Passive based security escalation to shut off of application based on rules event triggering
First Claim
1. A system for passive based security escalation implementation, the system comprising:
- a memory device with a security application stored thereon;
a communication device in operative communication with a communication device associated with a user device over a network; and
a processing device operatively coupled to the memory device and the communication device, wherein the security application, when executed by the processing device, causes the processing device to;
determine an offline period of time for the user device;
generate a security escalation plan for the user device, wherein the security escalation plan comprises a set of rules for security during the offline period of time, wherein the set of rules for security during the offline period of time comprises rules for initiating a shutdown of one or more applications on the user device; and
integrate, over the network, the security escalation plan into a user application on the user device, wherein the user application, when executed by a processor associated with the user device, causes the processor to implement the security escalation plan.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention are directed to a system, method, or computer program product for a passive based security escalation to shut off of applications on a mobile device based on rules. As such, the system may identify, via extraction of data, time periods correlating to events that the user may be offline or inactive with respect to his/her mobile device. Once the time periods are identified, rules are created for the level of security escalation required based on the event. Subsequently, a trigger is identified at a time leading up to the event, where the system integrates with the mobile device and requires additional authentication to access one or more applications. Once the offline event starts, the system initiates a shutdown of the functions of one or more applications on the user'"'"'s mobile device. The system then reinstates the application functionality after the offline event has ended.
-
Citations
18 Claims
-
1. A system for passive based security escalation implementation, the system comprising:
-
a memory device with a security application stored thereon; a communication device in operative communication with a communication device associated with a user device over a network; and a processing device operatively coupled to the memory device and the communication device, wherein the security application, when executed by the processing device, causes the processing device to; determine an offline period of time for the user device; generate a security escalation plan for the user device, wherein the security escalation plan comprises a set of rules for security during the offline period of time, wherein the set of rules for security during the offline period of time comprises rules for initiating a shutdown of one or more applications on the user device; and integrate, over the network, the security escalation plan into a user application on the user device, wherein the user application, when executed by a processor associated with the user device, causes the processor to implement the security escalation plan. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product for passive based security escalation implementation, the computer program product comprising at least one non-transitory computer-readable medium having computer-readable program code portions embodied therein, the computer-readable program code portions comprising:
-
an executable portion configured for determining an offline period of time for a user device; an executable portion configured for generating a security escalation plan for the user device, wherein the security escalation plan comprises a set of rules for security during the offline period of time, wherein the set of rules for security during the offline period of time comprises rules for initiating a shutdown of one or more applications on the user device; an executable portion configured for integrating, over a network, the security escalation plan into a user application; and an executable portion configured for implementing the security escalation plan. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer-implemented method for passive based security escalation implementation, the method comprising:
-
determining an offline period of time for a user device; generating a security escalation plan for the user device, wherein the security escalation plan comprises a set of rules for security during the offline period of time, wherein the set of rules for security during the offline period of time comprises rules for initiating a shutdown of one or more applications on the user device; integrating, over a network, the security escalation plan into a user application; and implementing the security escalation plan. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification