Systems and methods for securing computing devices that are not in users' physical possessions
First Claim
1. A computer-implemented method for securing computing devices that are not in users'"'"' physical possessions, at least a portion of the method being performed by a computing device of a user comprising at least one processor, the method comprising:
- configuring the computing device and an additional computing device of the user to exchange trusted heartbeat messages through the user'"'"'s body;
transmitting, from the additional computing device, a first heartbeat message through the user'"'"'s body;
receiving, at the computing device while the user is in physical possession of the computing device, the first heartbeat message through the user'"'"'s body;
transmitting, from the additional computing device after the first heartbeat message is transmitted, a second heartbeat message through the user'"'"'s body;
attempting, at the computing device, to receive the second heartbeat message through the user'"'"'s body;
failing, at the computing device, to receive the second heartbeat message through the user'"'"'s body;
determining, based at least in part on failing to receive the second heartbeat message through the user'"'"'s body, that the user is no longer in physical possession of the computing device; and
performing, at the computing device in response to determining that the user is no longer in physical possession of the computing device, a security action.
2 Assignments
0 Petitions
Accused Products
Abstract
The disclosed computer-implemented method for securing computing devices that are not in users'"'"' physical possessions may include (i) taking, at a computing device of a user while the user is in physical possession of the computing device, a first measurement of a biological attribute of the user'"'"'s body, (ii) taking, at the computing device, a second measurement of the same biological attribute, (iii) analyzing, at the computing device, the second measurement relative to the first measurement to determine that the user is no longer in physical possession of the computing device, and (iv) performing, at the computing device in response to determining that the user is no longer in physical possession of the computing device, a security action. Various other methods, systems, and computer-readable media are also disclosed.
52 Citations
20 Claims
-
1. A computer-implemented method for securing computing devices that are not in users'"'"' physical possessions, at least a portion of the method being performed by a computing device of a user comprising at least one processor, the method comprising:
-
configuring the computing device and an additional computing device of the user to exchange trusted heartbeat messages through the user'"'"'s body; transmitting, from the additional computing device, a first heartbeat message through the user'"'"'s body; receiving, at the computing device while the user is in physical possession of the computing device, the first heartbeat message through the user'"'"'s body; transmitting, from the additional computing device after the first heartbeat message is transmitted, a second heartbeat message through the user'"'"'s body; attempting, at the computing device, to receive the second heartbeat message through the user'"'"'s body; failing, at the computing device, to receive the second heartbeat message through the user'"'"'s body; determining, based at least in part on failing to receive the second heartbeat message through the user'"'"'s body, that the user is no longer in physical possession of the computing device; and performing, at the computing device in response to determining that the user is no longer in physical possession of the computing device, a security action. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for securing computing devices that are not in users'"'"' physical possessions, the system comprising:
-
a configuring module, stored in memory of a computing device of the user, that configures the computing device and an additional computing device of the user to exchange trusted heartbeat messages through the user'"'"'s body; a transmitting module, stored in the additional computing device'"'"'s memory, that; transmits, from the additional computing device, a first heartbeat message through the user'"'"'s body; and transmits, from the additional computing device after the first heartbeat message is transmitted, a second heartbeat message through the user'"'"'s body, a measuring module, stored in the computing device'"'"'s memory, that; receives the first heartbeat message through the user'"'"'s body attempts to receive the second heartbeat message through the user'"'"'s body; and fails to receive the second heartbeat message through the user'"'"'s body; an analyzing module, stored in the computing device'"'"'s memory, that determines, based at least in part on the second heartbeat message failing to be receive through the user'"'"'s body, that the user is no longer in physical possession of the computing device; a security module, stored in the computing device'"'"'s memory, that performs, at the computing device in response to determining that the user is no longer in physical possession of the computing device, a security action; and at least one physical processor that executes the measuring module, the analyzing module, and the security module. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable medium comprising one or more computer-executable instructions that, when executed by at least one processor of a computing device of a user, cause the computing device to:
-
configure the computing device of the user to exchange trusted heartbeat messages with an additional computing device of the user through the user'"'"'s body; receive, at the computing device while the user is in physical possession of the computing device, a first heartbeat message transmitted from the additional computing device through the user'"'"'s body; attempt, at the computing device, to receive a second heartbeat message transmitted from the additional computing device through the user'"'"'s body; fail, at the computing device, to receive the second heartbeat message through the user'"'"'s body; determine, based at least in part on failing to receive the second heartbeat message through the user'"'"'s body, that the user is no longer in physical possession of the computing device; and perform, at the computing device in response to determining that the user is no longer in physical possession of the computing device, a security action.
-
Specification