Passive based security escalation to shut off of application based on rules event triggering
First Claim
1. A system for passive based security escalation implementation on a mobile device, the system comprising:
- a memory device with computer-readable program code stored thereon;
a communication device;
a processing device operatively coupled to the memory device and the communication device, wherein the processing device is configured to execute the computer-readable program code to;
extract historical user data associated with a user from one or more external sources;
identify from the historical user data, one or more indications of offline periods of time for the mobile device associated with the user, wherein the identified indications include one or more events that the user is attending at a future time;
generate a security escalation plan for the event;
access and integrate into the mobile device an increase to security requirements for authorizing one or more applications on the mobile device based on a triggering of a time period leading up to the event;
integrate into the mobile device a shutdown of the one or more applications on the mobile device during the offline period of time for the mobile device during the event;
restore functionality of the one or more applications after the offline period of time for the mobile device with an increase to the security requirements for authorizing the one or more applications on the mobile device based on a triggering of a time period after the offline time period associated with the event; and
restore standard security requirements of the one or more applications.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention are directed to a system, method, or computer program product for a passive based security escalation to shut off of applications on a mobile device based on rules. As such, the system may identify, via extraction of data, time periods correlating to events that the user may be offline or inactive with respect to his/her mobile device. Once the time periods are identified, rules are created for the level of security escalation required based on the event. Subsequently, a trigger is identified at a time leading up to the event, where the system integrates with the mobile device and requires additional authentication to access one or more applications. Once the offline event starts, the system initiates a shutdown of the functions of one or more applications on the user'"'"'s mobile device. The system then reinstates the application functionality after the offline event has ended.
186 Citations
20 Claims
-
1. A system for passive based security escalation implementation on a mobile device, the system comprising:
-
a memory device with computer-readable program code stored thereon; a communication device; a processing device operatively coupled to the memory device and the communication device, wherein the processing device is configured to execute the computer-readable program code to; extract historical user data associated with a user from one or more external sources; identify from the historical user data, one or more indications of offline periods of time for the mobile device associated with the user, wherein the identified indications include one or more events that the user is attending at a future time; generate a security escalation plan for the event; access and integrate into the mobile device an increase to security requirements for authorizing one or more applications on the mobile device based on a triggering of a time period leading up to the event; integrate into the mobile device a shutdown of the one or more applications on the mobile device during the offline period of time for the mobile device during the event; restore functionality of the one or more applications after the offline period of time for the mobile device with an increase to the security requirements for authorizing the one or more applications on the mobile device based on a triggering of a time period after the offline time period associated with the event; and restore standard security requirements of the one or more applications. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product for passive based security escalation implementation on a mobile device, the computer program product comprising at least one non-transitory computer-readable medium having computer-readable program code portions embodied therein, the computer-readable program code portions comprising:
-
an executable portion configured for extracting historical user data associated with a user from one or more external sources; an executable portion configured for identifying from the historical user data, one or more indications of offline periods of time for the mobile device associated with the user, wherein the identified indications include one or more events that the user is attending at a future time; an executable portion configured for generating a security escalation plan for the event; an executable portion configured for accessing and integrating into the mobile device an increase to security requirements for authorizing one or more applications on the mobile device based on a triggering of a time period leading up to the event; an executable portion configured for integrating into the mobile device a shutdown of the one or more applications on the mobile device during the offline period of time for the mobile device during the event; an executable portion configured for restoring functionality of the one or more applications after the offline period of time for the mobile device with an increase to the security requirements for authorizing the one or more applications on the mobile device based on a triggering of a time period after the offline time period associated with the event; an executable portion configured for restoring standard security requirements of the one or more applications. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-implemented method for passive based security escalation implementation on a mobile device, the method comprising:
providing a computing system comprising a computer processing device and a non-transitory computer readable medium, where the computer readable medium comprises configured computer program instruction code, such that when said instruction code is operated by said computer processing device, said computer processing device performs the following operations; extracting historical user data associated with a user from one or more external sources; identifying from the historical user data, one or more indications of offline periods of time for the mobile device associated with the user, wherein the identified indications include one or more events that the user is attending at a future time; generating a security escalation plan for the event; accessing and integrating into the mobile device an increase to security requirements for authorizing one or more applications on the mobile device based on a triggering of a time period leading up to the event; integrating into the mobile device a shutdown of the one or more applications on the mobile device during the offline period of time for the mobile device during the event; restoring functionality of the one or more applications after the offline period of time for the mobile device with an increase to the security requirements for authorizing the one or more applications on the mobile device based on a triggering of a time period after the offline time period associated with the event; and restoring standard security requirements of the one or more applications. - View Dependent Claims (18, 19, 20)
Specification