Systems and methods for identifying unauthorized users of an electronic device
First Claim
1. A method for identifying an unauthorized user of an electronic device, the method comprising, at the electronic device, and in response to identifying that at least one condition is satisfied:
- collecting a first set of data associated with a current usage identity, wherein the first set of data includes at least one image of a current user of the electronic device;
obtaining a second set of data associated with an authorized usage identity, wherein the second set of data includes information that is associated with at least one image of an authorized user of the electronic device; and
determining, based on comparing the first and second sets of data, that a potential unauthorized usage of the electronic device is occurring; and
in response to determining that the electronic device is communicably coupled to a host device;
gathering information associated with the host device, andcommunicating, to at least one computing device associated with the authorized usage entity, a notification that indicates an unauthorized usage of the electronic device, wherein the notification at least includes the information associated with the host device.
0 Assignments
0 Petitions
Accused Products
Abstract
This is generally directed to identifying unauthorized users of an electronic device. In some embodiments, an unauthorized user of the electronic device can be detected by identifying particular activities that may indicate suspicious behavior. In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identity of the owner of the electronic device. When an unauthorized user is detected, various safety measures can be taken. For example, information related to the identity of the unauthorized user, the unauthorized user'"'"'s operation of the electronic device, or the current location of the electronic device can be gathered. As another example, functions of the electronic device can be restricted. In some embodiments, the owner of the electronic device can be notified of the unauthorized user by sending an alert notification through any suitable medium, such as, for example, a voice mail, e-mail, or text message.
31 Citations
20 Claims
-
1. A method for identifying an unauthorized user of an electronic device, the method comprising, at the electronic device, and in response to identifying that at least one condition is satisfied:
-
collecting a first set of data associated with a current usage identity, wherein the first set of data includes at least one image of a current user of the electronic device; obtaining a second set of data associated with an authorized usage identity, wherein the second set of data includes information that is associated with at least one image of an authorized user of the electronic device; and determining, based on comparing the first and second sets of data, that a potential unauthorized usage of the electronic device is occurring; and in response to determining that the electronic device is communicably coupled to a host device; gathering information associated with the host device, and communicating, to at least one computing device associated with the authorized usage entity, a notification that indicates an unauthorized usage of the electronic device, wherein the notification at least includes the information associated with the host device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. At least one non-transitory computer readable storage medium configured to store instructions that, when executed by at least one processor included in an electronic device, cause the electronic device to identify an unauthorized user of the electronic device, by carrying out steps that include, in response to identifying that at least one condition is satisfied:
-
collecting a first set of data associated with a current usage identity, wherein the first set of data includes at least one image of a current user of the electronic device; obtaining a second set of data associated with an authorized usage identity, wherein the second set of data includes information that is associated with at least one image of an authorized user of the electronic device; and determining, based on comparing the first and second sets of data, that a potential unauthorized usage of the electronic device is occurring; and in response to determining that the electronic device is communicably coupled to a host device; gathering information associated with the host device, and communicating, to at least one computing device associated with the authorized usage entity, a notification that indicates an unauthorized usage of the electronic device, wherein the notification at least includes the information associated with the host device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An electronic device configured to identify an unauthorized user of the electronic device, the electronic device comprising:
-
at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the electronic device to perform steps that include, in response to identifying that at least one condition is satisfied; collecting a first set of data associated with a current usage identity, wherein the first set of data includes at least one image of a current user of the electronic device; obtaining a second set of data associated with an authorized usage identity, wherein the second set of data includes information that is associated with at least one image of an authorized user of the electronic device; and determining, based on comparing the first and second sets of data, that a potential unauthorized usage of the electronic device is occurring; and in response to determining that the electronic device is communicably coupled to a host device; gathering information associated with the host device, and communicating, to at least one computing device associated with the authorized usage entity, a notification that indicates an unauthorized usage of the electronic device, wherein the notification at least includes the information associated with the host device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification