×

Systems and methods for mitigating the unauthorized use of a device

  • US 9,916,481 B2
  • Filed: 08/13/2012
  • Issued: 03/13/2018
  • Est. Priority Date: 04/02/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • detecting that a security compromise event has occurred for a mobile device;

    altering a function of the mobile device in response to the security compromise event to mitigate loss of control by an authorized user, wherein;

    altering the function of the mobile device includes denying access to data stored on the mobile device; and

    detecting that the security compromise event has occurred includes receiving, by the mobile device, a command to alter the function of the mobile device;

    transmitting, by the mobile device, a first code to a security authority in response to receiving the command to alter the function of the mobile device;

    receiving, by the mobile device, a second code from the security authority;

    comparing, by the mobile device, the first code and the second code to a predetermined security protocol; and

    altering the function of the mobile device if the first code and the second code are in accordance with the security protocol;

    wherein denying access to data stored on the mobile device includes one of;

    concealing at least a portion of a file system for the mobile device; and

    encrypting at least a portion of a file system for the mobile device.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×