After the fact protection of data in remote personal and wireless devices
First Claim
1. A method for securing a portable electronic device, comprising:
- (a) generating a security message;
(b) transmitting said security message to said portable electronic device;
(c) performing a destructive action on said portable electronic device in response to said security message.
2 Assignments
0 Petitions
Accused Products
Abstract
A security system is provided which permits a user or owner of a portable electronic device to report the device missing to a security station. In response, the security station wirelessly transmits a security message or command to the portable electronic device which, in turn, responds by causing a “destructive” security action to occur. The destructive action may include erasing memory in the portable device, disabling certain functions (e.g., transmitting data, receiving data, accessing memory, etc.) or other types of actions such as reporting location information to the security station. Various security mechanisms can be implemented as well to minimize the risk that an unauthorized entity will be able to broadcast security messages to portable devices.
345 Citations
51 Claims
-
1. A method for securing a portable electronic device, comprising:
-
(a) generating a security message;
(b) transmitting said security message to said portable electronic device;
(c) performing a destructive action on said portable electronic device in response to said security message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A portable electronic device, comprising:
-
a CPU;
a memory device coupled to said CPU;
a decryption key stored in said memory device;
an input/output (“
I/O”
) module coupled to said CPU which receives messages from an external security station;
wherein said CPU receives security messages from said security station via said I/O module and, in response, performs a destructive action. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A security station through which a user of a portable electronic device can initiate a security response associated with the portable electronic device, comprising:
-
a registry of user information accessible by said CPU and including an identifier value associated with the portable electronic device; and
a communication port to facilitate communication with the portable electronic device;
wherein said CPU generates a security message which is transmitted through the communication port to the portable electronic device to cause the portable electronic device to perform a destructive security action. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51)
-
Specification