Locating a wireless device
First Claim
1. A method for locating a lost wireless device, comprising:
- finding by a first person having a first wireless device, the lost wireless device belonging to a second person, wherein the first wireless device and the lost wireless device each comprise a same discoverable wireless protocol;
entering by the first person, a lost key code on the lost wireless device;
establishing by the lost wireless device in response to the lost key code, a connection between the lost wireless device and the first wireless device;
accessing by the first person, data stored on the first wireless device;
selecting by the first person, specified data from the data stored on the first wireless device;
receiving by the lost wireless device, the specified data from the first wireless device; and
sending by the lost wireless device, the specified data to a communication device so that the second person can retrieve the specified data through the communication device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for locating and contacting an owner of a lost wireless device. A first person having a first wireless device finds a lost wireless device belonging to a second person. The first wireless device and the lost wireless device each comprise a same discoverable wireless protocol. The first person enters a lost key code on the lost wireless device. The lost wireless device establishes, a connection between the lost wireless device and the first wireless device. The first person accesses data stored on the first wireless device. The first person selects specified data from the data stored on the first wireless device. The first person downloads to the lost wireless device, the specified data from the first wireless device and sends the specified data to a communication device so that the second person may retrieve the specified data through the communication device.
28 Citations
20 Claims
-
1. A method for locating a lost wireless device, comprising:
-
finding by a first person having a first wireless device, the lost wireless device belonging to a second person, wherein the first wireless device and the lost wireless device each comprise a same discoverable wireless protocol;
entering by the first person, a lost key code on the lost wireless device;
establishing by the lost wireless device in response to the lost key code, a connection between the lost wireless device and the first wireless device;
accessing by the first person, data stored on the first wireless device;
selecting by the first person, specified data from the data stored on the first wireless device;
receiving by the lost wireless device, the specified data from the first wireless device; and
sending by the lost wireless device, the specified data to a communication device so that the second person can retrieve the specified data through the communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for locating a lost wireless device, comprising:
-
finding by a first person, the lost wireless device belonging to a second person;
entering by the first person, a lost key code on the lost wireless device;
establishing by the lost wireless device in response to the lost key code, a connection between the lost wireless device and a communication device belonging to the second person; and
relaying information by the first person using the lost wireless device, to the second person using the communication device. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A method for locating a lost wireless device, comprising:
-
finding by a first person, the lost wireless device belonging to a second person;
entering by the first person, a lost key code on the lost wireless device;
manually entering by the first person, personal data into the lost wireless device;
establishing by the lost wireless device, a connection between the lost wireless device and a communication device belonging to the second person;
sending by the lost wireless device, the personal data to the second person; and
retrieving by the second person, the personal data through the communication device. - View Dependent Claims (18, 19, 20)
-
Specification