US 9,721,111 B2
Methods of dynamically securing electronic devices and other communications through environmental and system measurements leveraging tailored trustworthy spaces
Synopsis: A mobile device can use sensors and system data to determine the current security state of its operating environment. Decisions can be made by the device without the reliance on any external server or data connection to take actions within the device configuration and running applications, including up to the removal of security keys, application code, and data. Use cases include automatic selective wiping of sensitive information when a device is lost, restricting access to business application functions while not at work, and preventing the visual eavesdropping of sensitive banking information when other parties are present.
US 10,185,835
Methods of dynamically securing electronic devices and other communications through environmental and system measurements leveraging tailored trustworthy spaces and continuous authentication
Synopsis: Two or more devices may participate in a communication including audio, video, or data transfer. In addition to the primary data being transferred, low level information including sensor readings of the device and high level information including inferred security states and environmental conditions of the device are sent to the peer. The peer can take automated action based on this additional information, including restricting or modifying the primary data communication. Use cases include a private or sensitive phone call in which a device determines that multiple people are present within earshot of the first participant. The device of the second participant can notify that participant of the people present on the other end of the call or the device can take immediate automatic action such as terminating the call.