Proactive security for mobile devices

作者: Hooman Borghei

DOI:

关键词:

摘要: Methods, program products, and systems for proactively securing mobile devices are described. A device can determine whether the is associated with a security risk level of risk. Upon determining risk, transmit coordinates its current geographic location to server. To protect privacy authorized users, transmission be disabled by entering password. If multiple failed password attempts detected, increase device, selectively files or other content stored on device. In some implementations, transitioned into surveillance mode where records captures information one more user actions, ambient sound, images, trajectory transmits recorded captured network resource.

参考文章(21)
John G. Hering, James Bergess, Kevin Mahaffey, System and method for remotely securing or recovering a mobile device ,(2009)
Jeffrey Huckins, Riley Jackson, Muthu Kumar, Method for remote lockdown of a mobile computer ,(2004)
Zeev Pritzker, Shimon Gruper, Shlomi Amor, Gil Blumenfeld, Network security server suitable for unified communications network ,(2009)
Neil Adams, Steven Fyke, Michael S. Brown, Herbert Little, Automatic security action invocation for mobile communications device ,(2007)
Sompong Olarig, Manuel Novoa, Michael Angelo, After the fact protection of data in remote personal and wireless devices ,(2001)
Frank Hannigan, William Fitzgerald, Paul Prendergast, Peter Bermingham, System for mitigating the unauthorized use of a device ,(2009)