摘要:
Apparatus, methods, and programs for protecting data on a wireless device may include a wireless device having a computer platform with a processing engine operable, based upon configurable parameters, to log data access attempt on the wireless device and transmit the log to a remote device. Furthermore, the wireless device may be configured to execute locally and remotely generated control commands on the wireless device, the commands operable to modify an operation of the wireless device. The embodiment may also include an apparatus operable to receive the transmitted log, analyze the received log and transmit a control command to the wireless device. The apparatus may further generate a data access report and make the report available to an authorized user.
摘要:
Detection and management methods and apparatus for wireless devices may include an executable instruction authorization module operable to scan executable instructions on a wireless device, generate a log indicative of a virus or otherwise unauthorized executable instructions based on a received authorization configuration, and forward the log to a user manager. The user manager may be operable to analyze the log and generate an authorization report which may be viewable by an operator to determine the disposition of unauthorized executable instructions. At least one of the executable instruction authorization module, the user manager, and the operator may be operable to generate a control command operable to delete, or otherwise disable, unauthorized executable instructions on the wireless device, or to restore the executable instructions on the wireless device.
摘要:
Apparatus, methods, processors and machine readable media for verifying the integrity of firmware on a wireless device. Aspects include generating a verification scheme for testing the integrity of firmware on a wireless device and transmitting the verification scheme to the wireless device. The wireless device applies the verification scheme to the firmware and obtains a verification test result, which is forwarded for analysis. An analyzer compares the generated verification test result with a predetermined test result to obtain an integrity determination that indicates the integrity of the firmware. In some aspects, control commands to change an operational characteristic of the wireless device may be generated based on the integrity determination.
摘要:
A method and system for remote activation of computer based applications uses Simple Message Service (SMS) messages to inform a remote computer that an application should be activated. The SMS message may be sent by a cell phone or from a computer. The remote computer receives the SMS message, parses the message to determine the application to be started, and starts the indicated application. If the remote computer is turned off, the SMS message can be received by an SMS receiver within a modem which can be configured to start the computer so the application can be activated.
摘要:
A method and system for remote activation of computer based applications uses Simple Message Service (SMS) messages to inform a remote computer that an application should be activated. The SMS message may be sent by a cell phone or from a computer. The remote computer receives the SMS message, parses the message to determine the application to be started, and starts the indicated application. If the remote computer is turned off, the SMS message can be received by an SMS receiver within a modem which can be configured to start the computer so the application can be activated.
摘要:
The disclosed embodiments provide for a system and method for storing data in a flash memory device that has a code bank and a data bank. The method includes writing data to the data bank under control of a flash driver in the code bank when sufficient space is expected to exist in the data bank. Otherwise, the method includes writing data to the code bank under control of a flash driver in a storage device that is external to the flash memory device.