OVER THE AIR SERVICES FOR MOBILE DEVICES
7 Assignments
0 Petitions
Accused Products
Abstract
A client device may be managed in the event of, for example, device loss or mislocation. In such a case, a user can effectively cause a restriction command to be generated, where the restriction command is wirelessly transmitted to the client device. The restriction command can be specified to either lock user data on the client device or erase user data on the client device.
215 Citations
53 Claims
-
1-33. -33. (canceled)
-
34. A mobile computing device comprising:
-
a memory configured to store user data; and at least one module configured to wirelessly receive a command from a server, and erase at least a portion of the user data stored in the memory of the mobile computing device in response to receiving the command; wherein the user data comprises at least one of calendar data, e-mail data, and contact data. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41)
-
-
42. A system comprising:
at least one server configured to; receive an input from a user indicating a user request to erase data stored in the memory of a mobile computing device; and in response to the input, wirelessly transmit a first instruction to the mobile computing device, the first instruction configured to cause the mobile computing device to attempt a backup of the data stored in the memory of the mobile computing device; and wirelessly transmit a second instruction to the mobile computing device, the second instruction configured to cause the mobile computing device to erase the user data stored in the memory of the mobile computing device. - View Dependent Claims (43, 44, 45, 46, 47)
-
48. A method comprising:
-
receiving a first input from a user at a server; authenticating the user at the server based on the first input; receiving a second input from the user at the server; and based on receiving the second input from the user, sending a wireless communication from the server to a mobile computing device, the wireless communication comprising at least one of a first instruction configured to cause the mobile computing device to restrict access to the mobile computing device and a second instruction configured to cause the mobile computing device to erase data stored in a memory of the mobile computing device. - View Dependent Claims (49, 50, 51, 52, 53)
-
Specification