International Business Machines Corporation
MOBILE DEVICE APPLICATION SOFTWARE SECURITY
Last updated:
Abstract:
A security system for a computing device is provided. A computing device receives one or more policy decisions from a primary user. A computing device monitors activity associated with one or more applications by a secondary user on a computing device. A computing device detects unauthorized activity by the secondary user on the computing device. In response to a computing device detecting unauthorized activity by the secondary user on the computing device, a computing device activates protected mode on the computing device.
Status:
Application
Type:
Utility
Filling date:
7 Jan 2020
Issue date:
8 Jul 2021