Selectively wiping a remote device
First Claim
1. A method, comprising:
- receiving a securing command at a mobile device via a wireless communication subsystem, the mobile device storing data of at least one type; and
in response to receiving the securing command, the mobile device selectively securing the data by;
determining at least one type of data to be secured based on information comprised in the securing command;
setting an indicator for each type of data thus determined;
securing data of each type of data thus indicated; and
removing each indicator corresponding to a type of data to be secured after the data of that type is secured.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for selectively securing data from unauthorized access on a client device storing a plurality of data types with reference to an authorization level indicated in a command. A command is received at a client device comprising an authorization level indicator. Based on at least one predefined rule, which may be implemented in an IT policy stored at the client device, each of the plurality of data types to be secured is determined, and then the data corresponding to those types is secured. The data may be secured by encrypting and/or deleting the data at the client device. The predefined rules associated with each authorization level may be configured by a user or administrator having an authorization level that exceeds the associated authorization level.
-
Citations
19 Claims
-
1. A method, comprising:
-
receiving a securing command at a mobile device via a wireless communication subsystem, the mobile device storing data of at least one type; and in response to receiving the securing command, the mobile device selectively securing the data by; determining at least one type of data to be secured based on information comprised in the securing command; setting an indicator for each type of data thus determined; securing data of each type of data thus indicated; and removing each indicator corresponding to a type of data to be secured after the data of that type is secured. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A mobile device, comprising:
-
at least one memory component storing data of at least one type; a wireless communication subsystem; and at least one processor configured to enable; receiving a securing command at a mobile device via the wireless communication subsystem; and in response to receiving the securing command, selectively securing the data by; determining at least one type of data to be secured based on information comprised in the securing command; setting an indicator for each type of data thus determined; securing data of each type of data thus indicated; and removing each indicator corresponding to a type of data to be secured after the data of that type is secured. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable medium storing code which, when executed by one or more processors of a mobile device, causes the mobile device to perform operations comprising:
-
receiving a securing command at the mobile device via a wireless communication subsystem, the mobile device storing data of at least one type; and in response to receiving the securing command, the mobile device selectively securing the data by; determining at least one type of data to be secured based on information comprised in the securing command; setting an indicator for each type of data thus determined; securing data of each type of data thus indicated; and removing each indicator corresponding to a type of data to be secured after the data of that type is secured.
-
Specification