1. Field of the Invention
This invention relates to systems and methods for maintaining the security of data maintained on mobile telecommunications and portable information devices.
2. Description of the Related Art
Mobile telecommunications and portable information devices continue to develop, with service providers offering more features, services, and storage capacity. Users are increasing the amount of information stored on these devices, some of it quite sensitive. While the replacement costs of mobile telephones, personal digital assistants (PDAs), and multi-purpose devices decline, the value of the devices may be defined by the information contained in them. Data may be lost due to prolonged periods of power deprivation, exposure to inappropriate environments, and user error. In addition, the mobility of these devices, their very reason for being, makes them particularly vulnerable to loss and theft. Protecting data stored on such devices from loss and misappropriation is increasingly important.
Several methods are available to protect data stored on portable information devices from permanent loss. Many palmtop and handheld computers are designed to synchronize with a personal computer (PC), or with an online calendar, for example. Some mobile telephone service providers offer online address and phone books that can be synchronized with a handheld unit. While making such backup copies of data stored on mobile devices is rarely difficult, it requires the user to remember to do so. Furthermore, while much information can be synchronized, not all service providers offer online versions of each application found on the handheld unit, such as datebooks.
Data stored on subscriber information module (SIM) cards and other removable storage media can be copied to external storage devices to provide backup copies. However, this does not back up data stored in internal memory and, again, the user must make the effort to back up the data regularly.
Theft of mobile devices, particularly cell phones, is rampant. Wireless telecommunications service providers generally verify that the combination of the electronic serial number (ESN) and mobile identification number (MIN) of a mobile phone is valid each time a request is made to connect to their networks. Unauthorized users and mobile devices that have been reported stolen are typically denied access to the network. However, data stored locally on the device may still be at risk of unauthorized access.
Several approaches have been taken to data security. Passwords provide some protection, but are inconvenient and not impossible to break. Data stored on SIM cards can be separated from the mobile device by storing or transporting the SIM card separately, but this solution is even more inconvenient than a password. Nor does removing the SIM card protect data stored in the device's internal memory. Secure digital (SD) cards do not address security of data already on the card; the protocol merely prevents copying of copyrighted material.
Techniques have been developed to address the issue of securing information stored locally on mobile telecommunications devices, including portable information devices with telecommunications capabilities. Although some mobile telecommunications devices or networks offer facilities for a user to erase data stored on them, typically possession of the mobile telecommunications device is required. Even if it were possible to erase the data without having the portable unit in hand, the specter of permanent loss often makes this an unattractive response to the loss or theft of a mobile device, particularly if the user maintains some hope that the mobile telecommunications device may be recovered. Recognizing this dilemma, our techniques provide systems and methods for automatically implementing actions to ensure a current backup exists and, if appropriate, to then render information on the portable device inaccessible to unauthorized users.
In some realizations, these techniques provide a method for protecting information stored locally on a mobile telecommunications device or portable information device from loss due to misplacement, theft, exposure to inhospitable environments, trauma to the handheld unit, etc. In some cases a mobile telecommunications device automatically ensures that a current backup of the information stored locally exists in storage external to the mobile telecommunications device. In some cases, the automatic backup procedure occurs according to a predetermined schedule. In some realizations the schedule may be periodic. In some cases the schedule may be determined by the user. In some cases the schedule may be determined by the telecommunications service provider. In some cases, the automatic backup procedure occurs in response to a trigger signal. In some realizations, the techniques further provide a method for restoring information to local storage on the mobile telecommunications device unit after its recovery or to a substitute device designated by the user.
In some realizations, these techniques provide a method for protecting information stored locally on a mobile telecommunications device or portable information device from loss and unauthorized access. In some cases a mobile telecommunications device receives a protective action directive via a wireless communication network, ensures that a current backup of the information stored locally exists in storage external to the mobile telecommunications device, and in response to the protective action directive executes a protective action on the mobile telecommunications device that renders locally stored information inaccessible. In some cases, the locally stored information is rendered inaccessible by deleting it from local storage. In some cases, the locally stored information is rendered inaccessible by encrypting it in the local storage. In some cases, the locally stored information is rendered inaccessible by overwriting it in local storage.
In some implementations, the locally stored information is transferred to external storage, at least in part, via the wireless communication network. In some cases, the external storage containing the backup of locally stored information is maintained, at least partially, by a telecommunications service provider. In some cases, the external storage containing the backup of locally stored information is maintained, at least partially, by a telecommunications service subscriber.
In some implementations, a copy of at least some of the information stored locally on a mobile telecommunications device or portable information device is received via a wireless communication network and the mobile telecommunications device is supplied, also via the wireless communication network, with a protective action directive with instructions to the mobile telecommunications device to execute a protective action to render the locally stored information inaccessible.
In some implementations the invention provides a mobile telecommunications device having local storage for encoding a subscriber's information, a communications interface for receiving a protective action directive via a wireless communication network, and a functional sequence that can be executed on the mobile telecommunications device in response to a protective action directive to ensure that a current backup of locally stored information has been transferred to storage external to the mobile telecommunications device and then to render locally encoded information inaccessible.
In some implementations the invention provides a system for protecting information from loss and unauthorized access. In some configurations the system includes storage external to a mobile telecommunications device that encodes a backup of information stored locally on the mobile telecommunications device and a communications interface that can supply the mobile telecommunications device with a protective action directive via a wireless communication network. In some cases, such a protective action directive triggers a functional sequence executable on the mobile telecommunications device to ensure that a current backup of the locally stored information has been transferred to the external storage and then to render the locally stored information inaccessible. In some cases the system also includes the mobile telecommunications device and a computer-readable encoding of the functional sequence that can be executed on the mobile telecommunications device.
In some embodiments, the protective action directive is established using a networked computational service remote from the portable device. In some variations, the protective action directive is established without use of the portable device, while in others it is established via the portable device. In various realizations, the telecommunications network transmission and routing facilities may include a wireless voice network, a wireless data network, a packet-switched data network, an internet or intranet, a local- or wide-area network, a public switched telecommunications network (PSTN), or any combination thereof.
In some realizations, the techniques further provide a method for restoring access to information stored locally on the mobile telecommunications device unit after its recovery or return to function. In some cases, a copy of the backed-up information is transferred to the mobile telecommunications device or to a substitute device designated by the user. In some cases, the information stored locally is decrypted. In some cases, a password is provided to allow access to locally stored information.
The foregoing is a summary and thus contains, by necessity, simplifications, generalizations and omissions of detail. Consequently, those skilled in the art will appreciate that the foregoing summary is illustrative only and that it is not intended to be in any way limiting of the invention. The inventive concepts described herein are contemplated to be used alone or in various combinations. Other aspects, inventive features, and advantages of the present invention, as defined solely by the claims, may be apparent from the detailed description set forth below.
The present invention may be better understood, and its numerous objects, features, and advantages made apparent to those skilled in the art by referencing the accompanying drawings.
The use of the same reference symbols in different drawings indicates similar or identical items.
For clarity, the following descriptions may refer to particular mobile telecommunications devices, such as a mobile telephone or a multifunction device such as a smartphone or a handheld computer with wireless capability, but persons of ordinary skill in the art to which the invention pertains will no doubt understand that the general concepts described herein may find application to a multitude of mobile telecommunications devices. Mobile telecommunications devices currently in use include, among others, mobile telephones, personal digital assistants, pagers, palm-held computers, handheld computers, digital media players, communications-enabled portable devices, WAP-enabled portable devices, and iMode-enabled portable devices.
Internal storage 112 may contain multiple individual data entries 113, 114 of various types, such as system information, user-generated contact information, datebook information, text and spreadsheet files, electronic mail messages, and so on. Not all mobile telecommunications devices are capable of using external memory, but when present removable storage 115 may also contain multiple individual data entries 116, 117 of various types. Other information stored locally on the mobile telecommunications device may include data and programs either provided with the device or installed later to increase its functionality. Often date can be moved or copied from internal memory 112 to external memory 115, and vice versa. Information may be loaded into internal storage 112 and removable storage 115 by a number of methods, including direct entry from the mobile telecommunications device 111, entry into a personal computer (PC) followed by synchronization with the mobile telecommunications device 111, and entry into a web application followed by downlinking to the mobile telecommunications device 111. To facilitate entry of information directly into the handheld unit itself, the unit may be connected to a keyboard, keypad, or other data entry device by means of a wired or wireless, e.g., infrared or radio frequency, connection. Typically information stored locally may also be edited, encrypted, erased, and otherwise manipulated, depending on the capabilities of the handheld unit.
Individual data entries 113, 114, 116, and 117 may have value to the user of the mobile telecommunications device 111 in multiple dimensions. Depending on the type of information, a user might want to protect it from loss, misappropriation, or both.
As depicted in
In some realizations, the automatic backup process is implemented on a schedule predetermined by the user or by the service provider. In some realizations, the automatic backup process is implemented on a periodic schedule. In some realizations, the automatic backup process is implemented in response to a trigger signal sent by the mobile telecommunications device, for example on power up of the mobile telecommunications device, during the power-down procedure when the mobile telecommunications device is turned off, when the mobile telecommunications device generates a low-battery alarm, or when the user makes a change to the locally stored information. In some realizations, the system may check for the presence of backup instructions on a schedule predetermined by the user or by the service provider, in response to a trigger signal as described with respect to the automatic backup process, during each routine verification process (as when moving from one cell to another of the wireless telecommunications network), or when someone attempts to access the locally stored information. Automatic backups may have multiple triggers and may be both scheduled and triggered. Of course, persons of ordinary skill in the art will no doubt be able to define, based on the teaching herein, other useful timings for automatic backup operations.
In some realizations, the automatic backup operation may make a complete copy of all data stored locally on the mobile telecommunications device 111 for storage on the network 101, or a storage device (such as 104 or 105 of
When a mobile telecommunications device is misplaced, lost, stolen, exposed to an inhospitable environment, or ceases to function, the backed-up information may be recovered by the user. The user may, for example, obtain a substitute mobile telecommunications device, which can then be designated to receive a copy of the backed-up information. The mobile telecommunications device supplier or the telecommunications service provider may provide the user with a substitute mobile telecommunications device, which may contain a copy of the backed-up information or which may be designated to receive a copy of the backed-up information. The substitute mobile telecommunications device may be the same model as the original device, although it need not be. On the felicitous occasion when the original mobile telecommunications device is located, returned, repaired, or resumes functioning it may be designated to receive a copy of the backed-up information.
In some realizations, the system may check for the presence of a protective action directive on a schedule predetermined by the user or by the service provider, in response to a trigger signal as described with respect to the automatic backup process, during each routine verification process (as when moving from one cell to another of the wireless telecommunications network), or when someone attempts to access the locally stored information. Checking for the presence of a protective action directive may have multiple triggers and may be both scheduled and triggered. Of course, persons of ordinary skill in the art will no doubt be able to define, based on the teaching herein, other useful timings for checking for the presence of protective action directives.
Access to locally stored information may be denied in a number of ways. In some cases, the data may be erased from local storage, for example by a “Master Clear” or “Master Reset” command or by an erasure procedure. In some cases the data may overwritten. In some cases the information may be encrypted in place. In some cases, the updated protective action directive may reset or require a password to access locally stored information. In some cases the handheld unit may be equipped with means of generating, in response to a local command or one received from the telecommunications service provider, large electrical current or magnetic pulses that render the storage area(s) physically incapable of output operations. In some cases, emergency telephonic capabilities may be maintained while information stored on the mobile telecommunications device is rendered inaccessible. In some cases, a locational signal may be sent from the handheld unit as part of the updated protective action, instead of or in addition to information access denial.
As was described for the automatic backup procedure, it may not be necessary or desirable to deny access to all the locally stored information, particularly when time to complete the denial action is limited. In some cases the user may designate which information is to be rendered inaccessible by means of a flag or category or sensitivity level designation, or by choosing a particular storage location for the information. In some cases the user may designate that only information stored in internal memory 112 is to be rendered inaccessible. In some cases the user may designate that information stored on removable storage 115 is to be rendered inaccessible. Some users may choose to mark only certain entries 113, e.g. those containing sensitive personal data such as social security numbers or bank account information, for access denial. When local storage contains both data stored by the user and data stored by the service provider or device manufacturer, it may be preferable to deny access to only the data stored by the user.
As was described with reference to the automatic backup procedure, when a mobile telecommunications device is misplaced, lost, or stolen, the backed-up information may be recovered by the user although access to it from the handheld unit be denied. The user may, for example, obtain a substitute mobile telecommunications device, which can then be designated to receive a copy of the backed-up information now accessible from the substitute unit. The mobile telecommunications device supplier or the telecommunications service provider may provide the user with a substitute mobile telecommunications device, which may contain an accessible copy of the backed-up information or which may be designated to receive a copy of the backed-up information to be accessible from the substitute unit. The substitute mobile telecommunications device may be the same model as the original device, although it need not be. In the event that the original mobile telecommunications device is located or returned previously denied access to locally stored information may be restored. In some cases, to restore access to the locally stored information a copy of the backed-up information may be transferred to the mobile telecommunications device, to be stored locally. In some cases, access to the locally stored information is restored by a decryption procedure. In some cases, access to the locally stored information is restored by providing a password.
While the invention has been described with reference to various embodiments, it will be understood that these embodiments are illustrative and that the scope of the invention is not limited to them. Many variations, modifications, additions, and improvements are possible. Plural instances may be provided for components or operations described herein as a single instance. Boundaries between various components, operations and data stores are somewhat arbitrary, and particular operations are described in the context of specific illustrative configurations. Other allocations of functionality are envisioned and may fall within the scope of claims that follow. Structures and functionality presented as discrete components in the exemplary configurations may be implemented as a combined structure or component. These and other variations, modifications, additions, and improvements may fall within the scope of the invention as defined in the claims that follow.