METHOD AND APPARATUS FOR PROTECTING DATA IN A PORTABLE ELECTRONIC DEVICE
First Claim
1. A method for protecting data in a portable electronic device, comprising the steps of:
- determining that the device is misplaced, lost, or stolen; and
protecting the data in the device if it is determined that the device is misplaced, lost, or stolen.
2 Assignments
0 Petitions
Accused Products
Abstract
Data in a portable electronic device is protected by using external and internal status detection means to determine if the device is misplaced, lost, or stolen. The device then takes, singly or in combination, one of several actions to protect the data on the device, including declaring its location to an owner or service provider, locking the device or specific functions of the device to disable all data retrieval functionality, erasing or overwriting all the stored data in the device or, where the data has been stored in the device in an encrypted format, destroying an internally-stored encryption key, thereby preventing unauthorized access to the encrypted data in the device.
94 Citations
32 Claims
-
1. A method for protecting data in a portable electronic device, comprising the steps of:
-
determining that the device is misplaced, lost, or stolen; and
protecting the data in the device if it is determined that the device is misplaced, lost, or stolen. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A data protection apparatus comprising:
-
a portable electronic device having data storage;
means associated with said portable electronic device for determining status of the portable electronic device; and
means associated with said portable electronic device for protecting data on the portable electronic device whenever the status of the portable electronic device is determined to be undesirable. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A method for protecting data in a portable electronic device, wherein the data is encrypted with an encryption key stored in the portable electronic device, the method comprising the steps of:
-
an owner of the portable electronic device determining that the device has an undesirable status;
the owner calling the portable electronic device and transmitting a code to the portable electronic device indicating the undesirable status;
the portable electronic device receiving the code; and
upon receipt of the code, the portable electronic device destroying the stored encryption key;
wherein access to the data on the portable electronic device is prevented.
-
Specification