Disabling a mobile device that has stolen hardware components
First Claim
1. A computer-implemented method comprising:
- reading a first hardware component identifier for a first hardware component of a computing device, the reading of the first hardware component identifier for the first hardware component being performed by a processor of the computing device reading a read-only memory of the first hardware component;
receiving, by the computing device, a second hardware component identifier and an alert indicator over a network, the second hardware component identifier and the alert indicator corresponding with the first hardware component;
comparing, by the computing device, the first hardware component identifier with the second hardware component identifier;
transmitting a first request to a computer system to check whether the first hardware component is listed as stolen; and
disabling the computing device in response to the first hardware component identifier matching the second hardware component identifier and the alert indicator indicates that the first hardware component has been reported stolen.
1 Assignment
0 Petitions
Accused Products
Abstract
A first hardware component identifier may be read for a first hardware component of a computing device. The reading of the first hardware component identifier for the first hardware component may be performed by a processor of the computing device reading a read-only memory of the first hardware component. A second hardware component identifier and an alert indicator over a network may be received. The second hardware component identifier and the alert indicator may correspond with the first hardware component. The first hardware component identifier may be compared with the second hardware component identifier. The computing device may be disabled when the first hardware component identifier matches the second hardware component identifier and the alert indicator indicates that the first hardware component has been reported stolen.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
-
reading a first hardware component identifier for a first hardware component of a computing device, the reading of the first hardware component identifier for the first hardware component being performed by a processor of the computing device reading a read-only memory of the first hardware component; receiving, by the computing device, a second hardware component identifier and an alert indicator over a network, the second hardware component identifier and the alert indicator corresponding with the first hardware component; comparing, by the computing device, the first hardware component identifier with the second hardware component identifier; transmitting a first request to a computer system to check whether the first hardware component is listed as stolen; and disabling the computing device in response to the first hardware component identifier matching the second hardware component identifier and the alert indicator indicates that the first hardware component has been reported stolen. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a computing device having a processor; and a computer readable storage medium having program instructions embodied therewith, the program instructions readable/executable by the processor to cause the system to perform a method, the method comprising; establishing an automated wireless connection, via a network and without a user request, between the computing device and a datastore, the datastore being remote to the computing device; receiving, via the network, a first set of identifiers corresponding to an identification of a set of hardware components that are listed in a datastore as being within the computing device; extracting, from the computing device, a second set of identifiers corresponding to an identification of a set of hardware components that are within the computing device; determining, by comparing at least a first portion of the first set of identifiers with at least a second portion of the second set of identifiers, whether the set of hardware components that are listed in the datastore as being within the computing device match the set of hardware components that are within the computing device; receiving a first message indicating that none of the second set of identifiers are listed in the datastore corresponding to the set of hardware components being stolen incrementing a counter to a first quantity based on receiving of the first message; and changing, in response to the incrementing of the counter, the first set of identifiers to another set of identifiers. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product comprising a computer readable storage medium having program code embodied therewith, the program code executable by a computing device to:
-
read a first hardware component identifier for a first hardware component of the computing device, the reading of the first hardware component identifier for the first hardware component being performed by a processor of the computing device reading a read-only memory of the first hardware component; receive a second hardware component identifier and an alert indicator over a network, the second hardware component identifier and the alert indicator corresponding with the first hardware component; compare the first hardware component identifier with the second hardware component identifier; transmit a request for the second hardware component identifier and the alert indicator over the network to a server computer system, the server computer system having a datastore of hardware components having been reported stolen; and disable the computing device when the first hardware component identifier matches the second hardware component identifier and the alert indicator indicates that the first hardware component has been reported stolen. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification