Enhanced selective wipe for compromised devices
A selective and enhanced technology that can be used in platform integrity maintenance, nan, instrumentation, etc., to solve problems such as data loss
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0113] Example 1: An apparatus comprising: one or more computer-readable storage media; and program instructions stored on the one or more computer-readable storage media and comprising an application, when the application is executed by When executed by the processing system, the processing system is directed to at least: initiate a request to authenticate a user with respect to the application; receive a response to the request, the response including device management instructions; and execute the device management instructions .
example 2
[0114] Example 2: The apparatus of example 1, wherein the device management instructions include selective wipe instructions to selectively wipe data associated with the application, and wherein the application further directs the The processing system transmits a request to authenticate the user to an access control service providing authentication and authorization services, wherein the access control service returns a response to the request, the response including the device management instructions.
example 3
[0115] Example 3: The apparatus of examples 1-2, wherein the program instructions further include a device management application that, when executed by the processing system, instructs the processing system to: respond to Another selective wipe command sent by the device management service to selectively wipe other data.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


