System and method for protecting files stored on an electronic device
First Claim
1. A method of protecting a file stored on an electronic device, the method comprising:
- receiving, from a user, user input selecting a file for protection processing, wherein the file is stored in the electronic device and the user input is received before the electronic device has been stolen;
in response to receiving the user input selecting the file for protection processing, transmitting identification information for the selected file from the electronic device to a remote server before the electronic device has been reported stolen;
after receiving the user input selecting the file for protection processing, automatically receiving theft information from the remote server, wherein the theft information indicates whether the electronic device has been reported stolen;
automatically determining, at the electronic device, whether the electronic device has been reported stolen, based on the theft information from the remote server; and
after determining whether the electronic device has been reported stolen, automatically processing the selected file according to the selected protection processing, wherein the processing is contingent on whether the electronic device has been reported stolen,wherein the operation of receiving user input selecting the file for protection processing further comprises (1) receiving user input selecting the file for encryption and automatic decryption under certain predetermined conditions, and/or (2) receiving user input selecting the file for automatic saving of the file from the electronic device to remote storage after the electronic device has been reported stolen.
4 Assignments
0 Petitions
Accused Products
Abstract
An electronic device includes a security system which provides for protection of designated files stored on an electronic device. For example, an electronic device may receive user input selecting a file for protection processing. The user input may select the file for encryption and automatic decryption under certain predetermined conditions and/or for automatic saving to a remote storage device after the device has been reported stolen, for instance. After receiving the user input selecting the file for protection processing, the electronic device may automatically receive theft information from a remote server, wherein the theft information indicates whether the electronic device has been reported stolen. After determining whether the electronic device has been reported stolen, the electronic device may automatically process the selected file according to the selected protection processing, wherein the processing is contingent on whether the electronic device has been reported stolen. Other embodiments are described and claimed.
83 Citations
25 Claims
-
1. A method of protecting a file stored on an electronic device, the method comprising:
-
receiving, from a user, user input selecting a file for protection processing, wherein the file is stored in the electronic device and the user input is received before the electronic device has been stolen; in response to receiving the user input selecting the file for protection processing, transmitting identification information for the selected file from the electronic device to a remote server before the electronic device has been reported stolen; after receiving the user input selecting the file for protection processing, automatically receiving theft information from the remote server, wherein the theft information indicates whether the electronic device has been reported stolen; automatically determining, at the electronic device, whether the electronic device has been reported stolen, based on the theft information from the remote server; and after determining whether the electronic device has been reported stolen, automatically processing the selected file according to the selected protection processing, wherein the processing is contingent on whether the electronic device has been reported stolen, wherein the operation of receiving user input selecting the file for protection processing further comprises (1) receiving user input selecting the file for encryption and automatic decryption under certain predetermined conditions, and/or (2) receiving user input selecting the file for automatic saving of the file from the electronic device to remote storage after the electronic device has been reported stolen. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An electronic device, comprising:
-
memory; a network interface; a processor operably coupled to the memory and to the network interface; and instructions stored in the memory and executable on the processor to perform operations comprising; receiving, from a user, user input selecting a file for protection processing, wherein the file is stored in the electronic device and the user input is received before the electronic device has been stolen; in response to receiving the user input selecting the file for protection processing, transmitting identification information for the selected file from the electronic device to a remote server before the electronic device has been reported stolen; after receiving the user input selecting the file for protection processing, automatically receiving theft information from the remote server, wherein the theft information indicates whether the electronic device has been reported stolen; automatically determining, at the electronic device, whether the electronic device has been reported stolen, based on the theft information from the remote server; and after determining whether the electronic device has been reported stolen, automatically processing the selected file according to the selected protection processing, wherein the processing is contingent on whether the electronic device has been reported stolen, wherein the operation of receiving user input selecting the file for protection processing further comprises (1) receiving user input selecting the file for encryption and automatic decryption under certain predetermined conditions, and/or (2) receiving user input selecting the file for automatic saving of the file from the electronic device to remote storage after the electronic device has been reported stolen. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. An article of manufacture, comprising:
-
a non-transitory machine-readable medium; and instructions stored in the non-transitory machine-readable medium and configured, when executed by an electronic device, to perform operations comprising; receiving, from a user, user input selecting a file for protection processing, wherein the file is stored in the electronic device and the user input is received before the electronic device has been stolen; in response to receiving the user input selecting the file for protection processing, transmitting identification information for the selected file from the electronic device to a remote server before the electronic device has been reported stolen; after receiving the user input selecting the file for protection processing, automatically receiving theft information from the remote server, wherein the theft information indicates whether the electronic device has been reported stolen; automatically determining, at the electronic device, whether the electronic device has been reported stolen, based on the theft information from the remote server; and after determining whether the electronic device has been reported stolen, automatically processing the selected file according to the selected protection processing, wherein the processing is contingent on whether the electronic device has been reported stolen, wherein the operation of receiving user input selecting the file for protection processing further comprises (1) receiving user input selecting the file for encryption and automatic decryption under certain predetermined conditions, and/or (2) receiving user input selecting the file for automatic saving of the file from the electronic device to remote storage after the electronic device has been reported stolen. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
Specification