OVER-THE-AIR DEVICE KILL PILL AND LOCK
First Claim
Patent Images
1. A system, comprising:
- an instruction interface configured to receive an instruction from a user to restrict access to user data stored on a mobile computing device; and
a transmission interface configured to wirelessly transmit a computing command executable by the mobile computing device, wherein the computing command is generated in response to the instruction to restrict access to the user data.
9 Assignments
0 Petitions
Accused Products
Abstract
A client device may be managed in the event of, for example, device loss or mislocation. In such a case, a user can effectively cause a restriction command to be generated, where the restriction command is wirelessly transmitted to the client device. The restriction command can be specified to either lock user data on the client device or erase user data on the client device.
265 Citations
33 Claims
-
1. A system, comprising:
-
an instruction interface configured to receive an instruction from a user to restrict access to user data stored on a mobile computing device; and a transmission interface configured to wirelessly transmit a computing command executable by the mobile computing device, wherein the computing command is generated in response to the instruction to restrict access to the user data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of managing a client device, comprising:
-
receiving an instruction from a user to restrict access to user data stored on the client device; authenticating the user; in response to successful authentication, generating a restriction command corresponding to the received instruction; and wirelessly transmitting the restriction command for execution by the client device. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A mobile computing device, comprising:
-
a first module configured to wirelessly receive a first command and further configured to, in response to receiving the first command, locking user data on the mobile computing device from being accessible using the mobile computing device; and a second module configured to wirelessly receive a second command and further configured to, in response to receiving the second command, erasing user data on the mobile computing device. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33)
-
Specification