SYSTEMS AND METHODS FOR IDENTIFYING UNAUTHORIZED USERS OF AN ELECTRONIC DEVICE
First Claim
1. A method for identifying an unauthorized user of an electronic device, the method comprising:
- determining that a current user of the electronic device is an unauthorized user;
gathering information related to the unauthorized user'"'"'s operation of the electronic device in response to determining, wherein the unauthorized user'"'"'s operation comprises operations not related to the authentication; and
transmitting an alert notification to a responsible party in response to gathering.
1 Assignment
0 Petitions
Accused Products
Abstract
This is generally directed to identifying unauthorized users of an electronic device. In some embodiments, an unauthorized user of the electronic device can be detected by identifying particular activities that may indicate suspicious behavior. In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identity of the owner of the electronic device. When an unauthorized user is detected, various safety measures can be taken. For example, information related to the identity of the unauthorized user, the unauthorized user'"'"'s operation of the electronic device, or the current location of the electronic device can be gathered. As another example, functions of the electronic device can be restricted. In some embodiments, the owner of the electronic device can be notified of the unauthorized user by sending an alert notification through any suitable medium, such as, for example, a voice mail, e-mail, or text message.
133 Citations
21 Claims
-
1. A method for identifying an unauthorized user of an electronic device, the method comprising:
-
determining that a current user of the electronic device is an unauthorized user; gathering information related to the unauthorized user'"'"'s operation of the electronic device in response to determining, wherein the unauthorized user'"'"'s operation comprises operations not related to the authentication; and transmitting an alert notification to a responsible party in response to gathering. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An electronic device operable to detect an unauthorized user of an electronic device, the electronic device comprising:
-
a processor operable to; receive an input from a current user of the electronic device; determine the input is not associated with an authorized user of the electronic device; and record usage information of the electronic device in response to determining; and communications circuitry operable to transmit the usage information to a remote device. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A system comprising:
an electronic device comprising; an input device operable to receive a password provided by a user; a camera operable to take a photograph of the user; a processor operable to; determine that a predetermined number of incorrect passwords have been successively received; direct the camera to take a photograph of the user; and generate an alert notification in response to the processor determining, wherein the alert notification comprises information related to the identity of the user and the photograph of the user; and communications circuitry operable to transmit the alert notification to a remote device. - View Dependent Claims (18, 19)
-
20. Machine-readable media for identifying unauthorized users of an electronic device, comprising machine-readable instructions recorded thereon for:
-
determining that a current user of the electronic device is an unauthorized user; gathering information related to the unauthorized user'"'"'s operation of the electronic device in response to determining, wherein the unauthorized user'"'"'s operation comprises operations not related to authentication; and transmitting an alert notification to a responsible party in response to gathering. - View Dependent Claims (21)
-
Specification