×

Method and system for mobile data security

  • US 8,086,688 B1
  • Filed: 05/15/2009
  • Issued: 12/27/2011
  • Est. Priority Date: 05/16/2008
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for mobile data security comprising the steps of:

  • storing a computer software program and database on a mobile device comprising a software license key and a mobile device serial number;

    connecting the mobile device to a first PC comprising a first PC serial number, the first PC operable to validate the device based on security settings that are accessed from a remote computing device;

    determining that the mobile device is authorized to be used on the first PC based on the combination of the software license key, the mobile device serial number and the first PC serial number;

    transferring data from the first PC onto the mobile device;

    communicating to the remote computing device details related to the data that was transferred to the mobile device;

    storing details related to the data that was transferred from the first PC to the mobile device on the remote computing device as meta-data logs;

    storing details related to the data that was transferred from the first PC to the mobile device into the database on the mobile storage device;

    disconnecting the mobile device from the first PC;

    connecting the mobile device to a second PC comprising a second PC serial number, the second PC operable to validate the device based on security settings that are accessed from the remote computing device;

    determining that the mobile device is authorized to be used on the second PC based on the software license key, the mobile device serial number, and the second PC serial number;

    transferring files from the mobile device to the second PC;

    communicating to the remote computing device the details related to the data that was transferred from the mobile device to the second PC;

    storing the details related to the data that was transferred from the mobile device to the second PC on the remote computing device as meta-data logs; and

    storing details related to the data that was transferred from the mobile device to the second PC into the database on the mobile storage device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×