SYSTEM AND METHOD FOR WIPING AND DISABLING A REMOVED DEVICE
First Claim
1. A method, implemented at a server system, for causing a security command to be executed remotely at a target mobile device, wherein the target mobile device is configured to receive, decrypt using a command decryption key, and execute security commands from the server system and the server system is initially provided with a command encryption key for encrypting security commands for the target device, the method comprising the steps of:
- generating a security command for the target mobile device by encrypting the security command using the command encryption key;
storing the encrypted security command;
deleting the command encryption key in response to a received instruction;
receiving a further instruction to issue the security command to the target mobile device after the command encryption key is deleted;
in response to the received further instruction, retrieving the previously stored encrypted security command, and transmitting the security command to the target mobile device.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method implemented at a server system, for securely wiping a remote mobile device after the device registration has been removed from the server system. Prior to removal of the device registration from the server system, a “pre-packaged” command is created and stored at the server system. In the event that it is determined, after removal of the registration, that the device should be wiped or disabled, means are provided for an administrator to issue the previously stored command to the target mobile device.
87 Citations
27 Claims
-
1. A method, implemented at a server system, for causing a security command to be executed remotely at a target mobile device, wherein the target mobile device is configured to receive, decrypt using a command decryption key, and execute security commands from the server system and the server system is initially provided with a command encryption key for encrypting security commands for the target device, the method comprising the steps of:
-
generating a security command for the target mobile device by encrypting the security command using the command encryption key; storing the encrypted security command; deleting the command encryption key in response to a received instruction; receiving a further instruction to issue the security command to the target mobile device after the command encryption key is deleted; in response to the received further instruction, retrieving the previously stored encrypted security command, and transmitting the security command to the target mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 26, 27)
-
-
13. A server system for issuing security commands to a target mobile device, comprising:
-
a processor configured to generate an encrypted security command for a selected target mobile device using an associated command encryption key, the selected target mobile device being provided with a command decryption key corresponding to the command encryption key; memory for storing a set of security commands for a target mobile device, a registration for the selected target mobile device comprising the associated command encryption key, and the encrypted security command for the selected target mobile device; a transmission module for transmitting commands to target mobile devices; wherein the processor is further configured to respond to a received removal instruction by removing the registration for the selected target mobile device while maintaining the stored encrypted security command, to respond to an issuing instruction received after having responded to the removal instruction by transmitting the stored encrypted security command to the selected target mobile device. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 23, 24, 25)
-
Specification