System and method for protecting data in wireless devices
First Claim
1. A method of protecting data on a network-based wireless device comprising the steps of:
- (a) providing a security manager with an identification of the wireless device;
(b) determining at the security manager whether the wireless device contains data that is to be protected;
(c) sending from the security manager to the wireless device a command to secure the data that is to be protected;
(d) securing at the wireless device the data that is to be protected;
(e) receiving an acknowledgment at the security manager that the data has been secured; and
(f) sending from the security manager a message for refusing network access to the wireless device,wherein steps (c), (d) and (e) are skipped if it is determined in step (b) that the wireless device does not contain data that is to be protected.
6 Assignments
0 Petitions
Accused Products
Abstract
When a network-based wireless device such as a mobile phone or data terminal is reported lost or stolen or is determined to be malfunctioning, a service provider can immediately deny the device access to the network. However, any management operation to secure data carried by the wireless device cannot be carried out as the device is no longer reachable from the network. Therefore, the data should be secured before the device is rendered inoperable. Apparatus and methods are provided to back-up the data or wipe the data before the system denies access to the device. A system and method are provided by which a security manager works in conjunction with an equipment register of the network to lock and wipe data on the wireless device before the device is denied access to the network. Similarly, for a wireless device that is later recovered or determined to be operable, the device can be granted access to the network again and any data that was locked or wiped can be unlocked or restored over the network.
16 Citations
20 Claims
-
1. A method of protecting data on a network-based wireless device comprising the steps of:
-
(a) providing a security manager with an identification of the wireless device; (b) determining at the security manager whether the wireless device contains data that is to be protected; (c) sending from the security manager to the wireless device a command to secure the data that is to be protected; (d) securing at the wireless device the data that is to be protected; (e) receiving an acknowledgment at the security manager that the data has been secured; and (f) sending from the security manager a message for refusing network access to the wireless device, wherein steps (c), (d) and (e) are skipped if it is determined in step (b) that the wireless device does not contain data that is to be protected. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification