Systems and methods for identifying unauthorized users of an electronic device
First Claim
1. A method for denying unauthorized usage of an electronic device, the method comprising, at the electronic device:
- collecting a first set of data associated with a current usage identity, wherein the first set of data includes a first motion profile associated with the current usage identity;
obtaining a second set of data associated with an authorized usage identity, wherein the second set of data includes a second motion profile associated with the authorized usage identity;
determining that an unauthorized usage of the electronic device is occurring by comparing at least the first and second motion profiles; and
in response to determining that the electronic device is communicably coupled to a host device;
denying access to at least one function provided by the electronic device,gathering information associated with the host device, andcommunicating, to at least one electronic device associated with the electronic device, a notification that;
(i) indicates the unauthorized usage, and(ii) includes the information associated with the host device.
0 Assignments
0 Petitions
Accused Products
Abstract
This is generally directed to identifying unauthorized users of an electronic device. In some embodiments, an unauthorized user of the electronic device can be detected by identifying particular activities that may indicate suspicious behavior. In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identity of the owner of the electronic device. When an unauthorized user is detected, various safety measures can be taken. For example, information related to the identity of the unauthorized user, the unauthorized user'"'"'s operation of the electronic device, or the current location of the electronic device can be gathered. As another example, functions of the electronic device can be restricted. In some embodiments, the owner of the electronic device can be notified of the unauthorized user by sending an alert notification through any suitable medium, such as, for example, a voice mail, e-mail, or text message.
-
Citations
20 Claims
-
1. A method for denying unauthorized usage of an electronic device, the method comprising, at the electronic device:
-
collecting a first set of data associated with a current usage identity, wherein the first set of data includes a first motion profile associated with the current usage identity; obtaining a second set of data associated with an authorized usage identity, wherein the second set of data includes a second motion profile associated with the authorized usage identity; determining that an unauthorized usage of the electronic device is occurring by comparing at least the first and second motion profiles; and in response to determining that the electronic device is communicably coupled to a host device; denying access to at least one function provided by the electronic device, gathering information associated with the host device, and communicating, to at least one electronic device associated with the electronic device, a notification that; (i) indicates the unauthorized usage, and (ii) includes the information associated with the host device. - View Dependent Claims (2, 3, 4, 5, 6, 18)
-
-
7. At least one non-transitory computer readable medium storing instructions that, when executed by at least one processor included in an electronic device, cause the electronic device to carry out steps that include:
-
collecting a first set of data associated with a current usage identity, wherein the first set of data includes a first motion profile associated with the current usage identity; obtaining a second set of data associated with an authorized usage identity, wherein the second set of data includes a second motion profile associated with the authorized usage identity; determining that an unauthorized usage of the electronic device is occurring by comparing at least the first and second motion profiles; and in response to determining that the electronic device is communicably coupled to a host device; denying access to at least one function provided by the electronic device, gathering information associated with the host device, and communicating, to at least one electronic device associated with the electronic device, a notification that; (i) indicates the unauthorized usage, and (ii) includes the information associated with the host device. - View Dependent Claims (8, 9, 10, 11, 19)
-
-
12. An electronic device, comprising:
-
at least one memory; and at least one processor configured to cause the electronic device to carry out steps that include; collecting a first set of data associated with a current usage identity, wherein the first set of data includes a first motion profile associated with the current usage identity; obtaining a second set of data associated with an authorized usage identity, wherein the second set of data includes a second motion profile associated with the authorized usage identity; determining that an unauthorized usage of the electronic device is occurring by comparing at least the first and second motion profiles; and in response to determining that the electronic device is communicably coupled to a host device; denying access to at least one function provided by the electronic device, gathering information associated with the host device, and communicating, to at least one electronic device associated with the electronic device, a notification that; (i) indicates the unauthorized usage, and (ii) includes the information associated with the host device. - View Dependent Claims (13, 14, 15, 16, 17, 20)
-
Specification