Device-initiated security policy
First Claim
Patent Images
1. A method for executing a security policy at a mobile terminal, the method comprising:
- determining, by the mobile terminal, whether a predetermined event has occurred, wherein the predetermined event comprises either one of (i) a lapse of a predetermined time interval, or (ii) a predetermined number starts of the mobile device;
in response to determining the predetermined event occurred, contacting, by the mobile terminal, an authentication entity, based on the security policy, to determine whether a security status of the mobile terminal is one of lost or stolen;
receiving, by the mobile terminal, a response from the authentication entity indicative of the security status of the mobile terminal, in response to contacting the authentication entity, the response from the authentication entity indicating that the security status of the mobile terminal is one of lost or stolen, the response comprising security instructions defining a security action for execution on the mobile terminal, the security action comprising an authentication procedure, transmitting a location of the mobile terminal to the authentication entity, and, subsequent to transmitting the location rendering a portion of the mobile terminal inoperable for use;
upon determining the security status of the mobile terminal is one of lost or stolen, executing, by the mobile terminal, performance of the authentication procedure by a user as defined by the security action;
upon determining successful performance of the authentication procedure by the user of the mobile terminal;
preventing the execution of (a) transmitting the location of the mobile terminal to the authentication entity and (b) rendering the portion of the mobile terminal inoperable for use; and
setting the security status of the mobile terminal to secure; and
upon determining unsuccessful performance of the authentication procedure by the user of the mobile terminal;
transmitting, by the mobile terminal, a Short Message Service (SMS) message to the authentication entity that includes the location of the mobile terminal, wherein the message is transmitted transparently with respect to the user of the mobile communication device; and
subsequent to transmitting the SMS message, rendering the portion of the mobile terminal inoperable for use.
5 Assignments
0 Petitions
Accused Products
Abstract
A method and system for executing a security policy at a mobile terminal is provided. The mobile terminal may contact an authentication entity based on the security policy. The mobile terminal may receive a response from the authentication entity indicative of a security status of the mobile terminal. The mobile terminal may execute a security action based on the received response.
29 Citations
32 Claims
-
1. A method for executing a security policy at a mobile terminal, the method comprising:
-
determining, by the mobile terminal, whether a predetermined event has occurred, wherein the predetermined event comprises either one of (i) a lapse of a predetermined time interval, or (ii) a predetermined number starts of the mobile device; in response to determining the predetermined event occurred, contacting, by the mobile terminal, an authentication entity, based on the security policy, to determine whether a security status of the mobile terminal is one of lost or stolen; receiving, by the mobile terminal, a response from the authentication entity indicative of the security status of the mobile terminal, in response to contacting the authentication entity, the response from the authentication entity indicating that the security status of the mobile terminal is one of lost or stolen, the response comprising security instructions defining a security action for execution on the mobile terminal, the security action comprising an authentication procedure, transmitting a location of the mobile terminal to the authentication entity, and, subsequent to transmitting the location rendering a portion of the mobile terminal inoperable for use; upon determining the security status of the mobile terminal is one of lost or stolen, executing, by the mobile terminal, performance of the authentication procedure by a user as defined by the security action; upon determining successful performance of the authentication procedure by the user of the mobile terminal; preventing the execution of (a) transmitting the location of the mobile terminal to the authentication entity and (b) rendering the portion of the mobile terminal inoperable for use; and setting the security status of the mobile terminal to secure; and upon determining unsuccessful performance of the authentication procedure by the user of the mobile terminal; transmitting, by the mobile terminal, a Short Message Service (SMS) message to the authentication entity that includes the location of the mobile terminal, wherein the message is transmitted transparently with respect to the user of the mobile communication device; and subsequent to transmitting the SMS message, rendering the portion of the mobile terminal inoperable for use. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A mobile terminal comprising:
-
a memory that stores a security policy; logic to determine whether a triggering criterion has occurred, where the triggering criterion comprises (i) a lapse of a predetermined time interval, and (ii) a predetermined number starts of the mobile device; a transmitter to contact an authentication entity, when the triggering criterion has occurred, to determine whether a security status of the mobile terminal is one of lost or stolen; logic to receive a response from the authentication entity indicating that the mobile terminal has been lost or stolen, in response to the transmitter contacting the authentication entity, the response comprising security instructions defining a command for execution on the mobile terminal, the command comprising an authentication procedure, transmitting a location of the mobile terminal to the authentication entity and subsequent to transmitting the location, rendering a portion of the mobile terminal inoperable; upon determining the security status of the mobile terminal is one of lost or stolen, logic to execute, by the mobile terminal, performance of the authentication procedure by a user as defined by the command; upon determining successful performance of the authentication procedure by the user of the mobile terminal; logic to prevent the execution of (a) transmitting the location of the mobile terminal to the authentication entity and (b) rendering the portion of the mobile terminal inoperable for use; and setting the security status of the mobile terminal to secure; and upon determining unsuccessful performance of the authentication procedure by the user of the mobile terminal; logic to transmit a Short Message Service (SMS) message to the authentication entity that includes the location of the mobile terminal, wherein the message is transmitted transparently with respect to the user of the mobile communication device and, subsequent to transmitting the message, render the portion of the mobile terminal inoperable. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. A method comprising:
-
maintaining, by an authentication entity, a security status associated with each of a plurality of mobile terminals; receiving, by the authentication entity, notice that a mobile terminal, of the plurality of mobile terminals, has been lost or stolen; receiving, by the authentication entity, contact from the mobile terminal to inquire about the security status of the mobile terminal, wherein the contact is received from the mobile terminal in response to occurrence of a predetermined event, wherein the predetermined event includes either one of (i) a lapse of a predetermined time interval, or (ii) a predetermined number starts of the mobile device; and in response to receiving the contact from the mobile terminal and determining that the security status of the mobile terminal is lost or stolen, transmitting, by the authentication entity, a response to the mobile terminal indicating that the security status of the mobile terminal is lost or stolen, the response comprising security instructions defining a security action for execution on the mobile terminal, the security action comprising an authentication procedure, transmitting a location of the mobile terminal to the authentication entity and, subsequent to transmitting the location, rendering a portion of the mobile terminal inoperable, wherein the mobile terminal; upon receiving the security status of the mobile terminal indicated as being lost or stolen, executes, by the mobile terminal, performance of the authentication procedure by a user as defined by the security action, and upon determining successful performance of the authentication procedure by the user of the mobile terminal;
preventing execution of the security action based on the security status of the mobile terminal indicated as being lost or stolen of (a) transmitting the location of the mobile terminal to the authentication entity and (b) rendering the portion of the mobile terminal inoperable for use; andsetting the security status of the mobile terminal to secure; and upon determining unsuccessful performance of the authentication procedure by the user of the mobile terminal, executes the security action based on the security status of the mobile terminal indicated as being lost or stolen, wherein executing the security action comprises transmitting a Short Message Service (SMS) message to the authentication entity that includes the location of the mobile terminal, wherein the message is transmitted transparently with respect to the user of the mobile communication device, and, subsequent to transmitting the message, rendering the portion of the mobile terminal inoperable. - View Dependent Claims (24, 25, 26)
-
-
27. A security system comprising:
-
an authentication entity comprising an application specific integrated circuit (ASIC) and configured to; maintain a security status for a mobile terminal connected to the authentication entity via a network, receive contact, from the mobile terminal, to inquire about the security status of the mobile terminal, wherein the contact is received from the mobile terminal in response to occurrence of a predetermined event, wherein the predetermined event includes either one of (i) a lapse of a predetermined time interval, or (ii) a predetermined number starts of the mobile device, determine whether the security status of the mobile terminal is lost or stolen, and in response to determining the security status of the mobile terminal is lost or stolen, transmit an indication of the security status as being lost or stolen to the mobile terminal, the indication comprising security instructions defining a security action for execution on the mobile terminal, the security action comprising an authentication procedure, transmitting a location of the mobile terminal to the authentication entity and, subsequent to transmitting the location, rendering a portion of the mobile terminal inoperable, wherein the mobile terminal; upon receiving the security status of the mobile terminal indicated as being lost or stolen, executes, by the mobile terminal, performance of the authentication procedure by a user as defined by the security action, and upon determining successful performance of the authentication procedure by the user of the mobile terminal;
determines preventing execution of the security action based on the security status of the mobile terminal indicated as being lost or stolen of (a) transmitting the location of the mobile terminal to the authentication entity and (b) rendering the portion of the mobile terminal inoperable for use; andsetting the security status of the mobile terminal to secure; and upon determining unsuccessful performance of the authentication procedure by the user of the mobile terminal, determines that the security action to be executed on the mobile terminal is transmitting the location of the mobile terminal to the authentication entity based on security status of the mobile terminal indicated as being lost or stolen and transmitting a Short Message Service (SMS) message to the authentication entity that includes the location of the mobile terminal, wherein the message is transmitted transparently with respect to the user of the mobile communication device and subsequent to transmitting the location, renders the portion of the mobile terminal inoperable. - View Dependent Claims (28, 29, 30, 31, 32)
-
Specification