Abstract:
Systems, methodologies, and devices are described that facilitate filtering content sent to a mobile device(s) by a content provider via a core network. A content provider can determine a content rating for content, and/or the core network and/or mobile device can determine or infer a content rating for unrated content from a content provider, based in part on predefined content rating criteria. A mobile device user can specify a desired content rating preference for the mobile device. A filter(s) respectively associated with the core network and/or mobile device can filter the content based in part on the content rating of the content and the content rating preference of the mobile device to which the content is being sent. Content that does not meet a content rating threshold can be filtered out and stored in a secure content folder accessible using a security code or discarded.
Abstract:
Metodos y aparatos de deteccion y administracion para dispositivo inalambricos pueden incluir un modulo de autorizacion de instruccion ejecutables operable para escanear instrucciones ejecutables en un dispositivo inalambrico, generar un registro que indique un virus o, de otra forma, instrucciones ejecutables no autorizadas con base en una configuracion de autorizacion recibida, y reenviar el registro a un administrador de usuarios; el administrador de usuarios puede operar para analizar el registro y generar un soporte de autorizacion el cual puede ser visto por un operador para determinar la disposicion de instrucciones ejecutables no autorizadas; por lo menos uno del modulo de autorizacion de instrucciones ejecutables, el administrador de usuarios; y el operador puede operar para generar un comando de control que opere a fin de eliminar o, de otra forma, deshabilitar las instrucciones ejecutables no autorizadas en el dispositivo inalambrico, o para restablecer las instrucciones ejecutables en el dispositivo inalambrico.
Abstract:
Apparatus, methods, and programs for protecting data on a wireless device may include a wireless device having a computer platform with a processing engine operable, based upon configurable parameters, to log data access attempt on the wireless device and transmit the log to a remote device. Furthermore, the wireless device may be configured to execute locally and remotely generated control commands on the wireless device, the commands operable to modify an operation of the wireless device. The embodiment may also include an apparatus operable to receive the transmitted log, analyze the received log and transmit a control command to the wireless device. The apparatus may further generate a data access report and make the report available to an authorized user.
Abstract:
Detection and management methods and apparatus for wireless devices (102) may include an executable instruction authorization module (114) operable to scan executable instructions on a wireless device, generate a log (120) indicative of a virus or otherwise unauthorized executable instructions based on a received authorization configuration (118), and forward the log to a user manager (108). The user manager may be operable to analyze the log and generate an authorization report (154) which may be viewable by an operator to determine the disposition of unauthorized executable instructions At least one of the executable instruction authorization module, the user manager, and the operator may be operable to generate a control command operable to delete, or otherwise disable, unauthorized executable instructions on the wireless device, or to restore the executable instructions on the wireless device
Abstract:
Apparatus, methods, processors and machine readable media for verifying the integrity of firmware on a wireless device. Aspects include generating a verification scheme for testing the integrity of firmware on a wireless device and transmitting the verification scheme to the wireless device. The wireless device applies the verification scheme to the firmware and obtains a verification test result, which is forwarded for analysis. An analyzer compares the generated verification test result with a predetermined test result to obtain an integrity determination that indicates the integrity of the firmware. In some aspects, control commands to change an operational characteristic of the wireless device may be generated based on the integrity determination.
Abstract:
Apparatus, methods, and programs for protecting data on a wireless device may include a wireless device having a computer platform with a processing engine operable, based upon configurable parameters, to log data access attempt on the wireless device and transmit the log to a remote device. Furthermore, the wireless device may be configured to execute locally and remotely generated control commands on the wireless device, the commands operable to modify an operation of the wireless device. The embodiment may also include an apparatus operable to receive the transmitted log, analyze the received log and transmit a control command to the wireless device. The apparatus may further generate a data access report and make the report available to an authorized user.