Selectively wiping a remote device
First Claim
1. A method of selectively securing data at a mobile device by a command issuer associated with an authorization level, the method comprising:
- receiving a securing command at the mobile device via a wireless communication subsystem, the mobile device storing data of a first type and data of a second type, the securing command including the authorization level associated with the command issuer; and
in response to receiving the securing command, the mobile device selectively securing the data by;
determining the authorization level from the securing command;
determining, at the mobile device, using the authorization level included in the securing command that data of the first type is to be secured;
securing data of the first type and not securing data of one or more data types not identified by the mobile device based on the authorization level included in the securing command.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for selectively securing data from unauthorized access on a client device storing a plurality of data types with reference to an authorization level indicated in a command. A command is received at a client device comprising an authorization level indicator. Based on at least one predefined rule, which may be implemented in an IT policy stored at the client device, each of the plurality of data types to be secured is determined, and then the data corresponding to those types is secured. The data may be secured by encrypting and/or deleting the data at the client device. The predefined rules associated with each authorization level may be configured by a user or administrator having an authorization level that exceeds the associated authorization level.
52 Citations
33 Claims
-
1. A method of selectively securing data at a mobile device by a command issuer associated with an authorization level, the method comprising:
-
receiving a securing command at the mobile device via a wireless communication subsystem, the mobile device storing data of a first type and data of a second type, the securing command including the authorization level associated with the command issuer; and in response to receiving the securing command, the mobile device selectively securing the data by; determining the authorization level from the securing command; determining, at the mobile device, using the authorization level included in the securing command that data of the first type is to be secured; securing data of the first type and not securing data of one or more data types not identified by the mobile device based on the authorization level included in the securing command. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A mobile device, comprising:
-
at least one memory component storing data of a first type and data of a second type; a wireless communication subsystem; and at least one processor configured to enable; receiving a securing command via the wireless communication subsystem, the securing command including an authorization level associated with a command issuer; and in response to receiving the securing command, the mobile device selectively securing the data by; determining the authorization level from the securing command; determining using the authorization level included in the securing command that data of the first type is to be secured; and securing data of the first type and not securing data of one or more data types not identified by the mobile device based on the authorization level included in the securing command. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A non-transitory computer-readable medium storing code which, when executed by one or more processors of a mobile device, causes the mobile device to perform operations comprising:
-
receiving a securing command at the mobile device via a wireless communication subsystem, the mobile device storing data of a first type and data of a second type, the securing command including an authorization level associated with a command issuer; and in response to receiving the securing command, the mobile device selectively securing the data by; determining the authorization level from the securing command; determining, at the mobile device, using the authorization level included in the securing command that data of the first type is to be secured; and securing data of the first type and not securing data of one or more data types not identified by the mobile device based on the authorization level included in the securing command. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification