Proactive security for mobile devices
First Claim
1. A computer-implemented method for remotely managing a mobile device, the method comprising:
- at a host computer, and in response to receiving a request from an entity other than the mobile device;
transmitting a first security command to the mobile device, wherein the first security command causes the mobile device to gather at least one security parameter;
receiving, from the mobile device and in response to the first security command, the least one security parameter;
calculating, based on the at least one security parameter, a security risk factor associated with the mobile device, wherein the security risk factor corresponds to a first data security scheme of a plurality of data security schemes, and each data security scheme of the plurality of data security schemes defines a set of actions to be carried out when the data security scheme is applied at the mobile device;
causing the entity to display information associated with (i) the at least one security parameter, and (ii) the security risk factor; and
transmitting, to the mobile device, a second security command, wherein the second security command causes the mobile device to;
(i) apply the first data security scheme by carrying out each action in the set of actions defined by the first data security scheme, and(ii) enter a mode that enables the mobile device to autonomously apply a second security scheme that is different from the first data security scheme when the mobile device identifies a condition that corresponds to the second data security scheme.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, program products, and systems for proactively securing mobile devices are described. A mobile device can proactively determine whether the mobile device is associated with a security risk and the level of the security risk. Upon determining a security risk, the mobile device can transmit coordinates of its current geographic location to a server. To protect privacy of authorized users, the transmission can be disabled by entering a password. If multiple failed password attempts are detected, the mobile device can proactively increase a security level of the device, and selectively protect files or other content stored on the mobile device. In some implementations, the mobile device can be transitioned into a surveillance mode where the mobile device records or captures information associated with one or more of user actions, ambient sound, images, a trajectory of the device, and transmits the recorded or captured information to the network resource.
170 Citations
20 Claims
-
1. A computer-implemented method for remotely managing a mobile device, the method comprising:
at a host computer, and in response to receiving a request from an entity other than the mobile device; transmitting a first security command to the mobile device, wherein the first security command causes the mobile device to gather at least one security parameter; receiving, from the mobile device and in response to the first security command, the least one security parameter; calculating, based on the at least one security parameter, a security risk factor associated with the mobile device, wherein the security risk factor corresponds to a first data security scheme of a plurality of data security schemes, and each data security scheme of the plurality of data security schemes defines a set of actions to be carried out when the data security scheme is applied at the mobile device; causing the entity to display information associated with (i) the at least one security parameter, and (ii) the security risk factor; and transmitting, to the mobile device, a second security command, wherein the second security command causes the mobile device to; (i) apply the first data security scheme by carrying out each action in the set of actions defined by the first data security scheme, and (ii) enter a mode that enables the mobile device to autonomously apply a second security scheme that is different from the first data security scheme when the mobile device identifies a condition that corresponds to the second data security scheme. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A system configured to remotely manage a mobile device, the system comprising:
-
a processor; and a memory configured to store instructions that, when executed by the processor, cause the system to carry out steps that include; receiving a request from an entity other than the mobile device; in response to the request, transmitting a first security command to the mobile device, wherein the first security command causes the mobile device to gather at least one security parameter; receiving, from the mobile device and in response to the first security command, the least one security parameter; calculating, based on the at least one security parameter, a security risk factor associated with the mobile device, wherein the security risk factor corresponds to a first data security scheme of a plurality of data security schemes, and each data security scheme of the plurality of data security schemes defines a set of actions to be carried out when the data security scheme is applied at the mobile device; causing the entity to display information associated with (i) the at least one security parameter, and (ii) the security risk factor; and transmitting, to the mobile device, a second security command, wherein the second security command causes the mobile device to; (i) apply the first data security scheme by carrying out each action in the set of actions defined by the first data security scheme, and (ii) enter a mode that enables the mobile device to autonomously apply a second security scheme that is different from the first data security scheme when the mobile device identifies a condition that corresponds to the second data security scheme. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium configured to store instructions that, when executed by a processor included in a computing device, cause the computing device to remotely manage a mobile device, by carrying out steps that include:
-
receiving a request from an entity other than the mobile device; in response to the request, transmitting a first security command to the mobile device, wherein the first security command causes the mobile device to gather at least one security parameter; receiving, from the mobile device and in response to the first security command, the least one security parameter; calculating, based on the at least one security parameter, a security risk factor associated with the mobile device, wherein the security risk factor corresponds to a first data security scheme of a plurality of data security schemes, and each data security scheme of the plurality of data security schemes defines a set of actions to be carried out when the data security scheme is applied at the mobile device; causing the entity to display information associated with (i) the at least one security parameter, and (ii) the security risk factor; and transmitting, to the mobile device, a second security command, wherein the second security command causes the mobile device to; (i) apply the first data security scheme by carrying out each action in the set of actions defined by the first data security scheme, and (ii) enter a mode that enables the mobile device to autonomously apply a second security scheme that is different from the first data security scheme when the mobile device identifies a condition that corresponds to the second data security scheme. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification