Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate
2006-12-21
2011-10-18
Vu, Kim (Department: 2435)
Information security
Prevention of unauthorized use of data including prevention...
C707S781000, C707S786000
Reexamination Certificate
active
08042189
ABSTRACT:
Embodiments relate to systems and methods for implementation on a mobile device to force the mobile device into a secure state upon detection or determination of a triggering event. Once it is determined that a triggering event has occurred, each application operating on the mobile device is caused to immediately unreference sensitive objects and a secure garbage collection operation is performed upon the unreferenced sensitive objects to render data associated therewith unreadable. The mobile device is then caused to enter a secure state, in which the mobile device cannot be accessed without authorization. A microprocessor within the mobile device is configured to determine the existence of the triggering event according to a configuration data structure and to perform the secure garbage collection.
REFERENCES:
patent: 4853842 (1989-08-01), Thatte et al.
patent: 5088036 (1992-02-01), Ellis et al.
patent: 5392432 (1995-02-01), Engelstad et al.
patent: 5485613 (1996-01-01), Engelstad et al.
patent: 5560003 (1996-09-01), Nilsen et al.
patent: 5819304 (1998-10-01), Nilsen et al.
patent: 5845298 (1998-12-01), O'Connor et al.
patent: 5960087 (1999-09-01), Tribble et al.
patent: 6012065 (2000-01-01), Boucher et al.
patent: 6049810 (2000-04-01), Schwartz et al.
patent: 6065020 (2000-05-01), Dussud
patent: 6081665 (2000-06-01), Nilsen et al.
patent: 6138005 (2000-10-01), Park
patent: 6349314 (2002-02-01), Patel
patent: 6453403 (2002-09-01), Czajkowski
patent: 6654773 (2003-11-01), Hills
patent: 6662020 (2003-12-01), Aaro et al.
patent: 6662023 (2003-12-01), Helle
patent: 6701334 (2004-03-01), Ye et al.
patent: 6704489 (2004-03-01), Kurauchi et al.
patent: 6704756 (2004-03-01), Wollrath et al.
patent: 6804765 (2004-10-01), Kolodner et al.
patent: 6807169 (2004-10-01), Mattathil
patent: 6865657 (2005-03-01), Traversat et al.
patent: 6993588 (2006-01-01), Davis et al.
patent: 7013454 (2006-03-01), Bush et al.
patent: 7104445 (2006-09-01), Little et al.
patent: 7231199 (2007-06-01), Adams et al.
patent: 7243356 (2007-07-01), Saulpaugh et al.
patent: 7263700 (2007-08-01), Bacon et al.
patent: 7412518 (2008-08-01), Duigou et al.
patent: 7617264 (2009-11-01), Garthwaite
patent: 7620943 (2009-11-01), Garthwaite
patent: 7661140 (2010-02-01), Little et al.
patent: 2002/0133533 (2002-09-01), Czajkowski et al.
patent: 2002/0138634 (2002-09-01), Davis et al.
patent: 2002/0194245 (2002-12-01), Simpson et al.
patent: 2002/0194471 (2002-12-01), Benantar et al.
patent: 2003/0126462 (2003-07-01), Howard et al.
patent: 2005/0020315 (2005-01-01), Robertson
patent: 2005/0129235 (2005-06-01), Little et al.
patent: 2005/0257043 (2005-11-01), Adams et al.
patent: 2006/0036849 (2006-02-01), Brown et al.
patent: 2006/0053306 (2006-03-01), Adams et al.
patent: 2010/0138930 (2010-06-01), Little et al.
patent: 2479526 (2003-09-01), None
patent: 1411709 (2004-04-01), None
patent: 1501330 (2005-01-01), None
patent: 1633155 (2006-03-01), None
patent: WO 01/04744 (2000-07-01), None
patent: 0104744 (2001-01-01), None
patent: WO/03/079196 (2003-09-01), None
patent: 2005106676 (2005-11-01), None
patent: WO 2008/074123 (2006-12-01), None
patent: 2008074123 (2008-06-01), None
Bernd Mathiske and Daniel Schneider. “Automatic Persistent Memory Management for Spotless™ Virtual Machine on the Palm Connected Organizer,” Sun SMLI Technical Reports, No. TR-2000-89, Jun. 2000 , ppg. 1-18.
Jeff Friesen, “Trash Talk, Part 1—Java recycles its memory through garbage collection,” Javaworld Online accessed at http://www.javaworld.com/javaworld/jw-12-2001/jw-1207-javal01.html, Dec. 7, 2001, ppg. 1 -9.
Yeates S. A., et al., “Design patterns in garbage collection,” Technology of Object-Oriented Languages and Systems, Tools 25, Proceedings Melbourne, Victoria, Australia Nov. 24 -28, 1997, Los Alamitos, California, USA, IEEE Computer Soc., US Nov. 24, 1997, ppg.80-98.
Research in Motion Limited, “Blackberry Security for Lotus Domino—Version 2.0 with Service Pack 2”. RIM Technical White Papers, 2001, ppg. 1-12.
Sun, “J2ME Building Blocks for Mobile Devices—White Paper on KVM and the Connected, Limited Device Configuration (CLDC)” Sun White papers, May 19, 2000, pg. 1-36.
Yeates S. A. et al., “Design of a Garbage Collector Using Design Patterns”, Department of Computer Science, University of Canterbury, New Zealand, Proceedings of Tools Pacific '97, Melbourne, Australia, Sep. 25-28, 1997.
European Search Report dated May 21, 2010, European Patent Application No. 06840520.8.
Co-pending U.S. Appl. No. 12/702,635, “System and Method of Secure Garbage Collection on a Mobile Device”, filed Feb. 9, 2010 (retrievable from PAIR).
Preliminary Amendment dated Jun. 9, 2010, U.S. Appl. No. 12/702,635.
International Search Report and Written Opinion dated Aug. 21, 2007, International Patent Application No. PCT/CA2006/002093.
International Preliminary Report on Patentability dated Jul. 2, 2009, International Patent Application No. PCT/CA2006/002093.
Adams Neil P.
Brown Michael K.
Brown Michael S.
Little Herbert A.
Bereskin & Parr LLP / S.E.N.C.R.L., s.r.l.
Research In Motion Limited
Shirazi Sayed Beheshti
Vu Kim
LandOfFree
System and method to force a mobile device into a secure state does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method to force a mobile device into a secure state, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method to force a mobile device into a secure state will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4275588