Secure traveler framework
First Claim
1. A method comprising:
- receiving, at a computing device and from a travel data source, travel data for a user;
receiving, at the computing device, a list of countries with a high level of cyber security threats;
based on a comparison of the travel data for the user to the list of countries with a high level of cyber security threats, determining, by the computing device, whether the user is scheduled to enter a country with a high level of cyber security threats;
in response to determining that the user is scheduled to enter the country with a high level of cyber security threats, determining a user device associated with the user;
receiving, at the computing device, a first data security scan of the user device, wherein the first data security scan is performed at the user device, and wherein the first data security scan of the user device occurs at a first time before the user enters the country with a high level of cyber security threats;
receiving, at the computing device, a second data security scan of the user device, wherein the second data security scan is performed at the user device, and wherein the second data security scan of the user device occurs at a second time after the user leaves the country with a high level of cyber security threats and in response to a determination that the user device entered the country with the high level of cyber security threats;
determining one or more data security issue of the user device based on a comparison of the first data security scan to the second data security scan;
based on the comparison of the first data security scan to the second data security scan, transmitting, from the computing device, a list of the one or more data security issue to remove from the user device; and
in response to transmitting the list, removing the one or more data security issue from the user device.
1 Assignment
0 Petitions
Accused Products
Abstract
A user, such as an employee of an institution, may travel overseas where data or devices may be compromised. Described herein is a system and method for receiving travel data for the user from a travel data source and receiving a list of countries with a high level of security threats where data security may be an issue. Based on the travel data for the user and the list of countries with a high level of security threats, it may be determined whether the user is entering a country with a high level of security threats. If so, one or more user devices associated with the user may be determined, and data security scans of the devices may be generated before, during, and/or after travel. Data security issues may be determined based on a comparison of the scans. A report of the issues may optionally be generated.
26 Citations
20 Claims
-
1. A method comprising:
-
receiving, at a computing device and from a travel data source, travel data for a user; receiving, at the computing device, a list of countries with a high level of cyber security threats; based on a comparison of the travel data for the user to the list of countries with a high level of cyber security threats, determining, by the computing device, whether the user is scheduled to enter a country with a high level of cyber security threats; in response to determining that the user is scheduled to enter the country with a high level of cyber security threats, determining a user device associated with the user; receiving, at the computing device, a first data security scan of the user device, wherein the first data security scan is performed at the user device, and wherein the first data security scan of the user device occurs at a first time before the user enters the country with a high level of cyber security threats; receiving, at the computing device, a second data security scan of the user device, wherein the second data security scan is performed at the user device, and wherein the second data security scan of the user device occurs at a second time after the user leaves the country with a high level of cyber security threats and in response to a determination that the user device entered the country with the high level of cyber security threats; determining one or more data security issue of the user device based on a comparison of the first data security scan to the second data security scan; based on the comparison of the first data security scan to the second data security scan, transmitting, from the computing device, a list of the one or more data security issue to remove from the user device; and in response to transmitting the list, removing the one or more data security issue from the user device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus, comprising:
-
a processor; and memory storing computer-executable instructions that, when executed by the processor, cause the apparatus to; receive, from a travel data source, travel data for a user; receive a list of countries with a high level of cyber security threats; based on a comparison of the travel data for the user to the list of countries with a high level of cyber security threats, determine whether the user is scheduled to enter a country with a high level of cyber security threats; in response to determining that the user is scheduled to enter the country with a high level of cyber security threats, determine a user device associated with the user; receive a first data security scan of the user device, wherein the first data security scan is performed at the user device, and wherein the first data security scan of the user device occurs at a first time before the user enters the country with a high level of cyber security threats; receive a second data security scan of the user device, wherein the second data security scan is performed at the user device, and wherein the second data security scan of the user device occurs at a second time after the user leaves the country with a high level of cyber security threats and in response to a determination that the user device entered the country with the high level of cyber security threats; determine one or more data security issue of the user device based on a comparison of the first data security scan to the second data security scan; based on the comparison of the first data security scan to the second data security scan, transmit a list of the one or more data security issue to remove from the user device; and in response to transmitting the list, cause removal of the one or more data security issue from the user device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium having instructions stored thereon that, when executed, cause a computing device to:
-
receive, from a travel data source, travel data for a user; receive a list of countries with a high level of cyber security threats; based on a comparison of the travel data for the user to the list of countries with a high level of cyber security threats, determine whether the user is scheduled to enter a country with a high level of cyber security threats; in response to determining that the user is scheduled to enter the country with a high level of cyber security threats, determine a user device associated with the user; receive a first data security scan of the user device, wherein the first data security scan is performed at the user device, and wherein the first data security scan of the user device occurs at a first time before the user enters the country with a high level of cyber security threats; receive a second data security scan of the user device, wherein the second data security scan is performed at the user device, and wherein the second data security scan of the user device occurs at a second time after the user leaves the country with a high level of cyber security threats and in response to a determination that the user device entered the country with the high level of cyber security threats; determine one or more data security issue of the user device based on a comparison of the first data security scan to the second data security scan; based on the comparison of the first data security scan to the second data security scan, transmit a list of the one or more data security issue to remove from the user device; and in response to transmitting the list, cause removal of the one or more data security issue from the user device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification