System and method for preventing access to data on a compromised remote device
DCFirst Claim
1. A method of controlling access to data including a plurality of sets of data, the plurality of sets of data comprising a first set of data items to be synchronized between a server system and a remote device, the remote device being remote from the server system, and a second, different, set of data items held on the remote device, the first set of data items including data items whose values are updated at the server system in response to changes thereto on the remote device, the second set of data items including data items whose values are not updated at the server system in response to changes thereto on the remote device, the remote device providing access to at least some of the data held thereon, the method comprising:
- maintaining, on the remote device, a list identifying each data item as belonging to one of the first set and the second set;
receiving, at the server system, an indication that the remote device is compromised, the indication originating from a source other than the remote device;
selecting, at the server system, a subset of data stored on the remote device, the selected subset of data being specified as having data items either from the first set or data items from the second set;
transmitting, to the remote device in response to the indication, a command to prevent access to the selected subset of data;
using, at the remote device, the list and specification of data items from the first or second set to identify the selected subset of data on the remote device;
preventing access to the identified subset of data based on the transmitted command; and
maintaining access to a further subset of data on the remote device, the further subset of data having data items from the first set or data items from the second set, the set of data of the plurality of sets to which the data items of the further subset of data belong being different to the set of data of the plurality of sets to which the data items of the selected subset of data belong.
4 Assignments
Litigations
1 Petition
Accused Products
Abstract
This invention discloses a system and method for selective erasure, encryption and or copying of data on a remote device if the remote device has been compromised or the level of authorization of a roaming user in charge of the remote device has been modified.
364 Citations
31 Claims
-
1. A method of controlling access to data including a plurality of sets of data, the plurality of sets of data comprising a first set of data items to be synchronized between a server system and a remote device, the remote device being remote from the server system, and a second, different, set of data items held on the remote device, the first set of data items including data items whose values are updated at the server system in response to changes thereto on the remote device, the second set of data items including data items whose values are not updated at the server system in response to changes thereto on the remote device, the remote device providing access to at least some of the data held thereon, the method comprising:
-
maintaining, on the remote device, a list identifying each data item as belonging to one of the first set and the second set; receiving, at the server system, an indication that the remote device is compromised, the indication originating from a source other than the remote device; selecting, at the server system, a subset of data stored on the remote device, the selected subset of data being specified as having data items either from the first set or data items from the second set; transmitting, to the remote device in response to the indication, a command to prevent access to the selected subset of data; using, at the remote device, the list and specification of data items from the first or second set to identify the selected subset of data on the remote device; preventing access to the identified subset of data based on the transmitted command; and
maintaining access to a further subset of data on the remote device, the further subset of data having data items from the first set or data items from the second set, the set of data of the plurality of sets to which the data items of the further subset of data belong being different to the set of data of the plurality of sets to which the data items of the selected subset of data belong. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 25, 26, 30)
-
-
9. A non-transitory computer-readable storage medium having computer-readable instructions stored thereon, the computer-readable instructions when executed by a computing device cause the computing device to perform a method of controlling access to data including a plurality of sets of data, the plurality of sets of data including a first set of data to be synchronized between a server system and a device remote therefrom and a second, different, set of data held on the remote device, the first set of data items including data items whose values are updated at the server system in response to changes thereto on the remote device, the second set of data items including data items whose values are not updated at the server system in response to changes thereto on the remote device, the remote device providing access to at least some of the data held thereon, the method comprising:
-
maintaining, at the remote device, a list of data items identifying each data item as belonging to the first set or the second set;
receiving, at the remote device, a command specifying at least one technique employed by the remote device to prevent access to a first subset of data stored thereon, the first subset of data being specified as belonging to the first set or the second set; using, at the remote device, the list and specification of data items from the first or second sets to identify the first subset of data on the remote device; preventing access to the identified first subset of data based on the transmitted command; and maintaining access to a second subset of data on the remove device, the second subset of data having data items from the first set or data items from the second set, the set of data of the plurality of sets of data to which the data items of the second subset of data belong being different to the set of data of the plurality of sets to which the data items of the first subset of data belong, wherein the command is received in response to an indication that the remote device is compromised originating from a source other than the remote device.
-
-
10. A server system for use in controlling access to data held on a remote device, the remote device being remote from the server system and holding a plurality of sets of data, the plurality of sets of data including a first set of data to be synchronized between the remote device and the server system and a second, different, set of data, the first set of data items including data items whose values are updated at the server system in response to changes thereto on the remote device, and the second set of data items includes data items whose values are not updated at the server system in response to changes thereto, the remote device providing access to at least some of the data held thereon, the remote device including a list identifying each data item as belonging to the first set or the second set, and the server system comprising:
-
a procedures file to indicate techniques to prevent data from the first set and data from the second set held on the remote device from being accessed; and
a server configured to receive an indication that the remote device is compromised, the indication originating from a source other than the remote device, select a subset of data stored on the remote device in response to the indication, the selected subset being specified as having data items from the first set or data items from the second set, and transmit, to the remote device, a command specifying at least one technique included in the procedures file to prevent access to the selected subset of data stored thereon, wherein the transmitted command results in the remote device preventing access to the selected subset of data, the selected subset of data being identified using the list and the specification of data items from the first set or second set, the remote device maintaining access to a further subset of data held thereon, the further subset of data having data items from the first set or data items from the second set, the set of data of the plurality of sets to which the data items of the further subset of data belong being different to the set of data of the plurality of sets to which the data item of the selected subset of data belong. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 27, 31)
-
-
18. A client device for use in controlling data held thereon, the client device holding a plurality of sets of data, the plurality of sets of data including a first set of data items to be synchronized between the client device and a server system and a second, different set of data items held on the client device, the first set of data items including data items whose values are updated at the server system in response to changes thereto on the remote device, the second set of data items including data items whose values are not updated at the server system in response to changes thereto at the client device, the client device comprising:
-
a data tracker configured to track a location of data items held in the client device, the data tracker tracking a correspondence of the data items to the first set or the second set device, wherein the client device is configured to receive a command from the server system to prevent access to a first subset of data identified as belonging to the first set or the second set, and is configured to execute, in accordance with information generated by the data tracker and the set to which the first subset of data belongs, at least one technique to prevent access to the first subset of data stored on the client device in response to receipt of the command, the command being received in response to an indication that the client device is compromised, the indication originating from a source other than the client device, the client device being configured to maintain access to a second subset of data, the second subset of data having data items from the first set or data items from the second set, the set of data of the plurality of sets to which the data items of the second subset of data belong being different to the set of data of the plurality of sets to which the data items of the first subset of data belong. - View Dependent Claims (19, 20, 21, 22, 23, 24, 28, 29)
-
Specification