LOCATION DEPENDENT MONITORING FOR STOLEN DEVICES
First Claim
1. A system capable of controlling surveillance conducted by electronic devices, the system comprising:
- a computer data repository containing data that specifies, for each of a plurality of geographic regions, a set of surveillance methods that are permissible in the respective region, wherein at least some of the geographic regions have different respective sets of permissible surveillance methods than others; and
a computer system that is operable to communicate with the devices over a computer network, said computer system programmed to use received information regarding a location of a potentially lost or stolen device, in combination with said data in the computer data repository, to cause the potentially lost or stolen device to initiate surveillance according to the set of permissible surveillance methods corresponding to said location.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for controlling the surveillance conducted by lost or stolen electronic devices dependent upon the location of such electronic devices is provided. A data repository contains data that specifies, for each of a plurality of geographic regions (e.g. legal jurisdictions), a set of surveillance methods that are permissible in the respective region. At least some of the geographic regions have different respective sets of permissible surveillance methods than others. A computer system is operable to communicate with the devices over a computer network, and programmed to use received information regarding a location of a potentially lost or stolen device, in combination with the data in the computer data repository, to cause the potentially lost or stolen device to initiate surveillance according to the set of permissible surveillance methods (and/or other actions) corresponding to the location.
39 Citations
9 Claims
-
1. A system capable of controlling surveillance conducted by electronic devices, the system comprising:
-
a computer data repository containing data that specifies, for each of a plurality of geographic regions, a set of surveillance methods that are permissible in the respective region, wherein at least some of the geographic regions have different respective sets of permissible surveillance methods than others; and a computer system that is operable to communicate with the devices over a computer network, said computer system programmed to use received information regarding a location of a potentially lost or stolen device, in combination with said data in the computer data repository, to cause the potentially lost or stolen device to initiate surveillance according to the set of permissible surveillance methods corresponding to said location. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for controlling surveillance conducted by a lost or stolen electronic device comprising the steps of:
-
a. maintaining a computer repository containing data that specifies, for each of a plurality of geographic regions, a set of surveillance methods that are permissible in the respective region, wherein at least some of the geographic regions have different respective sets of permissible surveillance methods than others; b. communicating with said device over a computer network to obtain location information regarding the geographic region in which said device is located; c. comparing said location information with said data to determine which set of surveillance methods are permissible in the geographic region in which said device is located; and d. initiating surveillance according to the set of permissible monitoring methods corresponding to said geographic region, wherein steps a, b, c and d are preformed automatically by one or more computing devices. - View Dependent Claims (9)
-
Specification