×

Remote locking a multi-user device to a set of users

  • US 10,652,249 B2
  • Filed: 10/31/2017
  • Issued: 05/12/2020
  • Est. Priority Date: 10/31/2017
  • Status: Active Grant
First Claim
Patent Images

1. A computer device, comprising:

  • memory configured to store data and instructions;

    at least one processor configured to communicate with the memory; and

    an operating system configured to communicate with the memory and the at least one processor, wherein the operating system is configured to;

    receive a lost device message including a device identifier identifying the computer device and an authorized user list including at least one user identification that identifies a user authorized to access the computer device in a lost state;

    receive a customized lock screen message to present on the computer device;

    log out existing users on the computer device and invalidate credentials of the existing users on the computer device based at least on receiving the lost device message;

    activate a lock screen including presenting the customized lock screen message on the computer device and set the computer device to the lost state;

    initiate a log on manager that is configured to recognize the lost state and to restrict access to the computer device to users included in the authorized user list;

    receive, at the log on manager, at least one log on attempt from a user utilizing a user identification and a password;

    perform, at the computer device, a first comparison of the received user identification with the at least one user identification included in the authorized user list to generate a first authentication of the received user identification when a match occurs between the received user identification and the at least one user identification included in the authorized user list;

    transmit the received user identification and the password when the first authentication occurs to perform a second comparison of the received user identification and the password with stored credentials on a network based server for a second authentication of the received user identification and the password; and

    grant access to the computer device based at least on the first authentication and the second authentication.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×