SYSTEM AND METHOD FOR REMOTELY INITIATING LOST MODE ON A COMPUTING DEVICE
First Claim
1. A computer implemented method, comprising:
- receiving at a lost computing device, by a processor, an authorized command that lost mode be initiated on the lost computing device, wherein the authorized command includes contact information associated with a requesting user; and
initiating, by the processor, lost mode on the lost computing device upon receiving the authorized command, wherein initiating lost mode comprises;
locking, by the processor, the lost computing device;
suppressing, by the processor, select functionality of the lost computing device;
displaying, by the processor, the contact information on the lost computing device; and
contacting, by the processor, the requesting user based on the contact information associated with the requesting user.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for remotely initiating lost mode on a computing device. A request that lost mode be initiated can include a message and contact information provided by the requesting user. Once authenticated, a command to initiate lost mode is sent to the lost device. Initiating lost mode includes locking the lost device and suppressing select functionality. The message and contact information are displayed and the lost device is enabled to contact the requesting user using the contact information. The lost device can also collect and transmit location data to the requesting user. The location data can be presented on a map indicating the lost devices location and the time the lost device was at the location. The location data can be scheduled to be resent to the user based on numerous factors such as a set schedule, rules or heuristic
-
Citations
26 Claims
-
1. A computer implemented method, comprising:
-
receiving at a lost computing device, by a processor, an authorized command that lost mode be initiated on the lost computing device, wherein the authorized command includes contact information associated with a requesting user; and initiating, by the processor, lost mode on the lost computing device upon receiving the authorized command, wherein initiating lost mode comprises; locking, by the processor, the lost computing device; suppressing, by the processor, select functionality of the lost computing device; displaying, by the processor, the contact information on the lost computing device; and contacting, by the processor, the requesting user based on the contact information associated with the requesting user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system, comprising:
-
a processor; and memory containing instructions that, when executed, cause the processor to; receive at a lost computing device an authorized command that lost mode be initiated on the lost computing device, wherein the authorized command includes contact information associated with a requesting user; and initiate lost mode on the lost computing device upon receiving the authorized command, wherein initiating lost mode comprises; locking the lost computing device; suppressing select functionality of the lost computing device; displaying the contact information on the lost computing device; and contacting the requesting user based on the contact information associated with the requesting user. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable medium containing instructions that, when executed by a computing device, cause the computing device to:
-
receive at a lost computing device an authorized command that lost mode be initiated on the lost computing device, wherein the authorized command includes contact information associated with a requesting user; and initiate lost mode on the lost computing device upon receiving the authorized command, wherein initiating lost mode comprises; locking the lost computing device; suppressing select functionality of the lost computing device; displaying the contact information on the lost computing device; and contacting the requesting user based on the contact information associated with the requesting user. - View Dependent Claims (21, 22, 23, 24, 25, 26)
-
Specification