Automatic security action invocation for mobile communications device
First Claim
1. A method for providing security on a mobile communications device, the method comprising:
- forcing the mobile communications device into a locked state, regardless of any current user input activity and regardless of wireless network coverage, upon expiry of periodic timeout periods, each timeout period having a first duration;
detecting, by a communications subsystem of the mobile communications device, prior to expiry of a particular timeout period of the periodic timeout periods, a lack of wireless network coverage for a second duration that is shorter than the first duration; and
responsive to detecting the lack of wireless network coverage for the second duration, forcing the mobile communications device into the locked state prior to the expiry of the particular timeout period, regardless of any current user input activity, thereby shortening the particular timeout period from the first duration to the second duration.
2 Assignments
0 Petitions
Accused Products
Abstract
A mobile communications device, method, and computer program product for providing security on a mobile communications device are described. In accordance with one example embodiment, the mobile communications device comprises: a processor; a communications subsystem connected to the processor operable to exchange signals with a wireless network and with the processor; a storage element connected to the processor and having a plurality of application modules and data stored thereon, the data comprising at least user application data associated with the application modules and service data including data for establishing communications with the wireless network; and a security module operable to determine if a battery level falls below a predetermined threshold and perform a security action comprising erasing or encrypting at least some of the data on the storage element if the battery power falls below the predetermined threshold.
27 Citations
24 Claims
-
1. A method for providing security on a mobile communications device, the method comprising:
-
forcing the mobile communications device into a locked state, regardless of any current user input activity and regardless of wireless network coverage, upon expiry of periodic timeout periods, each timeout period having a first duration; detecting, by a communications subsystem of the mobile communications device, prior to expiry of a particular timeout period of the periodic timeout periods, a lack of wireless network coverage for a second duration that is shorter than the first duration; and responsive to detecting the lack of wireless network coverage for the second duration, forcing the mobile communications device into the locked state prior to the expiry of the particular timeout period, regardless of any current user input activity, thereby shortening the particular timeout period from the first duration to the second duration. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A mobile communications device, comprising:
-
a processor; a communications subsystem coupled to the processor; an input device coupled to the processor; a storage element coupled to the processor and having data stored thereon; and a security module operable to; force the mobile communications device into a locked state, regardless of any current user input activity and regardless of wireless network coverage, upon expiry of periodic timeout periods, each timeout period having a first duration; detect, in conjunction with the communications subsystem, prior to expiry of a particular timeout period of the periodic timeout periods, a lack of wireless network coverage for a second duration that is shorter than the first duration; and force the mobile communications device into the locked state prior to the expiry of the particular timeout period, regardless of any current user input activity, responsive to detection of the lack of wireless network coverage for the second duration, thereby shortening the particular timeout period from the first duration to the second duration. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable medium comprising instructions executable on a mobile communications device for providing security on the mobile communications device, the instructions comprising:
-
code for forcing the mobile communications device into a locked state, regardless of any current user input activity and regardless of wireless network coverage, upon expiry of periodic timeout periods, each timeout period having a first duration; code for detecting, by a communications subsystem of the mobile communications device, prior to expiry of a particular timeout period of the periodic timeout periods, a lack of wireless network coverage for a second duration that is shorter than the first duration; and code for forcing the mobile communications device into the locked state prior to the expiry of the particular timeout period, regardless of any current user input activity, responsive to detecting the lack of wireless network coverage for the second duration, thereby shortening the particular timeout period from the first duration to the second duration. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification