System and method for ensuring security of data stored on electronic computing devices
First Claim
1. A computerized method for using a host electronic computing device to prevent access to data stored in an electronic computing device that is remote from the host, each of the electronic computing devices adapted for selective electronic communication with the other, comprising the steps of:
- providing a first software program for the remote device, the first software program being adapted to receive an expiration time value, compare the expiration time value against a time based parameter, and cause a launch of a security mechanism when the comparison of the expiration time value with the time based parameter indicates that the expiration time value has passed;
providing a second software program for the host device, the second software program being configured to receive data that has been sent to the host by the remote device;
identifying the remote device via the received data sent from the remote device; and
resetting the expiration time value of the first software program when electronic communication between the host and the remote device is initiated before the first software program'"'"'s comparison of the expiration time value and the time based parameter indicates that the expiration time value has passed;
wherein the expiration time value is configured to be reset according to a day of week schedule.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method for using a host electronic computing device to prevent access to data in a preselected memory portion of an electronic computing device remote from the host electronic computing device. Each of the electronic computing devices is adapted for selective electronic communication with the other. The system and method comprises a first software program for the remote device, the first software program comprising a unique identifier, a current expiration time value, a comparator for comparing the current expiration time value against a time-based parameter of the remote device, and a security trigger. The system and method further comprises a second software program for the host device, where the second software program includes means for identifying the remote device, means for accessing an expiration time reset schedule, and means for resetting the current expiration time value.
11 Citations
20 Claims
-
1. A computerized method for using a host electronic computing device to prevent access to data stored in an electronic computing device that is remote from the host, each of the electronic computing devices adapted for selective electronic communication with the other, comprising the steps of:
-
providing a first software program for the remote device, the first software program being adapted to receive an expiration time value, compare the expiration time value against a time based parameter, and cause a launch of a security mechanism when the comparison of the expiration time value with the time based parameter indicates that the expiration time value has passed; providing a second software program for the host device, the second software program being configured to receive data that has been sent to the host by the remote device; identifying the remote device via the received data sent from the remote device; and resetting the expiration time value of the first software program when electronic communication between the host and the remote device is initiated before the first software program'"'"'s comparison of the expiration time value and the time based parameter indicates that the expiration time value has passed; wherein the expiration time value is configured to be reset according to a day of week schedule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computerized system for using a host website to prevent access to data in an electronic computing device remote from the host website, the electronic computing device and host website being adapted for selective electronic communication with the other, comprising:
-
a first software program for the remote device, the first software program comprising means for receiving an expiration time value, a comparator for comparing the received expiration time value against a time-based parameter, and wherein the first software program is adapted to cause a launch of a security mechanism when the comparison of the expiration time value and the time based parameter indicates that the expiration time value has passed; and a second software program for the host website, where the second software program is configured to; receive data, sent from the remote device, to identify the remote device when the remote device has been used to access the host website; and reset the expiration time value that has been received by the first software program when the remote device is used to access the website prior to the first software program'"'"'s comparison of the received expiration time and the time-based parameter indicating that the expiration time value has passed; wherein the expiration time value is configured to be reset according to a day of week schedule. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A system for using a host electronic computing device to prevent access to data in an electronic computing device remote from the host electronic computing device, each of the electronic computing devices adapted for selective electronic communication with the other, comprising:
-
a first software program for the remote device, the first software program comprising an expiration time value, a comparator for comparing the expiration time value against a time-based parameter, and wherein the first software program is adapted to cause a launch of a security mechanism when the comparison of the expiration time value and the time based parameter indicates that the expiration time value has passed; and a second software program for the host device, where the second software program is configured to; receive data, sent from the remote device, to identify the remote device when the remote device and the host are in electronic communication; reset the expiration time value of the first software program when the remote device is placed in electronic communication with the host prior to the first software program'"'"'s comparison of the received expiration time value and the time-based parameter indicating that the expiration time value has passed; wherein the expiration time value is configured to be reset according to a day of week schedule. - View Dependent Claims (19, 20)
-
Specification