Claims
- 1. A method, comprising:
receiving an indication that a remote device is compromised; selecting at least one subset of data from the remote device; and transmitting; to the remote device, a command-to prevent access to the at least one subset of data.
- 2. The method of claim 1, wherein the command includes erasing the at least one subset of data.
- 3. The method of claim 1, wherein the command includes encrypting the at least one subset of data.
- 4. The method of claim 1, further comprising transmitting, to the remote device, a command to transmit the at least one subset of data to another location.
- 5. The method of claim 1, wherein the at least one subset of data includes non-synchronized data.
- 6. The method of claim 1 wherein the at least one subset of data includes synchronized data.
- 7. The method of claim 1, wherein the at least one subset of data includes personal data.
- 8. The method of claim 1, wherein the at least one/subset of data includes applications.
- 9. The method of claim 1, further comprising transmitting a command, to the remote device, to sever a connection between the remote device and a network.
- 10. The method of claim 1 wherein the indication is transmitted by the remote device.
- 11. The method of claim 1, wherein the at least one subset of data includes all data on the remote device.
- 12. A computer-readable medium having stored thereon instructions to cause a computer to execute a method, the method comprising:
receiving an indication that a remote device is compromised; selecting at least one subset of data from the remote device; and transmitting, to the remote device, a command to prevent access to the at least one subset of data.
- 13. A system, comprising:
a procedures file indicating techniques for preventing at least a subset of data on a remote device from being accessed; and a server, communicatively coupled to the procedure file and to the remote device, capable of receiving an indication that a remote device is compromised, selecting at least one subset of data from the remote device, and transmitting, to the remote device, a command to prevent access to the at least one subset of data according to the procedures file.
- 14. The system of claim 13, wherein the command includes erasing the at least one subset of data.
- 15. The system of claim 13, wherein the command includes encrypting the at least one subset of data.
- 16. The system of claim 13, wherein the server is further capable of transmitting, to the remote device, a command to transmit the at least one subset of data to another location.
- 17. The system of claim 13, wherein the at least one subset of data includes non-synchronized data.
- 18. The system of claim 13, wherein the at least one subset of data includes synchronized data.
- 19. The system of claim 13, wherein the at least one subset of data includes personal data.
- 20. The system of claim 13, wherein the at least one subset of data includes applications.
- 21. The system of claim 13, wherein the server is further capable of transmitting a command, to the remote device, to sever a connection between the remote device and a network.
- 22. The system of claim 13, wherein the indication is transmitted to the server by the remote device.
- 23. The system of claim 13, wherein the at least one subset of data includes all data on the remote device.
- 24. A system, comprising:
means for receiving an indication that a remote device is compromised; means for selecting at least one subset of data from the remote device; and means for transmitting, to the remote device, a command to prevent access to the at least one subset of data.
- 25. A method, comprising:
receiving a command to prevent access to at least one subset of data at a remote device when the remote device has been compromised; and executing the command to prevent access to the at least one subset of data.
- 26. The method of claim 25, wherein the command includes erasing the at least one subset of data.
- 27. The method of claim 25, wherein the command includes encrypting the at least one subset of data.
- 28. The method of claim 25, further comprising:
receiving, at the remote device, a command to transmit the at least one subset of data to another location; and transmitting the at least one subset of data to another location.
- 29. The method of claim 25, wherein the at least one subset of data includes non-synchronized data.
- 30. The method of claim 25, wherein the at least one subset of data includes synchronized data.
- 31. The method of claim 25, wherein the at least one subset of data includes personal data.
- 32. The method of claim 25, wherein the at least one subset of data includes applications.
- 33. The method of claim 25, further comprising:
receiving a command, at the remote device, to sever a connection between the remote device and a network; and severing the connection between the remote device and the network.
- 34. The method of claim 25, wherein the at least one subset of data includes all data on the remote device.
- 35. A computer-readable medium having instructions stored thereon for executing a method, the method comprising:
receiving, from a server, a command to prevent access to at least one subset of data at a remote device when the remote device has been compromised; and executing the command to prevent access to the at least one subset of data.
- 36. A system, comprising:
a data tracker capable of tracking the location and type of data in a remote device; and a client, communicatively coupled to the data tracker, capable of receiving a command to prevent access to at least one subset of data at the remote device when the remote device has been compromised and executing the command to prevent access to the at least one subset of data based on information generated by the data tracker.
- 37. The system of claim 36, wherein the command includes erasing the at least one subset of data.
- 38. The system of claim 36, wherein the command includes encrypting the at least one subset of data.
- 39. The system of claim 36, wherein the client is further capable of:
receiving, at the remote device, a command to transmit the at least one subset of data to another location; and, transmitting the at least one subset of data to another location.
- 40. The system of claim 36; wherein the at least one subset of data includes non-synchronized data.
- 41. The system of claim 36, wherein the at least one subset of data includes synchronized data.
- 42. The system of claim 36, wherein the at least one subset of data includes personal data.
- 43. The system of claim 36, wherein the at least one subset of data includes applications.
- 44. The system of claim 36, further comprising a remote device severing engine capable of:
receiving a command, at the remote device, to sever a connection between the remote device and a network; and severing the connection between the remote device and the network.
- 45. The system of claim 36, wherein the at least one subset of data includes all data on the remote device.
- 46. A system, comprising:
means for receiving, from a server, a command to prevent access to at least one subset of data at a remote device when the remote device has been compromised; and means for executing the command to prevent access to the at least one subset of data.
- 47. A method, comprising:
receiving an indication that a remote device is compromised; selecting at least one subset of data from the remote device; and transmitting, to the remote device, a command to transmit to the at least one subset of data to another location.
- 48. A method, comprising:
receiving an indication that a remote device is compromised; and transmitting, to the remote device, a command to sever access between the remote device and a network.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This application claims benefit under 35 U.S.C. §119 to U.S. provisional patent application No. 60/402,287 entitled “System, Method, and Computer Program Product for Cleaning-Up A Remote Device That Is No Longer Authorized To Access A Global Server System,” by inventors Daniel J. Mendez and Mason Ng filed on Aug. 9, 2002 and is incorporated by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60402287 |
Aug 2002 |
US |