摘要:
A method of managing access to protected file content is disclosed. The method includes: receiving a request to open a first file stored on the computing device; determining that the first file is a protected file; in response to determining that the first file is a protected file: identifying a first application that is suitable for opening the first file; determining that the first application is an unsecured application; and in response to determining that the first application is an unsecured application, locking the first application to prevent unauthorized access of application data of the first application in a locked state.
摘要:
A mobile communications device includes a plurality of first input devices capable of passively collecting input data, a second input device(s) capable of collecting response data based upon a challenge, and a processor capable of determining a level of assurance (LOA) that possession of the mobile communications device has not changed based upon a statistical behavioral model and the passively received input data, and comparing the LOA with a security threshold. When the LOA is above the security threshold, the processor may be capable of performing a given mobile device operation without requiring response data from the second input device(s). When the LOA falls below the security threshold, the processor may be capable of generating the challenge, performing the given mobile device operation responsive to valid response data, and adding recent input data to the statistical behavioral model responsive to receipt of the valid response data.
摘要:
A mobile communications device includes a plurality of first input devices capable of passively collecting input data, a second input device(s) capable of collecting response data based upon a challenge, and a processor capable of determining a level of assurance (LOA) that possession of the mobile communications device has not changed based upon a statistical behavioral model and the passively received input data, and comparing the LOA with a security threshold. When the LOA is above the security threshold, the processor may be capable of performing a given mobile device operation without requiring response data from the second input device(s). When the LOA falls below the security threshold, the processor may be capable of generating the challenge, performing the given mobile device operation responsive to valid response data, and adding recent input data to the statistical behavioral model responsive to receipt of the valid response data.
摘要:
A mobile transceiver for asset tracking having a power saving scheme for network access and related method are provided. In one aspect, the method comprises determining a location of the mobile transceiver, determining whether cellular service is likely to be available at the determined location based on a stored signal strength database, and activating the cellular transceiver from a low power mode in response to a determination that cellular service is likely to be available at the determined location.
摘要:
A mobile transceiver for asset tracking having route monitoring and method of operation are provided. In one aspect, the method comprises: determining a location of the mobile transceiver using the satellite receiver; determining whether the determined location deviates from a planned route; and sending an alert to an asset tracking service when the determined location deviates from the planned route.
摘要:
A method and system for tracking an asset in an indoor facility. The method includes receiving, from a first mobile device, an asset tracking tag collision report, the asset tracking tag collision report including a tag identifier of an asset tracking tag associated with an asset; determining a new location of the asset based on the received asset tracking tag collision report; updating an asset location database to indicate the new location of the asset; and, in response to determining the new location of the asset, transmitting an instruction message to a mobile device to cause the mobile device to direct the asset tracking tag to cease broadcasting the wireless signal. The method and system use crowd-sourcing to determine a new location of an asset that has moved in an indoor facility.
摘要:
A mobile communications device includes a plurality of first input devices capable of passively collecting input data, a second input device(s) capable of collecting response data based upon a challenge, and a processor capable of determining a level of assurance (LOA) that possession of the mobile communications device has not changed based upon a statistical behavioral model and the passively received input data, and comparing the LOA with a security threshold. When the LOA is above the security threshold, the processor may be capable of performing a given mobile device operation without requiring response data from the second input device(s). When the LOA falls below the security threshold, the processor may be capable of generating the challenge, performing the given mobile device operation responsive to valid response data, and adding recent input data to the statistical behavioral model responsive to receipt of the valid response data.
摘要:
In some examples, a system detects an accident involving a first vehicle, and responsive to the detecting of the accident, collects event data relating to the accident from a second vehicle that is different from the first vehicle.
摘要:
A mobile transceiver for asset tracking having route monitoring and method of operation are provided. In one aspect, the method comprises: determining a location of the mobile transceiver using the satellite receiver; determining whether the determined location deviates from a planned route; and sending an alert to an asset tracking service when the determined location deviates from the planned route.
摘要:
A method of operation and non-transitory computer readable medium are provided for a mobile communications device which includes memory storing program instructions and a processor coupled to a first input that passively collects input data and a second input that collects response data based on a challenge. A statistical behavioral model is generated based upon passively collected input data for the user. A level of assurance (LOA) is determined based upon the statistical behavioral model and the passively collected input data from the first input. The LOA is compared with a threshold and based on the comparison: the mobile device operation is enabled as a result of determining that the LOA meets or exceeds the threshold without requiring response data from the at least one second input, otherwise, the challenge is generated and the mobile device operation is enabled responsive to valid response data from the second input.