Communication system for information security and recovery and method therfor
First Claim
1. A method for information security and recovery within a communication system having a plurality of communication devices and a backup server, the method comprising:
- receiving a request to secure a communication device operating within the communication system;
transferring a plurality of device information from the communication device to the backup server; and
disabling the operation of the communication device.
1 Assignment
0 Petitions
Accused Products
Abstract
A communication system (10) for information security and recovery includes at least one communication device (60) having a memory (145) for storing a plurality of device information (117); a backup server (110); and a system controller (40) coupled between the backup server (110) and the at least one communication device (60). The system controller (40) is programmed to receive a request to secure the communication device (60); transfer the plurality of device information (117) from the communication device (60) to the backup server (110); and disable the operation of the communication device (60).
210 Citations
22 Claims
-
1. A method for information security and recovery within a communication system having a plurality of communication devices and a backup server, the method comprising:
-
receiving a request to secure a communication device operating within the communication system;
transferring a plurality of device information from the communication device to the backup server; and
disabling the operation of the communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A communication system for information security and recovery comprising:
-
at least one communication device having a memory for storing a plurality of device information;
a backup server; and
a system controller coupled between the backup server and the at least one communication device, wherein the system controller is programmed to;
receive a request to secure the communication device;
transfer the plurality of device information from the communication device to the backup server; and
disable the operation of the communication device. - View Dependent Claims (18, 19, 20, 21, 22)
-
Specification