Methods and systems for enhancing electronic device security by causing the device to go into a mode for lost or stolen devices
First Claim
Patent Images
1. A method comprising:
- receiving, by a processor, event information regarding an event at a first electronic device;
determining, by the processor, the event from the event information;
determining, by the processor, that the event indicates the first electronic device is lost or stolen by;
comparing the event against a set of events indicative of the first electronic device being lost or stolen, anddetermining that the event is one of the set of events indicative of the first electronic being lost or stolen;
transmitting, by the processor, an instruction to the first electronic device representing a request to enter a lost or stolen mode responsive to determining that the event is indicative of the first electronic device being lost or stolen;
receiving, by the processor from a second electronic device, second authentication information;
determining, by the processor using verification information received from the first electronic device, that the second authentication information matches first authentication information provided to the first electronic device;
responsive to determining that the second authentication information matches the first authentication information;
creating, by the processor, a remote access credential using the second authentication information and a salt, the salt representing random data used to safeguard passwords in storage; and
transmitting, by the processor, the remote access credential to the first electronic device, wherein the first electronic device follows the transmitted instruction responsive to the first electronic device determining that the remote access credential is valid.
7 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for enhancing the security of an electronic device by causing the electronic device to go into a mode for lost or stolen devices after a security component receives information regarding an event at the electronic device and determines that the event indicates the electronic device is lost or stolen.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, by a processor, event information regarding an event at a first electronic device; determining, by the processor, the event from the event information; determining, by the processor, that the event indicates the first electronic device is lost or stolen by; comparing the event against a set of events indicative of the first electronic device being lost or stolen, and determining that the event is one of the set of events indicative of the first electronic being lost or stolen; transmitting, by the processor, an instruction to the first electronic device representing a request to enter a lost or stolen mode responsive to determining that the event is indicative of the first electronic device being lost or stolen; receiving, by the processor from a second electronic device, second authentication information; determining, by the processor using verification information received from the first electronic device, that the second authentication information matches first authentication information provided to the first electronic device; responsive to determining that the second authentication information matches the first authentication information; creating, by the processor, a remote access credential using the second authentication information and a salt, the salt representing random data used to safeguard passwords in storage; and transmitting, by the processor, the remote access credential to the first electronic device, wherein the first electronic device follows the transmitted instruction responsive to the first electronic device determining that the remote access credential is valid. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory, computer-readable storage medium having stored thereon a plurality of instructions, which, when executed by a processor of a server, cause the server to perform actions comprising:
-
receiving event information regarding an event at a first electronic device; determining the event from the event information; determining that the event indicates the first electronic device is lost or stolen by; comparing the event against a set of events indicative of the first electronic device being lost or stolen, and determining that the event is one of the set of events indicative of the first electronic being lost or stolen; transmitting an instruction to the first electronic device representing a request to enter a lost or stolen mode responsive to determining that the event is indicative of the first electronic device being lost or stolen; receiving, from a second electronic device, second authentication information; determining, using verification information received from the first electronic device, that the second authentication information matches first authentication information provided to the first electronic device; responsive to determining that the second authentication information matches the first authentication information; creating a remote access credential using the second authentication information and a salt, the salt representing random data used to safeguard passwords in storage; and transmitting the remote access credential to the first electronic device, wherein the first electronic device follows the transmitted instruction responsive to the first electronic device determining that the remote access credential is valid. - View Dependent Claims (16, 17)
-
-
18. A system, comprising a server with a network interface and at least one processor and memory and instructions that when executed by the at least one processor cause the server to perform actions comprising:
-
receiving event information regarding an event at a first electronic device; determining the event from the event information; determining that the event indicates the first electronic device is lost or stolen by; comparing the event against a set of events indicative of the first electronic device being lost or stolen, and determining that the event is one of the set of events indicative of the first electronic being lost or stolen; transmitting an instruction to the first electronic device representing a request to enter a lost or stolen mode responsive to determining that the event is indicative of the first electronic device being lost or stolen; receiving, from a second electronic device, second authentication information; determining, using verification information received from the first electronic device, that the second authentication information matches first authentication information provided to the first electronic device; responsive to determining that the second authentication information matches the first authentication information; creating a remote access credential using the second authentication information and a salt, the salt representing random data used to safeguard passwords in storage; and transmitting the remote access credential to the first electronic device, wherein the first electronic device follows the transmitted instruction responsive to the first electronic device determining that the remote access credential is valid. - View Dependent Claims (19, 20)
-
Specification