Some content of this application is unavailable at the moment.
If this situation persists, please contact us atFeedback&Contact
1. (WO2017096206) METHOD TO SECURE PROTECTED CONTENT ON A MOBILE DEVICE
Latest bibliographic data on file with the International Bureau

Pub. No.: WO/2017/096206 International Application No.: PCT/US2016/064689
Publication Date: 08.06.2017 International Filing Date: 02.12.2016
Chapter 2 Demand Filed: 10.05.2017
IPC:
H04W 12/02 (2009.01) ,H04W 12/12 (2009.01) ,H04L 29/08 (2006.01) ,G06F 21/55 (2013.01) ,G06F 21/56 (2013.01) ,G06F 21/62 (2013.01) ,G06F 21/88 (2013.01)
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
W
WIRELESS COMMUNICATION NETWORKS
12
Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
02
Protecting privacy or anonymity
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
W
WIRELESS COMMUNICATION NETWORKS
12
Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
12
Fraud detection
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
L
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29
Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02
Communication control; Communication processing
06
characterised by a protocol
08
Transmission control procedure, e.g. data link level control procedure
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
21
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50
Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55
Detecting local intrusion or implementing counter-measures
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
21
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50
Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55
Detecting local intrusion or implementing counter-measures
56
Computer malware detection or handling, e.g. anti-virus arrangements
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
21
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60
Protecting data
62
Protecting access to data via a platform, e.g. using keys or access control rules
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
21
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
70
Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
88
Detecting or preventing theft or loss
Applicants:
BOTTOMLINE TECHNOLOGIES, INC. [US/US]; 325 Corporate Drive Portsmouth, New Hampshire 03801, US
Inventors:
NAGALLA, Durga; US
DEEB, Alexander; US
Agent:
STEYER, Grant S.; US
Priority Data:
14/959,49204.12.2015US
Title (EN) METHOD TO SECURE PROTECTED CONTENT ON A MOBILE DEVICE
(FR) PROCÉDÉ POUR SÉCURISER UN CONTENU PROTÉGÉ SUR UN APPAREIL MOBILE
Abstract:
(EN) A method and device for securing data accessed by a mobile device. The mobile device detects a request to record content displayed on a display of the mobile device. A determination is then made regarding whether the content that was displayed on the screen when the request to record was received is protected content. If the displayed content was protected, then a third party is notified that a security breach has been detected. A remedial action is also performed regarding the security breach.
(FR) La présente invention concerne un procédé et un dispositif pour sécuriser des données auxquelles un dispositif mobile accède. L'appareil mobile détecte une demande d'enregistrement d'un contenu affiché sur un écran du dispositif mobile. Une détermination est alors effectuée pour savoir si le contenu affiché sur l'écran lorsque la demande d'enregistrement a été reçue est un contenu protégé. Si le contenu affiché est protégé, alors un tiers est informé qu'une violation de sécurité a été détectée. Des mesures correctives sont également prises en ce qui concerne la violation de sécurité.
front page image
Designated States: AE, AG, AL, AM, AO, AT, AU, AZ, BA, BB, BG, BH, BN, BR, BW, BY, BZ, CA, CH, CL, CN, CO, CR, CU, CZ, DE, DJ, DK, DM, DO, DZ, EC, EE, EG, ES, FI, GB, GD, GE, GH, GM, GT, HN, HR, HU, ID, IL, IN, IR, IS, JP, KE, KG, KN, KP, KR, KW, KZ, LA, LC, LK, LR, LS, LU, LY, MA, MD, ME, MG, MK, MN, MW, MX, MY, MZ, NA, NG, NI, NO, NZ, OM, PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SA, SC, SD, SE, SG, SK, SL, SM, ST, SV, SY, TH, TJ, TM, TN, TR, TT, TZ, UA, UG, US, UZ, VC, VN, ZA, ZM, ZW
African Regional Intellectual Property Organization (ARIPO) (BW, GH, GM, KE, LR, LS, MW, MZ, NA, RW, SD, SL, ST, SZ, TZ, UG, ZM, ZW)
Eurasian Patent Organization (AM, AZ, BY, KG, KZ, RU, TJ, TM)
European Patent Office (AL, AT, BE, BG, CH, CY, CZ, DE, DK, EE, ES, FI, FR, GB, GR, HR, HU, IE, IS, IT, LT, LU, LV, MC, MK, MT, NL, NO, PL, PT, RO, RS, SE, SI, SK, SM, TR)
African Intellectual Property Organization (BF, BJ, CF, CG, CI, CM, GA, GN, GQ, GW, KM, ML, MR, NE, SN, TD, TG)
Publication Language: English (EN)
Filing Language: English (EN)