Security command for remote execution at target device
First Claim
Patent Images
1. A method for issuing a security command for remote execution at a target mobile device associated with a user, the method comprising:
- generating, by a computing device, an encrypted security command for the target mobile device, while the computing device stores registration data for the user and the target mobile device, wherein the registration data comprises a command encryption key for encrypting a security command for the target mobile device, and wherein the encrypted security command is generated by encrypting the security command using the command encryption key;
storing the encrypted security command in memory of the computing device, wherein the encrypted security command comprises a command to wipe or disable the target mobile device;
after the computing device no longer stores the registration data, receiving, by the computing device, an instruction to wipe or disable the target mobile device; and
in response to receiving the instruction;
retrieving, by the computing device, the stored encrypted security command from the memory of the computing device; and
transmitting, by the computing device, the retrieved encrypted security command to the target mobile device for decryption by the target mobile device using a command decryption key corresponding to the command encryption key.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method implemented at a server system, for securely wiping a remote mobile device after the device registration has been removed from the server system. Prior to removal of the device registration from the server system, a “pre-packaged” command is created and stored at the server system. In the event that it is determined, after removal of the registration, that the device should be wiped or disabled, means are provided for an administrator to issue the previously stored command to the target mobile device.
48 Citations
21 Claims
-
1. A method for issuing a security command for remote execution at a target mobile device associated with a user, the method comprising:
-
generating, by a computing device, an encrypted security command for the target mobile device, while the computing device stores registration data for the user and the target mobile device, wherein the registration data comprises a command encryption key for encrypting a security command for the target mobile device, and wherein the encrypted security command is generated by encrypting the security command using the command encryption key; storing the encrypted security command in memory of the computing device, wherein the encrypted security command comprises a command to wipe or disable the target mobile device; after the computing device no longer stores the registration data, receiving, by the computing device, an instruction to wipe or disable the target mobile device; and in response to receiving the instruction; retrieving, by the computing device, the stored encrypted security command from the memory of the computing device; and transmitting, by the computing device, the retrieved encrypted security command to the target mobile device for decryption by the target mobile device using a command decryption key corresponding to the command encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An apparatus for issuing a security command for remote execution at a target mobile device associated with a user, the apparatus comprising:
a memory and a processor, the processor configured to; store registration data for the user and the target mobile device, the registration data comprising a command encryption key for encrypting a security command for the target mobile device; while the registration data is stored, generate an encrypted security command for the target mobile device by encrypting the security command using the command encryption key, and store the encrypted security command in the memory, wherein the encrypted security command comprises a command to wipe or disable the target mobile device; after the registration data comprising the command encryption key is no longer stored, receive an instruction to wipe or disable the target mobile device; and in response to receiving the instruction, retrieve the stored encrypted security command from the memory and transmit the retrieved encrypted security command to the target mobile device for decryption by the target mobile device using a command decryption key corresponding to the command encryption key. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
21. A non-transitory computer-readable medium comprising computer-executable instructions which, when executed by a processor of a computing device, result in:
-
while the computing device stores registration data for a target mobile device associated with a user, the registration data comprising a command encryption key for encrypting a security command for the target mobile device, the computing device generating an encrypted security command for the target mobile device by encrypting the security command using the command encryption key, and storing the encrypted security command in memory of the computing device, wherein the encrypted security command comprises a command to wipe or disable the target mobile device; after the computing device no longer stores the registration data comprising the command encryption key, the computing device receiving an instruction to wipe or disable the target mobile device; and in response to receiving the instruction, the computing device retrieving the stored encrypted security command from the memory of the computing device and transmitting the retrieved encrypted security command to the target mobile device for decryption by the target mobile device using a command decryption key corresponding to the command encryption key.
-
Specification