×

Device-initiated security policy

  • US 9,191,822 B2
  • Filed: 03/09/2007
  • Issued: 11/17/2015
  • Est. Priority Date: 03/09/2007
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for executing a security policy at a mobile terminal, the method comprising:

  • determining, by the mobile terminal, whether a predetermined event has occurred, wherein the predetermined event comprises either one of (i) a lapse of a predetermined time interval, or (ii) a predetermined number starts of the mobile device;

    in response to determining the predetermined event occurred, contacting, by the mobile terminal, an authentication entity, based on the security policy, to determine whether a security status of the mobile terminal is one of lost or stolen;

    receiving, by the mobile terminal, a response from the authentication entity indicative of the security status of the mobile terminal, in response to contacting the authentication entity, the response from the authentication entity indicating that the security status of the mobile terminal is one of lost or stolen, the response comprising security instructions defining a security action for execution on the mobile terminal, the security action comprising an authentication procedure, transmitting a location of the mobile terminal to the authentication entity, and, subsequent to transmitting the location rendering a portion of the mobile terminal inoperable for use;

    upon determining the security status of the mobile terminal is one of lost or stolen, executing, by the mobile terminal, performance of the authentication procedure by a user as defined by the security action;

    upon determining successful performance of the authentication procedure by the user of the mobile terminal;

    preventing the execution of (a) transmitting the location of the mobile terminal to the authentication entity and (b) rendering the portion of the mobile terminal inoperable for use; and

    setting the security status of the mobile terminal to secure; and

    upon determining unsuccessful performance of the authentication procedure by the user of the mobile terminal;

    transmitting, by the mobile terminal, a Short Message Service (SMS) message to the authentication entity that includes the location of the mobile terminal, wherein the message is transmitted transparently with respect to the user of the mobile communication device; and

    subsequent to transmitting the SMS message, rendering the portion of the mobile terminal inoperable for use.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×