System for remotely controlling access to a mobile device
First Claim
1. A system for remotely controlling access to a mobile device, the system comprising:
- at least one non-transitory storage device;
at least one processor; and
at least one module stored in said storage device and comprising instruction code that is executable by the at least one processor and configured to cause said at least one processor to;
provide a misappropriation application for installation on a mobile device of a user, wherein the misappropriation application is initially inactive;
receive an indication that a transaction executed by a user is misappropriate, wherein the transaction is executed by the user using the mobile device, wherein the mobile device is in possession of the user, wherein the transaction is executed by the user at a merchant location;
establish a communication link with the mobile device of the user, wherein establishing further comprises creating a wireless data channel with the mobile device;
transmit control signals, via the established communication link, configured to cause the misappropriation application to begin running in the background of the mobile device;
initiate, via the misappropriation application, one or more actions to be executed on the mobile device of the user based on at least receiving the indication that the transaction executed by the user is misappropriate, wherein the one or more actions limit one or more functionalities of the mobile device, wherein limiting further comprises disabling one or more features of the mobile device based on at least a predefined user preference;
determine an alternative communication form associated with the user;
transmit a notification to the user via the alternate communication form, wherein the notification further comprises an indication that one or more features of the mobile device has been disabled;
receive one or more authentication credentials from the user in response to transmitting a notification indicating that the one or more features of the mobile device has been disabled;
verify the one or more authentication credentials received from the user, wherein verifying further comprises validating an identity of the user;
transmit control signals, via the established communication link, to re-enable the one or more features previously disabled on the mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, computer program products, and methods are described herein for remotely controlling access to a mobile device. The present invention is configured to receive an indication that a transaction executed by a user is misappropriate, wherein the transaction is executed by the user using a mobile device; transmit control signals configured to cause the misappropriation application to begin running in the background of the mobile device; initiate, via the misappropriation application, one or more actions to be executed on the mobile device of the user based on at least receiving the indication that the transaction executed by the user is misappropriate; determine an alternative communication form associated with the user; transmit a notification to the user via the alternate communication form, when the notification further comprises an indication that one or more functionalities of the mobile device has been limited.
-
Citations
20 Claims
-
1. A system for remotely controlling access to a mobile device, the system comprising:
-
at least one non-transitory storage device; at least one processor; and at least one module stored in said storage device and comprising instruction code that is executable by the at least one processor and configured to cause said at least one processor to; provide a misappropriation application for installation on a mobile device of a user, wherein the misappropriation application is initially inactive; receive an indication that a transaction executed by a user is misappropriate, wherein the transaction is executed by the user using the mobile device, wherein the mobile device is in possession of the user, wherein the transaction is executed by the user at a merchant location; establish a communication link with the mobile device of the user, wherein establishing further comprises creating a wireless data channel with the mobile device; transmit control signals, via the established communication link, configured to cause the misappropriation application to begin running in the background of the mobile device; initiate, via the misappropriation application, one or more actions to be executed on the mobile device of the user based on at least receiving the indication that the transaction executed by the user is misappropriate, wherein the one or more actions limit one or more functionalities of the mobile device, wherein limiting further comprises disabling one or more features of the mobile device based on at least a predefined user preference; determine an alternative communication form associated with the user; transmit a notification to the user via the alternate communication form, wherein the notification further comprises an indication that one or more features of the mobile device has been disabled; receive one or more authentication credentials from the user in response to transmitting a notification indicating that the one or more features of the mobile device has been disabled; verify the one or more authentication credentials received from the user, wherein verifying further comprises validating an identity of the user; transmit control signals, via the established communication link, to re-enable the one or more features previously disabled on the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computerized method for remotely controlling access to a mobile device, the method comprising:
-
providing, using a computing device processor, a misappropriation application for installation on a mobile device of a user, wherein the misappropriation application is initially inactive; receiving, using a computing device processor, an indication that a transaction executed by a user is misappropriate, wherein the transaction is executed by the user using the mobile device, wherein the mobile device is in possession of the user, wherein the transaction is executed by the user at a merchant location; establishing, via a computing device processor, a communication link with the mobile device of the user, wherein establishing further comprises creating a wireless data channel with the mobile device; transmitting control signals, via the established communication link, configured to cause the misappropriation application to begin running in the background of the mobile device; initiating, via the misappropriation application, one or more actions to be executed on the mobile device of the user based on at least receiving the indication that the transaction executed by the user is misappropriate, wherein the one or more actions limit one or more functionalities of the mobile device, wherein limiting further comprises disabling one or more features of the mobile device based on at least a predefined user preference; determining, using a computing device processor, an alternate communication form associated with the user; transmit a notification to the user via the alternate communication form, wherein the notification further comprises an indication that one or more features of the mobile device has been disabled; receiving, using a computing device processor, one or more authentication credentials from the user in response to transmitting a notification indicating that the one or more features of the mobile device has been disabled; verifying, using a computing device processor, the one or more authentication credentials received from the user, wherein verifying further comprises validating an identity of the user; transmitting control signals, via the established communication link, to re-enable the one or more features previously disabled on the mobile device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product for remotely controlling access to a mobile device, the computer program product comprising a non-transitory computer-readable medium comprising code causing a first apparatus to:
-
provide a misappropriation application for installation on a mobile device of a user, wherein the misappropriation application is initially inactive; receive an indication that a transaction executed by a user is misappropriate, wherein the transaction is executed by the user using the mobile device, wherein the mobile device is in possession of the user, wherein the transaction is executed by the user at a merchant location; establish a communication link with the mobile device of the user, wherein establishing further comprises creating a wireless data channel with the mobile device; transmit control signals, via the established communication link, configured to cause the misappropriation application to begin running in the background of the mobile device; initiate, via the misappropriation application, one or more actions to be executed on the mobile device of the user based on at least receiving the indication that the transaction executed by the user is misappropriate, wherein the one or more actions limit one or more functionalities of the mobile device, wherein limiting further comprises disabling one or more features of the mobile device based on at least a predefined user preference; determine an alternative communication form associated with the user; transmit a notification to the user via the alternate communication form, wherein the notification further comprises an indication that one or more features of the mobile device has been disabled; receive one or more authentication credentials from the user in response to transmitting a notification indicating that the one or more features of the mobile device has been disabled; verify the one or more authentication credentials received from the user, wherein verifying further comprises validating an identity of the user; transmit control signals, via the established communication link, to re-enable the one or more features previously disabled on the mobile device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification