System and method for preventing access to data on a compromised remote device
First Claim
Patent Images
1. A method, comprising:
- receiving, at a synchronization server and from a remote device, an indication that the remote device is compromised, wherein the server controls access to data held on the remote device;
determining, by the synchronization server, a trigger of an auto-destruction of data available on the remote device based on the indication;
determining, by the synchronization server, an extent of the auto-destruction based on the trigger according to a set procedure;
selecting, by the synchronization server, at least one subset of data available on the remote device based on the trigger and the set procedure; and
transmitting, from the synchronization server to the remote device, a command to execute the determined extent of the auto-destruction of the at least one subset of data available on the remote device.
4 Assignments
0 Petitions
Accused Products
Abstract
This invention discloses a system and method for selective erasure, encryption and or copying of data on a remote device if the remote device has been compromised or the level of authorization of a roaming user in charge of the remote device has been modified.
121 Citations
20 Claims
-
1. A method, comprising:
-
receiving, at a synchronization server and from a remote device, an indication that the remote device is compromised, wherein the server controls access to data held on the remote device; determining, by the synchronization server, a trigger of an auto-destruction of data available on the remote device based on the indication; determining, by the synchronization server, an extent of the auto-destruction based on the trigger according to a set procedure; selecting, by the synchronization server, at least one subset of data available on the remote device based on the trigger and the set procedure; and transmitting, from the synchronization server to the remote device, a command to execute the determined extent of the auto-destruction of the at least one subset of data available on the remote device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable storage medium having computer-readable instructions stored thereon, the computer-readable instructions when executed by a synchronization server device cause the synchronization server device to perform a method of controlling access to data available on a remote device, the method comprising:
-
receiving, at the synchronization server device and from the remote device, an indication that the remote device is compromised; determining, by the synchronization server device, a trigger of an auto-destruction of the data available on the remote device based on the indication; determining, by the synchronization server device, an extent of the auto-destruction based on the trigger according to a set procedure; selecting, by the synchronization server device at least one subset of data available on the remote device based on the trigger and the set procedure; and transmitting, to the remote device, a command to execute the determined extent of the auto-destruction of the at least one subset of data available on the remote device. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A synchronization server system for use in controlling access to data held on a remote device, the remote device being remote from the synchronization server system and holding a plurality of sets of data, the synchronization server system configured to:
-
receive, at a synchronization server and from the remote device, an indication that the remote device is compromised; determine, by the synchronization server, a trigger of an auto-destruction of data available on the remote device based on the indication; determine, by the synchronization server, an extent of the auto-destruction based on the trigger according to a set procedure; select, by the synchronization server, at least one subset of data available on the remote device based on the trigger and the set procedure; and transmit, to the remote device, a command to execute the determined extent of the auto-destruction of the at least one subset of data available on the remote device. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification