Method and apparatus for detecting and dealing with a lost electronics device
First Claim
1. A method comprising:
- encrypting, at a device, a first portion of information on the device based on a primary private security key;
autonomously determining, by the device, that the device is lost; and
in response to determining that the device is lost, preventing, at the device, access to the information on the device, the preventing access to the information comprising;
encrypting the encrypted first portion of the information and a second portion of the information based on a secondary private security key not used for encrypting the information during normal operation of the device, such that the first portion of the information on the device becomes encrypted based on the secondary private security key and encrypted based on the primary private security key;
wherein the secondary private security key is inaccessible to an owner of the device and is accessible to a trusted entity for the device.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for detecting and dealing with a lost electronics device are disclosed. In one design, the device may autonomously determine whether it is lost. The device may destroy at least one component to render it inoperable and may perform other actions in response to determining that it is lost. In another design, the device may determine available battery power of the device upon determining that it is lost, select at least one action in a list of possible actions based on the available battery power, and perform the selected action(s). In yet another design, upon determining that it is lost, the device may prevent access to information on the device based on a secondary security key, which is not used for encrypting information during normal operation. In yet another design, the device may notify at least one contact and may perform at least one additional action upon determining that it is lost.
-
Citations
15 Claims
-
1. A method comprising:
-
encrypting, at a device, a first portion of information on the device based on a primary private security key; autonomously determining, by the device, that the device is lost; and
in response to determining that the device is lost, preventing, at the device, access to the information on the device, the preventing access to the information comprising;encrypting the encrypted first portion of the information and a second portion of the information based on a secondary private security key not used for encrypting the information during normal operation of the device, such that the first portion of the information on the device becomes encrypted based on the secondary private security key and encrypted based on the primary private security key;
wherein the secondary private security key is inaccessible to an owner of the device and is accessible to a trusted entity for the device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus comprising:
-
means for encrypting, at a device, a first portion of information on the device based on a primary private security key, means for autonomously determining, by the device, that the device is lost; and
means for preventing access to the information on the device in response to determining that the device is lost, wherein the means for preventing access to the information comprises;means for encrypting the encrypted first portion of the information and a second portion of the information based on a secondary private security key not used for encrypting the information during normal operation of the device, such that the first portion of the information on the device becomes encrypted based on the secondary private security key and based on the primary private security key;
wherein the secondary private security key is inaccessible to an owner of the device and is accessible to a trusted entity for the device. - View Dependent Claims (8, 9)
-
-
10. An apparatus comprising:
-
at least one processor configured to; encrypt a first portion of information on the apparatus based on a primary private security key; determine that the apparatus is lost; and in response to determining that the apparatus is lost, prevent access to the information on the apparatus, the prevent access to the information comprising; encrypt the encrypted first portion of the information and a second portion of the information based on a secondary private security key not used for encrypting the information during normal operation of the apparatus, such that the first portion of the information on the apparatus becomes encrypted based on the secondary private security key and based on the primary private security key;
wherein the secondary private security key is inaccessible to an owner of the device and is accessible to a trusted entity for the device. - View Dependent Claims (11, 12)
-
-
13. A computer program product, comprising:
-
a non-transitory computer-readable medium comprising; code for causing at least one computer to encrypt a first portion of information on a device based on a primary private security key; code for causing the at least one computer to determine that the device is lost; and code for causing the at least one computer to prevent access to the information on the device in response to determining that the device is lost, wherein the code for preventing access to the information comprises; code for encrypting the encrypted first portion of the information and the second portion of the information based on a secondary private security key not used for encrypting the information during normal operation of the device, such that the first portion of the information on the device becomes encrypted based on the secondary private security key and based on the primary private security key;
wherein the secondary private security key is inaccessible to an owner of the device and is accessible to a trusted entity for the device. - View Dependent Claims (14, 15)
-
Specification