作者: Hooman Borghei
DOI:
关键词:
摘要: Methods, program products, and systems for proactively securing mobile devices are described. A device can determine whether the is associated with a security risk level of risk. Upon determining risk, transmit coordinates its current geographic location to server. To protect privacy authorized users, transmission be disabled by entering password. If multiple failed password attempts detected, increase device, selectively files or other content stored on device. In some implementations, transitioned into surveillance mode where records captures information one more user actions, ambient sound, images, trajectory transmits recorded captured network resource.