Movatterモバイル変換


[0]ホーム

URL:


US20100317324A1 - Automatic security action invocation for mobile communications device - Google Patents

Automatic security action invocation for mobile communications device
Download PDF

Info

Publication number
US20100317324A1
US20100317324A1US12/862,228US86222810AUS2010317324A1US 20100317324 A1US20100317324 A1US 20100317324A1US 86222810 AUS86222810 AUS 86222810AUS 2010317324 A1US2010317324 A1US 2010317324A1
Authority
US
United States
Prior art keywords
mobile communications
communications device
locked state
predetermined duration
data protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/862,228
Inventor
Michael S. Brown
Neil Adams
Steven Fyke
Herbert Little
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BlackBerry Ltd
Original Assignee
Research in Motion Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Research in Motion LtdfiledCriticalResearch in Motion Ltd
Priority to US12/862,228priorityCriticalpatent/US20100317324A1/en
Assigned to RESEARCH IN MOTION LIMITEDreassignmentRESEARCH IN MOTION LIMITEDASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: ADAMS, NEIL, BROWN, MICHAEL S., FYKE, STEVEN, LITTLE, HERB
Publication of US20100317324A1publicationCriticalpatent/US20100317324A1/en
Assigned to BLACKBERRY LIMITEDreassignmentBLACKBERRY LIMITEDCHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: RESEARCH IN MOTION LIMITED
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A mobile communications device, method and computer program product for providing security are described. In one embodiment, the device comprises: a processor; a communications subsystem; a storage element having application modules and data; and a security module operable to detect a locked state of the device and initiate a lockout data protection timer for a predetermined duration upon detection of the locked state. The security module is operable to, after the lockout data protection timer has been initiated, detect if a password is entered through a user input device within the predetermined duration and to terminate the lockout data protection timer if entry of the password is detected to perform a security action comprising erasing or encrypting at least some of the data if entry of the password is not detected.

Description

Claims (18)

1. A mobile communications device, comprising: a processor; a communications subsystem connected to the processor operable to exchange signals with a wireless network and with the processor; a storage element connected to the processor and having a plurality of application modules and data stored thereon, the data comprising at least user application data associated with the application modules and service data including data for establishing communications with the wireless network; and a security module operable to detect a locked state of the mobile communications device and initiate a lockout data protection timer for a predetermined duration upon detection of the locked state; and wherein the security module is operable to, after the lockout data protection timer has been initiated, detect if a password shared by the user and the mobile communications device is entered through a user input device within the predetermined duration of the lockout data protection timer; wherein the security module is operable to terminate the lockout data protection timer if entry of the password is detected within the predetermined duration; and wherein the security module is operable to perform a security action comprising erasing or encrypting at least some of the data on the storage element if entry of the password is not detected within the predetermined duration.
12. A method for providing security on a mobile communications device, the mobile communications device being configured to communicate with a wireless communications network and including a storage element having data stored thereon, the method comprising the acts of: monitoring to detect for the locked state of the mobile communications device and initiating a lockout data protection timer for a predetermined duration upon detection of the locked state; and monitoring, after the lockout data protection timer has been initiated, to detect if a password shared by the user and the mobile communications device is entered through the user input device within the predetermined duration of the lockout data protection timer; if entry of the password is detected within the predetermined duration, terminating the lockout data protection timer; and if entry of the password is not detected within the predetermined duration, performing a security action comprising erasing or encrypting at least some of the data on the storage element.
18. A computer program product comprising a tangible machine-readable medium embodying instructions executable on a mobile communications device for providing security on the mobile communications device, the machine-readable instructions comprising: code for monitoring to detect for the locked state of the mobile communications device and initiating a lockout data protection timer for a predetermined duration upon detection of the locked state; code for monitoring, after the lockout data protection timer has been initiated, to detect if a password shared by the user and the mobile communications device is entered through the user input device within the predetermined duration of the lockout data protection timer; code for terminating the lockout data protection timer if entry of the password is detected within the predetermined duration; and code for performing a security action comprising erasing or encrypting at least some of the data on the storage element if entry of the password is not detected within the predetermined duration.
US12/862,2282006-05-182010-08-24Automatic security action invocation for mobile communications deviceAbandonedUS20100317324A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US12/862,228US20100317324A1 (en)2006-05-182010-08-24Automatic security action invocation for mobile communications device

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US74758806P2006-05-182006-05-18
US11/750,594US7809353B2 (en)2006-05-182007-05-18Automatic security action invocation for mobile communications device
US12/862,228US20100317324A1 (en)2006-05-182010-08-24Automatic security action invocation for mobile communications device

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US11/750,594ContinuationUS7809353B2 (en)2006-05-182007-05-18Automatic security action invocation for mobile communications device

Publications (1)

Publication NumberPublication Date
US20100317324A1true US20100317324A1 (en)2010-12-16

Family

ID=38722907

Family Applications (6)

Application NumberTitlePriority DateFiling Date
US11/750,594Active2029-03-10US7809353B2 (en)2006-05-182007-05-18Automatic security action invocation for mobile communications device
US11/750,789Active2030-10-24US8140863B2 (en)2006-05-182007-05-18Automatic security action invocation for mobile communications device
US11/750,568Active2031-11-10US9077485B2 (en)2006-05-182007-05-18Automatic security action invocation for mobile communications device
US12/862,228AbandonedUS20100317324A1 (en)2006-05-182010-08-24Automatic security action invocation for mobile communications device
US13/406,765ActiveUS8667306B2 (en)2006-05-182012-02-28Automatic security action invocation for mobile communications device
US14/791,901ActiveUS9603010B2 (en)2006-05-182015-07-06Automatic security action invocation for mobile communications device

Family Applications Before (3)

Application NumberTitlePriority DateFiling Date
US11/750,594Active2029-03-10US7809353B2 (en)2006-05-182007-05-18Automatic security action invocation for mobile communications device
US11/750,789Active2030-10-24US8140863B2 (en)2006-05-182007-05-18Automatic security action invocation for mobile communications device
US11/750,568Active2031-11-10US9077485B2 (en)2006-05-182007-05-18Automatic security action invocation for mobile communications device

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
US13/406,765ActiveUS8667306B2 (en)2006-05-182012-02-28Automatic security action invocation for mobile communications device
US14/791,901ActiveUS9603010B2 (en)2006-05-182015-07-06Automatic security action invocation for mobile communications device

Country Status (4)

CountryLink
US (6)US7809353B2 (en)
EP (2)EP2455881B1 (en)
CA (1)CA2652438C (en)
WO (1)WO2007134448A1 (en)

Cited By (38)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20080178300A1 (en)*2007-01-192008-07-24Research In Motion LimitedSelectively wiping a remote device
US20120269346A1 (en)*2011-04-192012-10-25Apriva, LlcDevice and system for facilitating communication and networking within a secure mobile environment
US20120306655A1 (en)*2011-06-062012-12-06Apple Inc.Adaptive low-battery warnings for battery-powered electronic devices
US20130104250A1 (en)*2011-10-192013-04-25Chih-Fu ChuangElectronic device for protecting data
WO2013040496A3 (en)*2011-09-152013-05-10Mcafee, Inc.System and method for real-time customized threat protection
WO2013130338A1 (en)*2012-03-022013-09-06Lookout, Inc.System and method for remotely-initiated audio communication
US8533844B2 (en)2008-10-212013-09-10Lookout, Inc.System and method for security data collection and analysis
US8538815B2 (en)2009-02-172013-09-17Lookout, Inc.System and method for mobile device replacement
US8561144B2 (en)2008-10-212013-10-15Lookout, Inc.Enforcing security based on a security state assessment of a mobile device
US8655307B1 (en)2012-10-262014-02-18Lookout, Inc.System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security
US8683593B2 (en)2008-10-212014-03-25Lookout, Inc.Server-assisted analysis of data for a mobile device
US8682400B2 (en)2009-02-172014-03-25Lookout, Inc.Systems and methods for device broadcast of location information when battery is low
US8745739B2 (en)2008-10-212014-06-03Lookout, Inc.System and method for server-coupled application re-analysis to obtain characterization assessment
US8826441B2 (en)2008-10-212014-09-02Lookout, Inc.Event-based security state assessment and display for mobile devices
US8855599B2 (en)2012-12-312014-10-07Lookout, Inc.Method and apparatus for auxiliary communications with mobile communications device
US8855601B2 (en)2009-02-172014-10-07Lookout, Inc.System and method for remotely-initiated audio communication
US8903362B2 (en)*2012-12-042014-12-02At&T Intellectual Property I, L.P.Rule-based device timeout and security access
US8984628B2 (en)2008-10-212015-03-17Lookout, Inc.System and method for adverse mobile application identification
US9043919B2 (en)2008-10-212015-05-26Lookout, Inc.Crawling multiple markets and correlating
US9042876B2 (en)2009-02-172015-05-26Lookout, Inc.System and method for uploading location information based on device movement
US9065846B2 (en)2008-10-212015-06-23Lookout, Inc.Analyzing data gathered through different protocols
US9208215B2 (en)2012-12-272015-12-08Lookout, Inc.User classification based on data gathered from a computing device
US20150358455A1 (en)*2014-06-042015-12-10T-Mobile Usa, Inc.Telecommunication Device Utilization Based on Heartbeat Communication
US9215074B2 (en)2012-06-052015-12-15Lookout, Inc.Expressing intent to control behavior of application components
EP2863331A4 (en)*2012-06-182015-12-23Nec CorpPortable terminal, program, and control method
US9235704B2 (en)2008-10-212016-01-12Lookout, Inc.System and method for a scanning API
US9367680B2 (en)2008-10-212016-06-14Lookout, Inc.System and method for mobile communication device application advisement
US9374369B2 (en)2012-12-282016-06-21Lookout, Inc.Multi-factor authentication and comprehensive login system for client-server networks
US9424409B2 (en)2013-01-102016-08-23Lookout, Inc.Method and system for protecting privacy and enhancing security on an electronic device
US9589129B2 (en)2012-06-052017-03-07Lookout, Inc.Determining source of side-loaded software
US9603010B2 (en)2006-05-182017-03-21Blackberry LimitedAutomatic security action invocation for mobile communications device
US9642008B2 (en)2013-10-252017-05-02Lookout, Inc.System and method for creating and assigning a policy for a mobile communications device based on personal data
US9753796B2 (en)2013-12-062017-09-05Lookout, Inc.Distributed monitoring, evaluation, and response for multiple devices
US9779253B2 (en)2008-10-212017-10-03Lookout, Inc.Methods and systems for sharing risk responses to improve the functioning of mobile communications devices
US9955352B2 (en)2009-02-172018-04-24Lookout, Inc.Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such
US10122747B2 (en)2013-12-062018-11-06Lookout, Inc.Response generation after distributed monitoring and evaluation of multiple devices
US10218697B2 (en)2017-06-092019-02-26Lookout, Inc.Use of device risk evaluation to manage access to services
US10540494B2 (en)2015-05-012020-01-21Lookout, Inc.Determining source of side-loaded software using an administrator server

Families Citing this family (148)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7720461B2 (en)*2004-02-262010-05-18Research In Motion LimitedMobile communications device with security features
US7400878B2 (en)2004-02-262008-07-15Research In Motion LimitedComputing device with environment aware features
US8321953B2 (en)*2005-07-142012-11-27Imation Corp.Secure storage device with offline code entry
US8335920B2 (en)*2005-07-142012-12-18Imation Corp.Recovery of data access for a locked secure storage device
US8015606B1 (en)2005-07-142011-09-06Ironkey, Inc.Storage device with website trust indication
US8438647B2 (en)*2005-07-142013-05-07Imation Corp.Recovery of encrypted data from a secure storage device
KR100974679B1 (en)*2005-07-252010-08-06도요 잉키 세이조 가부시끼가이샤 Active energy ray curable ink for inkjet
US20070067620A1 (en)*2005-09-062007-03-22Ironkey, Inc.Systems and methods for third-party authentication
US8539590B2 (en)*2005-12-202013-09-17Apple Inc.Protecting electronic devices from extended unauthorized use
US8639873B1 (en)2005-12-222014-01-28Imation Corp.Detachable storage device with RAM cache
US8266378B1 (en)2005-12-222012-09-11Imation Corp.Storage device with accessible partitions
US8352323B2 (en)*2007-11-302013-01-08Blaze Mobile, Inc.Conducting an online payment transaction using an NFC enabled mobile communication device
JP4127842B2 (en)*2006-06-052008-07-30株式会社東芝 Information processing device
US20070300031A1 (en)*2006-06-222007-12-27Ironkey, Inc.Memory data shredder
US8295371B2 (en)*2006-07-142012-10-23Qualcomm IncorporatedMulti-carrier receiver for wireless communication
US10547687B2 (en)*2007-01-172020-01-28Eagency, Inc.Mobile communication device monitoring systems and methods
US9191822B2 (en)*2007-03-092015-11-17Sony CorporationDevice-initiated security policy
ITMI20070997A1 (en)*2007-05-172008-11-18Incard Sa IC CARD WITH LOW PRECISION CLOCK
US8218734B2 (en)*2007-06-122012-07-10Microsoft CorporationMessaging with a locked communication device
US8977294B2 (en)2007-10-102015-03-10Apple Inc.Securely locating a device
US8214120B2 (en)*2007-11-042012-07-03GM Global Technology Operations LLCMethod to manage a high voltage system in a hybrid powertrain system
US20090150970A1 (en)*2007-12-052009-06-11Sybase, Inc.Data Fading to Secure Data on Mobile Client Devices
WO2009137371A2 (en)*2008-05-022009-11-12Ironkey, Inc.Enterprise device recovery
US8635335B2 (en)2009-01-282014-01-21Headwater Partners I LlcSystem and method for wireless network offloading
US8340634B2 (en)2009-01-282012-12-25Headwater Partners I, LlcEnhanced roaming services and converged carrier networks with device assisted services and a proxy
US8589541B2 (en)2009-01-282013-11-19Headwater Partners I LlcDevice-assisted services for protecting network capacity
US8250207B2 (en)2009-01-282012-08-21Headwater Partners I, LlcNetwork based ambient services
US8346225B2 (en)*2009-01-282013-01-01Headwater Partners I, LlcQuality of service for device assisted services
US8924469B2 (en)2008-06-052014-12-30Headwater Partners I LlcEnterprise access control and accounting allocation for access networks
US8626115B2 (en)2009-01-282014-01-07Headwater Partners I LlcWireless network service interfaces
US8725123B2 (en)2008-06-052014-05-13Headwater Partners I LlcCommunications device with secure data path processing agents
US8548428B2 (en)2009-01-282013-10-01Headwater Partners I LlcDevice group partitions and settlement platform
US8898293B2 (en)2009-01-282014-11-25Headwater Partners I LlcService offer set publishing to device agent with on-device service selection
US8402111B2 (en)2009-01-282013-03-19Headwater Partners I, LlcDevice assisted services install
US8406748B2 (en)2009-01-282013-03-26Headwater Partners I LlcAdaptive ambient services
US8275830B2 (en)2009-01-282012-09-25Headwater Partners I LlcDevice assisted CDR creation, aggregation, mediation and billing
US8391834B2 (en)*2009-01-282013-03-05Headwater Partners I LlcSecurity techniques for device assisted services
US8924543B2 (en)2009-01-282014-12-30Headwater Partners I LlcService design center for device assisted services
US8832777B2 (en)2009-03-022014-09-09Headwater Partners I LlcAdapting network policies based on device service processor configuration
US8640226B2 (en)2008-06-272014-01-28Novell, Inc.Mechanisms to secure data on hard reset of device
US8566961B2 (en)2008-08-082013-10-22Absolute Software CorporationApproaches for a location aware client
AU2009279431B2 (en)*2008-08-082014-04-10Absolute Software CorporationSecure computing environment using a client heartbeat to address theft and unauthorized access
US8556991B2 (en)*2008-08-082013-10-15Absolute Software CorporationApproaches for ensuring data security
US8789136B2 (en)2008-09-022014-07-22Avaya Inc.Securing a device based on atypical user behavior
US8099472B2 (en)2008-10-212012-01-17Lookout, Inc.System and method for a mobile cross-platform software system
US10715342B2 (en)2009-01-282020-07-14Headwater Research LlcManaging service user discovery and service launch object placement on a device
US9351193B2 (en)2009-01-282016-05-24Headwater Partners I LlcIntermediate networking devices
US9706061B2 (en)2009-01-282017-07-11Headwater Partners I LlcService design center for device assisted services
US9955332B2 (en)2009-01-282018-04-24Headwater Research LlcMethod for child wireless device activation to subscriber account of a master wireless device
US10783581B2 (en)2009-01-282020-09-22Headwater Research LlcWireless end-user device providing ambient or sponsored services
US10326800B2 (en)2009-01-282019-06-18Headwater Research LlcWireless network service interfaces
US12166596B2 (en)2009-01-282024-12-10Disney Enterprises, Inc.Device-assisted services for protecting network capacity
US10057775B2 (en)2009-01-282018-08-21Headwater Research LlcVirtualized policy and charging system
US11218854B2 (en)2009-01-282022-01-04Headwater Research LlcService plan design, user interfaces, application programming interfaces, and device management
US9253663B2 (en)2009-01-282016-02-02Headwater Partners I LlcControlling mobile device communications on a roaming network based on device state
US9578182B2 (en)2009-01-282017-02-21Headwater Partners I LlcMobile device and service management
US8793758B2 (en)2009-01-282014-07-29Headwater Partners I LlcSecurity, fraud detection, and fraud mitigation in device-assisted services systems
US10798252B2 (en)2009-01-282020-10-06Headwater Research LlcSystem and method for providing user notifications
US11973804B2 (en)2009-01-282024-04-30Headwater Research LlcNetwork service plan design
US10248996B2 (en)2009-01-282019-04-02Headwater Research LlcMethod for operating a wireless end-user device mobile payment agent
US9392462B2 (en)2009-01-282016-07-12Headwater Partners I LlcMobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy
US10492102B2 (en)2009-01-282019-11-26Headwater Research LlcIntermediate networking devices
US8606911B2 (en)2009-03-022013-12-10Headwater Partners I LlcFlow tagging for service policy implementation
US9755842B2 (en)2009-01-282017-09-05Headwater Research LlcManaging service user discovery and service launch object placement on a device
US10779177B2 (en)2009-01-282020-09-15Headwater Research LlcDevice group partitions and settlement platform
US9565707B2 (en)2009-01-282017-02-07Headwater Partners I LlcWireless end-user device with wireless data attribution to multiple personas
US8351898B2 (en)2009-01-282013-01-08Headwater Partners I LlcVerifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account
US10841839B2 (en)2009-01-282020-11-17Headwater Research LlcSecurity, fraud detection, and fraud mitigation in device-assisted services systems
US12432130B2 (en)2009-01-282025-09-30Headwater Research LlcFlow tagging for service policy implementation
US9980146B2 (en)2009-01-282018-05-22Headwater Research LlcCommunications device with secure data path processing agents
US8893009B2 (en)2009-01-282014-11-18Headwater Partners I LlcEnd user device that secures an association of application to service policy with an application certificate check
US10200541B2 (en)2009-01-282019-02-05Headwater Research LlcWireless end-user device with divided user space/kernel space traffic policy system
WO2010087501A1 (en)*2009-01-282010-08-05日本電気株式会社Thin client-server system, thin client terminal, data management method, and computer readable recording medium
US9647918B2 (en)2009-01-282017-05-09Headwater Research LlcMobile device and method attributing media services network usage to requesting application
US10264138B2 (en)2009-01-282019-04-16Headwater Research LlcMobile device and service management
US9270559B2 (en)2009-01-282016-02-23Headwater Partners I LlcService policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow
US10484858B2 (en)2009-01-282019-11-19Headwater Research LlcEnhanced roaming services and converged carrier networks with device assisted services and a proxy
US10064055B2 (en)2009-01-282018-08-28Headwater Research LlcSecurity, fraud detection, and fraud mitigation in device-assisted services systems
US9557889B2 (en)2009-01-282017-01-31Headwater Partners I LlcService plan design, user interfaces, application programming interfaces, and device management
US9954975B2 (en)2009-01-282018-04-24Headwater Research LlcEnhanced curfew and protection associated with a device group
US12389218B2 (en)2009-01-282025-08-12Headwater Research LlcService selection set publishing to device agent with on-device service selection
US9858559B2 (en)2009-01-282018-01-02Headwater Research LlcNetwork service plan design
US9572019B2 (en)2009-01-282017-02-14Headwater Partners LLCService selection set published to device agent with on-device service selection
US9609510B2 (en)2009-01-282017-03-28Headwater Research LlcAutomated credential porting for mobile devices
US11985155B2 (en)2009-01-282024-05-14Headwater Research LlcCommunications device with secure data path processing agents
US10237757B2 (en)2009-01-282019-03-19Headwater Research LlcSystem and method for wireless network offloading
US12388810B2 (en)2009-01-282025-08-12Headwater Research LlcEnd user device that secures an association of application to service policy with an application certificate check
US8745191B2 (en)2009-01-282014-06-03Headwater Partners I LlcSystem and method for providing user notifications
JP5310056B2 (en)*2009-02-122013-10-09ブラザー工業株式会社 Information management system, information processing apparatus, and information processing apparatus program
US8750863B2 (en)*2009-02-132014-06-10T-Mobile Usa, Inc.Selection of roaming gateway
US9036541B2 (en)*2009-02-172015-05-19T-Mobile Usa, Inc.Location-based IMS server selection
US20100228906A1 (en)*2009-03-062010-09-09Arunprasad Ramiya MothilalManaging Data in a Non-Volatile Memory System
US20100234005A1 (en)*2009-03-102010-09-16Scott BloomquistSystem for Selectively Limiting the Function of a Communication Device
US8788635B2 (en)*2009-03-202014-07-22Microsoft CorporationMitigations for potentially compromised electronic devices
US20100299152A1 (en)*2009-05-202010-11-25Mobile Iron, Inc.Selective Management of Mobile Devices in an Enterprise Environment
US8683088B2 (en)2009-08-062014-03-25Imation Corp.Peripheral device data integrity
US8745365B2 (en)*2009-08-062014-06-03Imation Corp.Method and system for secure booting a computer by booting a first operating system from a secure peripheral device and launching a second operating system stored a secure area in the secure peripheral device on the first operating system
US8693977B2 (en)*2009-08-132014-04-08Novell, Inc.Techniques for personal security via mobile devices
US8397301B2 (en)2009-11-182013-03-12Lookout, Inc.System and method for identifying and assessing vulnerabilities on a mobile communication device
US8359660B2 (en)*2009-11-302013-01-22Lps2Method and apparatus of securing data in a portable flash memory
US9258715B2 (en)2009-12-142016-02-09Apple Inc.Proactive security for mobile devices
US8923309B2 (en)2010-04-292014-12-30T-Mobile Usa, Inc.Managing access gateways
US8538405B2 (en)2010-04-292013-09-17T-Mobile Usa, Inc.Communication protocol preferences
US20120198046A1 (en)*2010-04-292012-08-02Mehul Jayant ShahMobile device bandwidth throttling
TWI424329B (en)*2010-05-262014-01-21Prime View Int Co LtdElectronic reading apparatus and the data protection method thereof
EP2619703B1 (en)*2010-09-242019-02-27BlackBerry LimitedMethod and apparatus for differentiated access control
US9378394B2 (en)2010-09-242016-06-28Blackberry LimitedMethod and apparatus for differentiated access control
US8869307B2 (en)*2010-11-192014-10-21Mobile Iron, Inc.Mobile posture-based policy, remediation and access control for enterprise resources
US9087213B2 (en)*2011-02-222015-07-21Fedex Corporate Services, Inc.Systems and methods for rule-driven management of sensor data across geographic areas and derived actions
US9154826B2 (en)2011-04-062015-10-06Headwater Partners Ii LlcDistributing content and service launch objects to mobile devices
US8971924B2 (en)2011-05-232015-03-03Apple Inc.Identifying and locating users on a mobile network
US10715380B2 (en)2011-05-232020-07-14Apple Inc.Setting a reminder that is triggered by a target user device
US8738765B2 (en)2011-06-142014-05-27Lookout, Inc.Mobile device DNS optimization
US9392092B2 (en)2011-07-142016-07-12Qualcomm IncorporatedMethod and apparatus for detecting and dealing with a lost electronics device
US8788881B2 (en)2011-08-172014-07-22Lookout, Inc.System and method for mobile device push communications
US9143910B2 (en)*2011-09-302015-09-22Blackberry LimitedMethod and system for remote wipe through voice mail
US20130090110A1 (en)*2011-10-112013-04-11Thomas CloonanManaging battery power usage of a lost mobile device to extend search time for the lost mobile device
US10291658B2 (en)2011-11-092019-05-14Microsoft Technology Licensing, LlcTechniques to apply and share remote policies on mobile devices
US8893261B2 (en)*2011-11-222014-11-18Vmware, Inc.Method and system for VPN isolation using network namespaces
US20130171966A1 (en)*2012-01-032013-07-04Sony Ericsson Mobile Communications AbMethod and Apparatus for Facilitating Communication Between a Finder of a Misplaced Wireless Terminal and an Authorized User
US9104896B2 (en)2012-06-042015-08-11Apple Inc.System and method for remotely initiating lost mode on a computing device
US8886166B2 (en)2012-06-042014-11-11Avago Technologies General Ip (Singapore) Pte. Ltd.System to identify whether a text message is from a trusted source
US8972762B2 (en)2012-07-112015-03-03Blackberry LimitedComputing devices and methods for resetting inactivity timers on computing devices
US9462061B2 (en)*2012-09-142016-10-04Tencent Technology (Shenzhen) Company LimitedMethod, device, server, and system for managing devices
US20140101582A1 (en)*2012-10-052014-04-10Htc CorporationMobile communications device, non-transitory computer-readable medium and method of configuring home screen of mobile communications device
US9131381B1 (en)*2012-10-262015-09-08Facebook, Inc.Mobile device auto wipe
US9112844B2 (en)*2012-12-062015-08-18Audible, Inc.Device credentialing for network access
US9351163B2 (en)*2012-12-262016-05-24Mcafee, Inc.Automatic sanitization of data on a mobile device in a network environment
WO2014142880A1 (en)*2013-03-142014-09-18Intel CorporationDynamically implementing an image protection policy
WO2014182313A1 (en)*2013-05-102014-11-13Empire Technology Development LlcEstimation of missed information
WO2015020658A1 (en)2013-08-082015-02-12Empire Technology Development LlcAutomatic log-in function control
US9730163B2 (en)*2013-08-272017-08-08Life360, Inc.Apparatus and method for conservation of battery power of mobile devices within a location-based group
US9104865B2 (en)2013-08-292015-08-11International Business Machines CorporationThreat condition management
US9497194B2 (en)*2013-09-062016-11-15Oracle International CorporationProtection of resources downloaded to portable devices from enterprise systems
US9465957B2 (en)*2013-11-072016-10-11Lenovo Enterprise Solutions (Singapore) Pte. Ltd.Preventing predetermined type of configuration changes to computing devices in a computing system servicing a critical job
JP2015141603A (en)*2014-01-292015-08-03キヤノン株式会社Image processor and control method thereof, and program
US9672368B2 (en)*2014-04-302017-06-06Visteon Global Technologies, Inc.Providing selective control of information shared from a first device to a second device
FR3028124A1 (en)*2014-11-052016-05-06Orange METHOD FOR CONTROLLING TRAFFIC POLICIES FROM A SECURITY MODULE IN A MOBILE TERMINAL
FR3028335B1 (en)*2014-11-122018-01-19Charles Shahrokh Ghavamian DATA STORAGE DEVICE WITH SECURE ACCESS MANAGEMENT AND ACCESS MANAGEMENT METHOD THEREFOR
DE102015103740A1 (en)*2015-03-132016-09-15Phoenix Contact Gmbh & Co. Kg Method and device for processing and transmitting data within a functionally safe electrical, electronic or programmable electronic system
US9762548B2 (en)*2015-03-132017-09-12Western Digital Technologies, Inc.Controlling encrypted data stored on a remote storage device
WO2017095380A1 (en)*2015-11-302017-06-08Hewlett-Packard Development Company, L.PSecurity mitigation action selection based on device usage
JP6919212B2 (en)*2017-02-082021-08-18日本電気株式会社 Controls, control methods, and systems
US10740494B2 (en)*2017-09-062020-08-11Google LlcCentral and delegate security processors for a computing device
US12052286B2 (en)*2019-02-052024-07-30Sennco Solutions, Inc.Integrated security monitoring via watchdog trigger locking
US11509642B2 (en)*2019-08-212022-11-22Truist BankLocation-based mobile device authentication
US11568095B2 (en)*2020-05-112023-01-31Micron Technology, Inc.Device deactivation based on behavior patterns
US12301630B2 (en)*2022-04-202025-05-13Bank Of America CorporationSystem for securing electronic devices and electronic data using automated dynamic control modifications

Citations (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5131040A (en)*1991-02-281992-07-14Motorola, Inc.Method for backing up and erasing encryption keys
US6370402B1 (en)*1999-02-192002-04-09Nec CorporationPortable radio terminal
US6504460B2 (en)*2001-04-172003-01-07Eaton CorporationActuator mechanism for an external circuit breaker operating device
US20040097271A1 (en)*2002-11-152004-05-20Naveen AerrabotuService lock release for a wireless communication device
US20040123153A1 (en)*2002-12-182004-06-24Michael WrightAdministration of protection of data accessible by a mobile device
US20050021468A1 (en)*2003-07-212005-01-27Stockton Marcia L.Methods, systems and computer program products for managing a computer mass storage system that hosts multiple users
US20050020315A1 (en)*2003-07-222005-01-27Robertson Ian M.Security for mobile communications device
US20050039004A1 (en)*2003-08-122005-02-17Adams Neil P.System and method of indicating the strength of encryption
US20050044404A1 (en)*2003-08-232005-02-24Bhansali Apurva MahendrakumarElectronic device security and tracking system and method
US20050044433A1 (en)*2003-08-192005-02-24Dunstan Robert A.Storing encrypted and/or compressed system context information when entering a low-power state
US20050046580A1 (en)*2003-08-282005-03-03Miranda-Knapp Carlos A.Method and apparatus for detecting loss and location of a portable communications device
US20050070339A1 (en)*2003-09-302005-03-31Samsung Electronics Co., Ltd.Apparatus and method for performing power saving control of mobile terminal
US20050097596A1 (en)*2003-10-312005-05-05Pedlow Leo M.Jr.Re-encrypted delivery of video-on-demand content
US20050114389A1 (en)*2003-11-252005-05-26Nec CorporationApplication data management method for mobile terminal and mobile terminal used therein
US20050136979A1 (en)*2003-12-182005-06-23Josef DietlStoring and synchronizing data on a removable storage medium
US20070100978A1 (en)*2005-11-032007-05-03Emblaze Ltd.Method and system for an uncompromising connection from a computing device having information storage like email server to a wireless mobile device
US20080009264A1 (en)*2006-05-182008-01-10Research In Motion LimitedAutomatic security action invocation for mobile communications device

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP3134802B2 (en)1997-03-242001-02-13日本電気株式会社 Mobile communication apparatus, power supply apparatus and power supply method for mobile communication apparatus, and data terminal connection modem card connectable to mobile communication apparatus
US6145083A (en)*1998-04-232000-11-07Siemens Information And Communication Networks, Inc.Methods and system for providing data and telephony security
US6651173B1 (en)*1999-06-302003-11-18International Business Machines CorporationCalendar-induced desktop security
US6662023B1 (en)2000-07-062003-12-09Nokia Mobile Phones Ltd.Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused
US6504480B1 (en)2001-08-092003-01-07Hewlett-Packard CompanyElectronic device security
US7159120B2 (en)*2001-11-192007-01-02Good Technology, Inc.Method and system for protecting data within portable electronic devices
EP2262292B1 (en)2004-02-262016-08-17BlackBerry LimitedMobile communications device with security features
US7720461B2 (en)*2004-02-262010-05-18Research In Motion LimitedMobile communications device with security features
US7400878B2 (en)*2004-02-262008-07-15Research In Motion LimitedComputing device with environment aware features
EP1779248A4 (en)2004-07-302008-02-27Research In Motion LtdMethod and system for coordinating client and host security modules
KR101359324B1 (en)*2006-03-272014-02-24텔레콤 이탈리아 소시에떼 퍼 아찌오니System for enforcing security policies on mobile communications devices

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5131040A (en)*1991-02-281992-07-14Motorola, Inc.Method for backing up and erasing encryption keys
US6370402B1 (en)*1999-02-192002-04-09Nec CorporationPortable radio terminal
US6504460B2 (en)*2001-04-172003-01-07Eaton CorporationActuator mechanism for an external circuit breaker operating device
US20040097271A1 (en)*2002-11-152004-05-20Naveen AerrabotuService lock release for a wireless communication device
US20040123153A1 (en)*2002-12-182004-06-24Michael WrightAdministration of protection of data accessible by a mobile device
US20050021468A1 (en)*2003-07-212005-01-27Stockton Marcia L.Methods, systems and computer program products for managing a computer mass storage system that hosts multiple users
US20050020315A1 (en)*2003-07-222005-01-27Robertson Ian M.Security for mobile communications device
US20050039004A1 (en)*2003-08-122005-02-17Adams Neil P.System and method of indicating the strength of encryption
US20050044433A1 (en)*2003-08-192005-02-24Dunstan Robert A.Storing encrypted and/or compressed system context information when entering a low-power state
US20050044404A1 (en)*2003-08-232005-02-24Bhansali Apurva MahendrakumarElectronic device security and tracking system and method
US20050046580A1 (en)*2003-08-282005-03-03Miranda-Knapp Carlos A.Method and apparatus for detecting loss and location of a portable communications device
US6940407B2 (en)*2003-08-282005-09-06Motorola, Inc.Method and apparatus for detecting loss and location of a portable communications device
US20050070339A1 (en)*2003-09-302005-03-31Samsung Electronics Co., Ltd.Apparatus and method for performing power saving control of mobile terminal
US20050097596A1 (en)*2003-10-312005-05-05Pedlow Leo M.Jr.Re-encrypted delivery of video-on-demand content
US20050114389A1 (en)*2003-11-252005-05-26Nec CorporationApplication data management method for mobile terminal and mobile terminal used therein
US20050136979A1 (en)*2003-12-182005-06-23Josef DietlStoring and synchronizing data on a removable storage medium
US20070100978A1 (en)*2005-11-032007-05-03Emblaze Ltd.Method and system for an uncompromising connection from a computing device having information storage like email server to a wireless mobile device
US20080009264A1 (en)*2006-05-182008-01-10Research In Motion LimitedAutomatic security action invocation for mobile communications device
US7809353B2 (en)*2006-05-182010-10-05Research In Motion LimitedAutomatic security action invocation for mobile communications device
US8140863B2 (en)*2006-05-182012-03-20Research In Motion LimitedAutomatic security action invocation for mobile communications device
US20120210389A1 (en)*2006-05-182012-08-16Research In Motion LimitedAutomatic security action invocation for mobile communications device

Cited By (97)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9603010B2 (en)2006-05-182017-03-21Blackberry LimitedAutomatic security action invocation for mobile communications device
US10540520B2 (en)2007-01-192020-01-21Blackberry LimitedSelectively wiping a remote device
US8056143B2 (en)*2007-01-192011-11-08Research In Motion LimitedSelectively wiping a remote device
US20120079603A1 (en)*2007-01-192012-03-29Research In Motion LimitedSelectively wiping a remote device
US9106670B2 (en)2007-01-192015-08-11Blackberry LimitedSelectively wiping a remote device
US9100413B2 (en)*2007-01-192015-08-04Blackberry LimitedSelectively wiping a remote device
US20080178300A1 (en)*2007-01-192008-07-24Research In Motion LimitedSelectively wiping a remote device
US11030338B2 (en)2007-01-192021-06-08Blackberry LimitedSelectively wiping a remote device
US9043919B2 (en)2008-10-212015-05-26Lookout, Inc.Crawling multiple markets and correlating
US9245119B2 (en)2008-10-212016-01-26Lookout, Inc.Security status assessment using mobile device security information database
US8561144B2 (en)2008-10-212013-10-15Lookout, Inc.Enforcing security based on a security state assessment of a mobile device
US9563749B2 (en)2008-10-212017-02-07Lookout, Inc.Comparing applications and assessing differences
US9740852B2 (en)2008-10-212017-08-22Lookout, Inc.System and method for assessing an application to be installed on a mobile communications device
US8683593B2 (en)2008-10-212014-03-25Lookout, Inc.Server-assisted analysis of data for a mobile device
US9779253B2 (en)2008-10-212017-10-03Lookout, Inc.Methods and systems for sharing risk responses to improve the functioning of mobile communications devices
US8745739B2 (en)2008-10-212014-06-03Lookout, Inc.System and method for server-coupled application re-analysis to obtain characterization assessment
US8752176B2 (en)2008-10-212014-06-10Lookout, Inc.System and method for server-coupled application re-analysis to obtain trust, distribution and ratings assessment
US9407640B2 (en)2008-10-212016-08-02Lookout, Inc.Assessing a security state of a mobile communications device to determine access to specific tasks
US9781148B2 (en)2008-10-212017-10-03Lookout, Inc.Methods and systems for sharing risk responses between collections of mobile communications devices
US8826441B2 (en)2008-10-212014-09-02Lookout, Inc.Event-based security state assessment and display for mobile devices
US9860263B2 (en)2008-10-212018-01-02Lookout, Inc.System and method for assessing data objects on mobile communications devices
US8533844B2 (en)2008-10-212013-09-10Lookout, Inc.System and method for security data collection and analysis
US9367680B2 (en)2008-10-212016-06-14Lookout, Inc.System and method for mobile communication device application advisement
US8881292B2 (en)2008-10-212014-11-04Lookout, Inc.Evaluating whether data is safe or malicious
US10509911B2 (en)2008-10-212019-12-17Lookout, Inc.Methods and systems for conditionally granting access to services based on the security state of the device requesting access
US9344431B2 (en)2008-10-212016-05-17Lookout, Inc.System and method for assessing an application based on data from multiple devices
US9294500B2 (en)2008-10-212016-03-22Lookout, Inc.System and method for creating and applying categorization-based policy to secure a mobile communications device from access to certain data objects
US9235704B2 (en)2008-10-212016-01-12Lookout, Inc.System and method for a scanning API
US8984628B2 (en)2008-10-212015-03-17Lookout, Inc.System and method for adverse mobile application identification
US8997181B2 (en)2008-10-212015-03-31Lookout, Inc.Assessing the security state of a mobile communications device
US11080407B2 (en)2008-10-212021-08-03Lookout, Inc.Methods and systems for analyzing data after initial analyses by known good and known bad security components
US9223973B2 (en)2008-10-212015-12-29Lookout, Inc.System and method for attack and malware prevention
US9065846B2 (en)2008-10-212015-06-23Lookout, Inc.Analyzing data gathered through different protocols
US9996697B2 (en)2008-10-212018-06-12Lookout, Inc.Methods and systems for blocking the installation of an application to improve the functioning of a mobile communications device
US9100389B2 (en)2008-10-212015-08-04Lookout, Inc.Assessing an application based on application data associated with the application
US10417432B2 (en)2008-10-212019-09-17Lookout, Inc.Methods and systems for blocking potentially harmful communications to improve the functioning of an electronic device
US10509910B2 (en)2008-10-212019-12-17Lookout, Inc.Methods and systems for granting access to services based on a security state that varies with the severity of security events
US10623960B2 (en)2009-02-172020-04-14Lookout, Inc.Methods and systems for enhancing electronic device security by causing the device to go into a mode for lost or stolen devices
US8538815B2 (en)2009-02-172013-09-17Lookout, Inc.System and method for mobile device replacement
US9569643B2 (en)2009-02-172017-02-14Lookout, Inc.Method for detecting a security event on a portable electronic device and establishing audio transmission with a client computer
US10419936B2 (en)2009-02-172019-09-17Lookout, Inc.Methods and systems for causing mobile communications devices to emit sounds with encoded information
US9100925B2 (en)2009-02-172015-08-04Lookout, Inc.Systems and methods for displaying location information of a device
US8635109B2 (en)2009-02-172014-01-21Lookout, Inc.System and method for providing offers for mobile devices
US9179434B2 (en)2009-02-172015-11-03Lookout, Inc.Systems and methods for locking and disabling a device in response to a request
US9042876B2 (en)2009-02-172015-05-26Lookout, Inc.System and method for uploading location information based on device movement
US8774788B2 (en)2009-02-172014-07-08Lookout, Inc.Systems and methods for transmitting a communication based on a device leaving or entering an area
US9232491B2 (en)2009-02-172016-01-05Lookout, Inc.Mobile device geolocation
US9167550B2 (en)2009-02-172015-10-20Lookout, Inc.Systems and methods for applying a security policy to a device based on location
US8929874B2 (en)2009-02-172015-01-06Lookout, Inc.Systems and methods for remotely controlling a lost mobile communications device
US8682400B2 (en)2009-02-172014-03-25Lookout, Inc.Systems and methods for device broadcast of location information when battery is low
US9955352B2 (en)2009-02-172018-04-24Lookout, Inc.Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such
US8855601B2 (en)2009-02-172014-10-07Lookout, Inc.System and method for remotely-initiated audio communication
US8825007B2 (en)2009-02-172014-09-02Lookout, Inc.Systems and methods for applying a security policy to a device based on a comparison of locations
US9253167B2 (en)*2011-04-192016-02-02Apriva, LlcDevice and system for facilitating communication and networking within a secure mobile environment
US20120269346A1 (en)*2011-04-192012-10-25Apriva, LlcDevice and system for facilitating communication and networking within a secure mobile environment
US8816868B2 (en)*2011-06-062014-08-26Apple Inc.Adaptive low-battery warnings for battery-powered electronic devices
US20150042480A1 (en)*2011-06-062015-02-12Apple Inc.Adaptive low-battery warnings for battery-powered electronic devices
US9709607B2 (en)*2011-06-062017-07-18Apple Inc.Adaptive low-battery warnings for battery-powered electronic devices
US20120306655A1 (en)*2011-06-062012-12-06Apple Inc.Adaptive low-battery warnings for battery-powered electronic devices
WO2013040496A3 (en)*2011-09-152013-05-10Mcafee, Inc.System and method for real-time customized threat protection
US8914907B2 (en)*2011-10-192014-12-16Hon Hai Precision Industry Co., Ltd.Electronic device for protecting data
US20130104250A1 (en)*2011-10-192013-04-25Chih-Fu ChuangElectronic device for protecting data
WO2013130338A1 (en)*2012-03-022013-09-06Lookout, Inc.System and method for remotely-initiated audio communication
US9992025B2 (en)2012-06-052018-06-05Lookout, Inc.Monitoring installed applications on user devices
US10256979B2 (en)2012-06-052019-04-09Lookout, Inc.Assessing application authenticity and performing an action in response to an evaluation result
US11336458B2 (en)2012-06-052022-05-17Lookout, Inc.Evaluating authenticity of applications based on assessing user device context for increased security
US9407443B2 (en)2012-06-052016-08-02Lookout, Inc.Component analysis of software applications on computing devices
US10419222B2 (en)2012-06-052019-09-17Lookout, Inc.Monitoring for fraudulent or harmful behavior in applications being installed on user devices
US9589129B2 (en)2012-06-052017-03-07Lookout, Inc.Determining source of side-loaded software
US9940454B2 (en)2012-06-052018-04-10Lookout, Inc.Determining source of side-loaded software using signature of authorship
US9215074B2 (en)2012-06-052015-12-15Lookout, Inc.Expressing intent to control behavior of application components
US9450965B2 (en)2012-06-182016-09-20Nec CorporationMobile device, program, and control method
EP2863331A4 (en)*2012-06-182015-12-23Nec CorpPortable terminal, program, and control method
US9769749B2 (en)2012-10-262017-09-19Lookout, Inc.Modifying mobile device settings for resource conservation
US9408143B2 (en)2012-10-262016-08-02Lookout, Inc.System and method for using context models to control operation of a mobile communications device
US8655307B1 (en)2012-10-262014-02-18Lookout, Inc.System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security
US9357491B2 (en)2012-12-042016-05-31At&T Intellectual Property I, L.P.Rule-based timeout and security access
US8903362B2 (en)*2012-12-042014-12-02At&T Intellectual Property I, L.P.Rule-based device timeout and security access
US9860846B2 (en)2012-12-042018-01-02At&T Intellectual Property I, L.P.Rule-based device timeout and security access
US9208215B2 (en)2012-12-272015-12-08Lookout, Inc.User classification based on data gathered from a computing device
US9374369B2 (en)2012-12-282016-06-21Lookout, Inc.Multi-factor authentication and comprehensive login system for client-server networks
US8855599B2 (en)2012-12-312014-10-07Lookout, Inc.Method and apparatus for auxiliary communications with mobile communications device
US9424409B2 (en)2013-01-102016-08-23Lookout, Inc.Method and system for protecting privacy and enhancing security on an electronic device
US10452862B2 (en)2013-10-252019-10-22Lookout, Inc.System and method for creating a policy for managing personal data on a mobile communications device
US10990696B2 (en)2013-10-252021-04-27Lookout, Inc.Methods and systems for detecting attempts to access personal information on mobile communications devices
US9642008B2 (en)2013-10-252017-05-02Lookout, Inc.System and method for creating and assigning a policy for a mobile communications device based on personal data
US10742676B2 (en)2013-12-062020-08-11Lookout, Inc.Distributed monitoring and evaluation of multiple devices
US10122747B2 (en)2013-12-062018-11-06Lookout, Inc.Response generation after distributed monitoring and evaluation of multiple devices
US9753796B2 (en)2013-12-062017-09-05Lookout, Inc.Distributed monitoring, evaluation, and response for multiple devices
US10601978B2 (en)*2014-06-042020-03-24T-Mobile Usa, Inc.Telecommunication device utilization based on heartbeat communication
US20150358455A1 (en)*2014-06-042015-12-10T-Mobile Usa, Inc.Telecommunication Device Utilization Based on Heartbeat Communication
US10540494B2 (en)2015-05-012020-01-21Lookout, Inc.Determining source of side-loaded software using an administrator server
US11259183B2 (en)2015-05-012022-02-22Lookout, Inc.Determining a security state designation for a computing device based on a source of software
US12120519B2 (en)2015-05-012024-10-15Lookout, Inc.Determining a security state based on communication with an authenticity server
US10218697B2 (en)2017-06-092019-02-26Lookout, Inc.Use of device risk evaluation to manage access to services
US11038876B2 (en)2017-06-092021-06-15Lookout, Inc.Managing access to services based on fingerprint matching
US12081540B2 (en)2017-06-092024-09-03Lookout, Inc.Configuring access to a network service based on a security state of a mobile device

Also Published As

Publication numberPublication date
US9603010B2 (en)2017-03-21
CA2652438C (en)2018-06-12
EP2021968B1 (en)2012-11-14
US20120210389A1 (en)2012-08-16
US20150312754A1 (en)2015-10-29
US20070298767A1 (en)2007-12-27
US8140863B2 (en)2012-03-20
EP2021968A1 (en)2009-02-11
CA2652438A1 (en)2007-11-29
WO2007134448A1 (en)2007-11-29
US20080005561A1 (en)2008-01-03
EP2455881A1 (en)2012-05-23
US7809353B2 (en)2010-10-05
US8667306B2 (en)2014-03-04
EP2455881B1 (en)2018-01-17
US9077485B2 (en)2015-07-07
EP2021968A4 (en)2009-06-24
US20080009264A1 (en)2008-01-10

Similar Documents

PublicationPublication DateTitle
US9603010B2 (en)Automatic security action invocation for mobile communications device
EP1501330B1 (en)Security for a mobile communications device
EP1933249B1 (en)System and method for wiping and disabling a removed device
US9053330B2 (en)Method and devices for providing secure data backup from a mobile communication device to an external computing device
US8494485B1 (en)Management of certificates for mobile devices
EP2448303B1 (en)Method and system for securing data of a mobile communications device
CA2634576C (en)A method and devices for providing secure data backup from a mobile communication device to an external computing device
US20080148350A1 (en)System and method for implementing security features and policies between paired computing devices
US20070277230A1 (en)System and method for providing secured access to mobile devices
US20110113242A1 (en)Protecting mobile devices using data and device control
WO2008092336A1 (en)System and method for realizing remote control to terminal data
US8931045B2 (en)Method and apparatus for management of multiple grouped resources on device
US20100023523A1 (en)Method and apparatus for managing data having access restriction information
JP5255995B2 (en) Log information management apparatus and log information management method
KR20250082999A (en)The Smart Phone Protection System And Method Using MDM when detecting Ransomware

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:RESEARCH IN MOTION LIMITED, ONTARIO

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BROWN, MICHAEL S.;ADAMS, NEIL;FYKE, STEVEN;AND OTHERS;REEL/FRAME:024878/0541

Effective date:20070709

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

ASAssignment

Owner name:BLACKBERRY LIMITED, ONTARIO

Free format text:CHANGE OF NAME;ASSIGNOR:RESEARCH IN MOTION LIMITED;REEL/FRAME:034150/0483

Effective date:20130709


[8]ページ先頭

©2009-2025 Movatter.jp