System and method for preventing access to data on a compromised remote device
First Claim
Patent Images
1. A method, comprising:
- transmitting, from a device and to a remote synchronization server, an indication that the device is compromised; and
in response to transmitting the indication, receiving, at the device and from the remote synchronization server, an instruction that instructs the device to execute an auto-destruction of at least one subset of data available on the device, the instruction further instructing the device to sever a connection to the remote synchronization server.
4 Assignments
0 Petitions
Accused Products
Abstract
This invention discloses a system and method for selective erasure, encryption and or copying of data on a remote device if the remote device has been compromised or the level of authorization of a roaming user in charge of the remote device has been modified.
-
Citations
17 Claims
-
1. A method, comprising:
-
transmitting, from a device and to a remote synchronization server, an indication that the device is compromised; and in response to transmitting the indication, receiving, at the device and from the remote synchronization server, an instruction that instructs the device to execute an auto-destruction of at least one subset of data available on the device, the instruction further instructing the device to sever a connection to the remote synchronization server. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A device, comprising:
-
a memory; and at least one hardware processor communicatively coupled with the memory and configured to; transmit, from the device and to a remote synchronization server, an indication that the device is compromised; and in response to transmitting the indication, receive, at the device and from the remote synchronization server, an instruction that instructs the device to execute an auto-destruction of at least one subset of data available on the device, the instruction further instructing the device to sever a connection to the remote synchronization server. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable medium containing instructions which, when executed, cause a device to perform operations comprising:
-
transmitting, from the device and to a remote synchronization server, an indication that the device is compromised; and in response to transmitting the indication, receiving, at the device and from the remote synchronization server, an instruction that instructs the device to execute an auto-destruction of at least one subset of data available on the device, the instruction further instructing the device to sever a connection to the remote synchronization server. - View Dependent Claims (14, 15, 16, 17)
-
Specification