摘要:
Methods and devices for determining whether a mobile device has been compromised. The mobile device has a managed portion of memory and an unmanaged portion of memory, a managed profile and an unmanaged profile, and the managed profile includes files stored in the managed portion of memory and the unmanaged profile includes files stored in the unmanaged portion of memory. The managed profile is governed by a device policy set by a remote administrator. File tree structure information for the unmanaged profile of the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in the unmanaged portion of memory. It is determined from the file tree structure information that the mobile device has been compromised and, based on that determination, an action is taken.
摘要:
A method of managing access to protected file content is disclosed. The method includes: receiving a request to open a first file stored on the computing device; determining that the first file is a protected file; in response to determining that the first file is a protected file: identifying a first application that is suitable for opening the first file; determining that the first application is an unsecured application; and in response to determining that the first application is an unsecured application, locking the first application to prevent unauthorized access of application data of the first application in a locked state.
摘要:
A mobile communications device includes a plurality of first input devices capable of passively collecting input data, a second input device(s) capable of collecting response data based upon a challenge, and a processor capable of determining a level of assurance (LOA) that possession of the mobile communications device has not changed based upon a statistical behavioral model and the passively received input data, and comparing the LOA with a security threshold. When the LOA is above the security threshold, the processor may be capable of performing a given mobile device operation without requiring response data from the second input device(s). When the LOA falls below the security threshold, the processor may be capable of generating the challenge, performing the given mobile device operation responsive to valid response data, and adding recent input data to the statistical behavioral model responsive to receipt of the valid response data.
摘要:
A mobile communications device includes a plurality of first input devices capable of passively collecting input data, a second input device(s) capable of collecting response data based upon a challenge, and a processor capable of determining a level of assurance (LOA) that possession of the mobile communications device has not changed based upon a statistical behavioral model and the passively received input data, and comparing the LOA with a security threshold. When the LOA is above the security threshold, the processor may be capable of performing a given mobile device operation without requiring response data from the second input device(s). When the LOA falls below the security threshold, the processor may be capable of generating the challenge, performing the given mobile device operation responsive to valid response data, and adding recent input data to the statistical behavioral model responsive to receipt of the valid response data.
摘要:
A mobile transceiver for asset tracking having a power saving scheme for network access and related method are provided. In one aspect, the method comprises determining a location of the mobile transceiver, determining whether cellular service is likely to be available at the determined location based on a stored signal strength database, and activating the cellular transceiver from a low power mode in response to a determination that cellular service is likely to be available at the determined location.
摘要:
A mobile transceiver for asset tracking having route monitoring and method of operation are provided. In one aspect, the method comprises: determining a location of the mobile transceiver using the satellite receiver; determining whether the determined location deviates from a planned route; and sending an alert to an asset tracking service when the determined location deviates from the planned route.
摘要:
A method and system for tracking an asset in an indoor facility. The method includes receiving, from a first mobile device, an asset tracking tag collision report, the asset tracking tag collision report including a tag identifier of an asset tracking tag associated with an asset; determining a new location of the asset based on the received asset tracking tag collision report; updating an asset location database to indicate the new location of the asset; and, in response to determining the new location of the asset, transmitting an instruction message to a mobile device to cause the mobile device to direct the asset tracking tag to cease broadcasting the wireless signal. The method and system use crowd-sourcing to determine a new location of an asset that has moved in an indoor facility.
摘要:
A mobile communications device includes a plurality of first input devices capable of passively collecting input data, a second input device(s) capable of collecting response data based upon a challenge, and a processor capable of determining a level of assurance (LOA) that possession of the mobile communications device has not changed based upon a statistical behavioral model and the passively received input data, and comparing the LOA with a security threshold. When the LOA is above the security threshold, the processor may be capable of performing a given mobile device operation without requiring response data from the second input device(s). When the LOA falls below the security threshold, the processor may be capable of generating the challenge, performing the given mobile device operation responsive to valid response data, and adding recent input data to the statistical behavioral model responsive to receipt of the valid response data.
摘要:
Methods and devices for determining whether a computing device has been compromised. File tree structure information for the computing device is obtained that details at least a portion of a tree-based structure of folders and files in a memory on the computing device. It is then determined from the file tree structure information that the computing device is compromised and, based on the determination that the computing device has been compromised, an action is taken.
摘要:
A mobile transceiver for asset tracking having route monitoring and method of operation are provided. In one aspect, the method comprises: determining a location of the mobile transceiver using the satellite receiver; determining whether the determined location deviates from a planned route; and sending an alert to an asset tracking service when the determined location deviates from the planned route.