Systems, methods, and apparatuses for erasing memory on wireless devices
원문보기
IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0936471
(2007-11-07)
|
등록번호 |
US-8112807
(2012-02-07)
|
발명자
/ 주소 |
- Taylor, Kirk S.
- Hoefel, Guilherme Luiz Karnas
- Chen, Liren
- Steenstra, Jack
- Suta, Lucian
- Zhang, Yang
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
4 인용 특허 :
4 |
초록
▼
A wireless device having a memory is provided. The memory or a protected portion of the memory is subject to a hard erasure of the memory vs. a soft erasure of the memory if a plurality of sensors indicate a threat to the device exists. The threat may be detected by a plurality of sensors, such as,
A wireless device having a memory is provided. The memory or a protected portion of the memory is subject to a hard erasure of the memory vs. a soft erasure of the memory if a plurality of sensors indicate a threat to the device exists. The threat may be detected by a plurality of sensors, such as, a timer, a connectivity sensor, a location sensor or geo-fence, a breech sensor, an authentication procedure or the like.
대표청구항
▼
1. A method performed by a wireless device for automatically hard erasing data on the wireless device based on a threat determination to inhibit unauthorized access to data, the method comprising: storing personal and/or sensitive data in a memory space of the wireless device;monitoring sensors in t
1. A method performed by a wireless device for automatically hard erasing data on the wireless device based on a threat determination to inhibit unauthorized access to data, the method comprising: storing personal and/or sensitive data in a memory space of the wireless device;monitoring sensors in the wireless device that provide information relating to a status of the wireless device, the monitoring of sensors comprising: monitoring a housing of the wireless device for a breach;monitoring a period of user input inactivity of the wireless device;monitoring a positioning sensor for determination of whether the wireless device has exited a geographical boundary; andmonitoring a connectivity sensor for determination of whether the wireless device has exited a network coverage area;automatically determining whether a threat to data contained in the wireless device exists based on the information from the sensors relating to the status of the wireless device;prompting a user for entry of a hard erase interrupt code to interrupt a hard erase of data in response to determining that a threat to data contained in the wireless device exists;determining if a hard erase interrupt code has been entered within a predetermined timeframe;terminating or postponing a hard erase of data if it is determined that the hard erase interrupt code has been correctly entered within the predetermined timeframe;hard erasing the data contained on the wireless device by replacing the personal and/or sensitive data in the memory space with new data if it is determined that the hard erase interrupt code has not been correctly entered within the predetermined timeframe; andmonitoring entry of an authentication code on the wireless device and hard erasing the data stored in the wireless device if the authentication code violates predetermined conditions, wherein the predetermined conditions include evaluating closeness of the entered authentication code and extending a threshold number of attempts upon determination of a close, but incorrectly entered, authentication code. 2. The method of claim 1, wherein the predetermined conditions include exceeding a threshold number of attempts. 3. The method of claim 1, further comprising: detecting when plug-in modules selected from the group consisting of MP3 players, audio/video equipment, and electronic medical devices are removed from a serial data port of the wireless device; andhard erasing data associated with the removed plug-in module from the memory of the wireless device. 4. The method of claim 1, further comprising: the wireless device detecting data synchronization with a main memory on another device; andthe wireless device hard erasing the synchronized data from the memory of the wireless device. 5. The method of claim 1, wherein the personal and/or sensitive data is uploaded to a main memory prior to hard erasing the personal and/or sensitive data. 6. A wireless device, comprising: a control processor for controlling functions of the wireless device;a memory to store executable code usable by the control processor to perform the functions of the wireless device and to store personal and/or sensitive data;transmit and receive circuits to provide modulation and demodulation of communication signals between an antenna and the control processor;a threat detector to monitor the wireless device to determine threats to the data stored in memory, the threat detector operatively connected to: a sensor monitoring a housing of the wireless device for a breach;a timer monitoring a period of user input inactivity of the wireless device;a positioning sensor determining whether the wireless device has exited a geographical boundary; anda connectivity sensor determining whether the wireless device has exited a network coverage area; anda hard erase module to hard erase at least a portion of the memory to remove data on a threat indication from the threat detector;wherein the threat detector is further configured to: prompt a user for entry of a hard erase interrupt code to interrupt a hard erase of data in response to determining that a threat to the data stored in memory exists;determine if a hard erase interrupt code has been entered within a predetermined timeframe;terminate or postpone a hard erase of data if it is determined that the hard erase interrupt code has been correctly entered within the predetermined timeframe;cause the hard erase module to hard erase the data contained on the wireless device by replacing the personal and/or sensitive data in the memory with new data if it is determined that the hard erase interrupt code has not been correctly entered within the predetermined timeframe; andan authentication module to authenticate a user, wherein the threat detector is coupled to the authentication module and determines a threat to the data exists based on an authentication code being incorrect and failing to meet predefined similarity thresholds, wherein the threat detector comprises an evaluation module that evaluates the authentication code and determines a threat to the data exists based on evaluating a closeness of an incorrectly entered authentication code. 7. The wireless device of claim 6, wherein the threat detector determines a threat to the data exists based on a predefined period of inactivity. 8. The wireless device of claim 6, wherein the threat detector determines a threat to the data exists based on the wireless device exiting a predefined geographical area. 9. The wireless device of claim 6, wherein the threat detector determines threat to the data exists based on the wireless device exiting a network coverage area. 10. The wireless device of claim 6, wherein the wireless device is connectable to a main memory on another device to upload the personal and/or sensitive data on the wireless device to the main memory. 11. The wireless device of claim 10, further comprising a memory management module to detect personal and/or sensitive data uploaded to the main memory and hard erase the uploaded personal and/or sensitive data from the memory of the wireless device. 12. The wireless device of claim 6, wherein the threat detector causes the hard erase module to hard erase at least a portion of the personal and/or sensitive data stored on the wireless device memory by removing a no threat signal. 13. A non-transitory computer readable storage medium having stored thereon computer-executable instructions configured to cause a processor of a wireless device to perform a method for automatically hard erasing data on the wireless device based on a threat determination to inhibit unauthorized access to data, the method comprising: monitoring sensors in the wireless device that provide information relating to a status of the wireless device, the monitoring of sensors comprising: monitoring a housing of the wireless device for a breach;monitoring a period of user input inactivity of the wireless device;monitoring a positioning sensor for determination of whether the wireless device has exited a geographical boundary; andmonitoring a connectivity sensor for determination of whether the wireless device has exited a network coverage area;automatically determining whether a threat to personal and/or sensitive data contained in a memory space the wireless device exists based on the information from the sensors relating to the status of the wireless device;prompting a user for entry of a hard erase interrupt code to interrupt a hard erase of data in response to determining that a threat to data contained in the wireless device exists;determining if a hard erase interrupt code has been entered within a predetermined timeframe;terminating or postponing a hard erase of data if it is determined that the hard erase interrupt code has been correctly entered within the predetermined timeframe;causing a hard erase of the personal and/or sensitive data contained in the memory space of the wireless device by replacing the personal and/or sensitive data in the memory space with new data if it is determined that the hard erase interrupt code has not been correctly entered within the predetermined timeframe; andmonitoring entry of an authentication code on the wireless device and hard erasing the data stored in the wireless device if the authentication code violates predetermined conditions, wherein the predetermined conditions include evaluating closeness of the entered authentication code and extending a threshold number of attempts upon determination of a close, but incorrectly entered, authentication code. 14. A wireless device, comprising: a control processor;means for storing executable code usable by the control processor to perform the functions of the wireless device and personal and/or sensitive data;means for transmitting and receiving to provide modulation and demodulation of communication signals between an antenna and the control processor; andmeans for detecting a threat to data stored in means for storing, the means for detecting a threat to data comprising: means for monitoring a housing of the wireless device for a breach;means for monitoring a period of user input inactivity of the wireless device;means for monitoring positioning for determination of whether the wireless device has exited a geographical boundary; andmeans for monitoring connectivity for determination of whether the wireless device has exited a network coverage area; andmeans for hard erasing at least a portion of the memory to remove data when the means for detecting detects a threat to the data stored in the means for storing;wherein means for detecting a threat to data comprises: means for automatically determining whether a threat to data contained in the wireless device exists based on the information from the plurality of means for monitoring;means for prompting a user for entry of a hard erase interrupt code to interrupt a hard erase in response to a determination that a threat to the data stored in memory exists;means for determining if a hard erase interrupt code has been entered within a predetermined timeframe;means for terminating or postponing the hard erase of data if it is determined that the hard erase interrupt code has been correctly entered within the predetermined timeframe;means for causing the means for hard erasing to hard erase the personal and/or sensitive data contained on the wireless device by replacing the personal and/or sensitive data in the memory with new data if it is determined that the hard erase interrupt code has not been correctly entered within the predetermined timeframe; andmeans for authenticating a user, wherein the means for detecting a threat is coupled to the means for authenticating a user and determines a threat to the data exists based on an authentication code being incorrect and failing to meet predefined similarity thresholds, wherein the means for detecting a threat comprises evaluation means that evaluates the authentication code and determines a threat to the data exists based on evaluating a closeness of an incorrectly entered authentication code.
이 특허에 인용된 특허 (4)
-
Kaplan Dmitry ; Stanhope David M. ; McKernan Randolph W. ; Wilburn Howard L. ; Green Evan R., Apparatus and method for preventing fraudulent calls in a wireless telephone system using destination and fingerprint a.
-
Cox, Brian R.; Kim, Do; Haagensen, Brandt, Method and system for detecting viruses on handheld computers.
-
Kleijne Theodoor A. (ZA Dreumel NLX), Security device for the secure storage of sensitive data.
-
Ashok,Guru S.; Dunki Jacobs,Raymond P.; Milne,Robert J.; Nahar,Rahul; Shah,Ashit M.; Tandel,Shreesh S.; Venkatachalam,Muthuswamy, Systems and methods of securing resources through passwords.
이 특허를 인용한 특허 (4)
-
Dellaripa, David F.; Heilman, Aubrey T; Robbins, Gary, Medical risk underwriting system.
-
Row, II, James Thomas; Uelk, Joseph Lawrence; Jafferi, Faraz H; Hill, Christopher Allen; Graffagnino, Vincent Charles; Devino, Stacy Louise; Tseng, Danny; Luong, Eric; Sin, David Harlow, Methods of operating wireless parameter-sensing nodes and remote host.
-
Row, II, James Thomas; Uelk, Joseph Lawrence; Jafferi, Faraz H; Hill, Christopher Allen; Graffagnino, Vincent Charles; Devino, Stacy Louise; Tseng, Danny; Luong, Eric; Sin, David Harlow, Methods of operating wireless parameter-sensing nodes and remote host.
-
Row, II, James Thomas; Uelk, Joseph Lawrence; Jafferi, Faraz H; Hill, Christopher Allen; Graffagnino, Vincent Charles; Devino, Stacy Louise; Tseng, Danny; Luong, Eric; Sin, David Harlow, Wireless parameter-sensing node and network thereof.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.