, said software environment provides a plurality of user-invokable operations, and wherein, in said honeypot mode of operation, said software environment provides at least one of said user-invokable operations; detecting, at the electronic device, the predetermined condition, wherein the predetermined condition includes receipt, from an external device, of a message including a honeypot-triggering command; authenticating the message to verify that the message is a legitimate honeypot-triggering command sent by an authorized sender; in response to the authentication of the message, switching the software environment to said honeypot mode of operation, wherein said step of switching includes moving data to a portion of memory that is inaccessible to all user-invokable operations while the electronic device is operating in said honeypot mode; and
,when in said honeypot mode of operation the electronic device is enabled to automatically and surreptitiously send a usage report regarding an unauthorized usage of said at least one of said user-invokable operations to a predetermined external system. - View Dependent Claims (16)
-
-
19. A mobile communication electronic device, configured to enable surreptitious tracking of usage of the electronic device, the electronic device comprising:
-
a communication subsystem for enabling communications with at least one external system; memory storing a software environment having a normal mode of operation and a honeypot mode of operation and storing a predetermined condition, wherein, in said normal mode of operation, said software environment provides a plurality of user-invokable operations, and wherein, in said honeypot mode of operation, said software environment provides at least one of said user-invokable operations; a processor for executing said software environment; and a mode-switch module for detecting the predetermined condition, wherein the predetermined condition includes receipt, from an external device, of a message including a honeypot-triggering command, authenticating the message to verify that the message is a legitimate honeypot-triggering command sent by an authorized sender, and, in response to the authentication of the message, switching the software environment to said honeypot mode of operation; wherein, when in said honeypot mode of operation, said software environment is enabled to automatically send a usage report regarding an unauthorized usage of said at least one of said user-invokable operations to a predetermined external system. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 34)
-
-
32. A mobile communication electronic device, configured to enable surreptitious tracking of usage of the electronic device, the electronic device comprising:
-
a communication subsystem for enabling communications with at least one external system; memory storing a software environment having a normal mode of operation and a honeypot mode of operation and storing a predetermined condition, wherein, in said normal mode of operation, said software environment provides a plurality of user-invokable operations, and wherein, in said honeypot mode of operation, said software environment provides at least one of said user-invokable operations; a processor for executing said software environment; and a mode-switch module for detecting the predetermined condition, wherein the predetermined condition includes receipt, from an external device, of a message including a honeypot-triggering command, authenticating the message to verify that the message is a legitimate honeypot-triggering command sent by an authorized sender and, in response to the authentication of the message, switching the software environment to said honeypot mode of operation; wherein, when in said honeypot mode of operation, said software environment is enabled to automatically and surreptitiously send a usage report regarding an unauthorized usage of said at least one of said user-invokable operations to a predetermined external system; wherein said step of switching includes moving data to a portion of memory that is inaccessible to all user-invokable operations while the electronic device is operating in said honeypot mode; wherein the moving of data comprises moving data to a portion of memory that is inaccessible to all user-invokable operations while the electronic device is operating in said honeypot mode. - View Dependent Claims (33)
-
-
35. A computer program product comprising a non-transitory computer-readable medium having encoded therein computer-executable instructions for surreptitiously tracking usage of a mobile communication electronic device, the electronic device being capable of communicating with at least one external system, the instructions comprising:
-
instructions for providing the electronic device with a software environment having a normal mode of operation and a honeypot mode of operation and with a predetermined condition, wherein, in said normal mode of operation, said software environment provides a plurality of user-invokable operations, and wherein, in said honeypot mode of operation, said software environment provides at least one of said user-invokable operations; instructions for detecting, at the electronic device, the predetermined condition, wherein the predetermined condition includes receipt, from an external device, of a message including a honeypot-triggering command; instructions for authenticating the message to verify that the message is a legitimate honeypot-triggering command sent by an authorized sender; instructions for, in response to the authentication of the message, switching the software environment to said honeypot mode of operation; and instructions for, when in said honeypot mode of operation, automatically and surreptitiously sending a usage report regarding an unauthorized usage of said at least one of said user-invokable operations to a predetermined external system.
-
Specification