Unlock instant, AI-driven research and patent intelligence for your innovation.

Enhanced selective wipe for compromised devices

A selective and enhanced technology that can be used in platform integrity maintenance, nan, instrumentation, etc., to solve problems such as data loss

Inactive Publication Date: 2017-02-22
MICROSOFT TECH LICENSING LLC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] This increased access creates an additional risk of data loss if the device is misplaced, when a worker is no longer associated with their company, or in the event of theft

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enhanced selective wipe for compromised devices
  • Enhanced selective wipe for compromised devices
  • Enhanced selective wipe for compromised devices

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0113] Example 1: An apparatus comprising: one or more computer-readable storage media; and program instructions stored on the one or more computer-readable storage media and comprising an application, when the application is executed by When executed by the processing system, the processing system is directed to at least: initiate a request to authenticate a user with respect to the application; receive a response to the request, the response including device management instructions; and execute the device management instructions .

example 2

[0114] Example 2: The apparatus of example 1, wherein the device management instructions include selective wipe instructions to selectively wipe data associated with the application, and wherein the application further directs the The processing system transmits a request to authenticate the user to an access control service providing authentication and authorization services, wherein the access control service returns a response to the request, the response including the device management instructions.

example 3

[0115] Example 3: The apparatus of examples 1-2, wherein the program instructions further include a device management application that, when executed by the processing system, instructs the processing system to: respond to Another selective wipe command sent by the device management service to selectively wipe other data.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Systems, methods, and software are disclosed herein that enhance selective wipe technology and operations. In an implementation, an application initiates a request to authenticate a user with respect to the application. In some scenarios, the application receives a response to the request that includes a selective wipe instruction. Then the application receives such a response, the application selectively wipes data associated with the application.

Description

Background technique [0001] Workers use an increasing variety of devices to access high-value corporate data, such as email or documents stored on corporate servers or in the cloud. Even in non-work related settings and scenarios, individuals use various computing devices to access their personal data. [0002] This increased access poses an additional risk of suffering data loss if the device is misplaced, when a worker is no longer associated with their company, or in the event of theft. In these and other cases, organizations or individuals may be interested in wiping corporate or other select data from problematic devices. [0003] Selective wipe is a computing technique that allows certain applications and profiles to be removed while retaining other data when a device becomes compromised. For example, when a user's device becomes compromised, enterprise applications and profiles installed on the device can be automatically removed, while the user's personal data can re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/41G06F21/55H04W4/00H04W12/06H04W12/08H04W4/50
CPCG06F21/41G06F21/554H04W12/06H04W12/08G06F2221/2143H04W4/50H04W12/37H04W12/082H04W12/126G06F21/6209H04L63/08H04L63/20
Inventor M·科斯蒂M·K·尤尼克里沙南U·S·赫格德
Owner MICROSOFT TECH LICENSING LLC