BYPASSING SECURITY AUTHENTICATION SCHEME ON A LOST DEVICE TO RETURN THE DEVICE TO THE OWNER
First Claim
Patent Images
1. A method for bypassing device security protections to communicate with a contact of a secure device, the method comprising:
- displaying a selectable user interface (UI) object on the device enabling a user to bypass the security protections of the device; and
upon receiving a selection of the UI object, initiating a communication to a contact that is preselected from a list of contacts.
1 Assignment
0 Petitions
Accused Products
Abstract
Some embodiments provide a method for bypassing device security protections to communicate with a contact of a secure device. The method displays a selectable user interface object on the device enabling a user to bypass the security protections of the device. Upon receiving a selection of the user interface object, the method initiates a communication to a contact that is preselected from a list of contacts.
42 Citations
20 Claims
-
1. A method for bypassing device security protections to communicate with a contact of a secure device, the method comprising:
-
displaying a selectable user interface (UI) object on the device enabling a user to bypass the security protections of the device; and upon receiving a selection of the UI object, initiating a communication to a contact that is preselected from a list of contacts. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 15, 16, 17)
-
-
11. A machine readable medium storing a program for execution by at least one processing unit, the program for bypassing device security protections to communicate with a contact of a secure device, the computer program comprising sets of instructions for:
-
displaying a selectable user interface (UI) item on the device for enabling a user to bypass the security protections of the device; upon receiving a selection of the UI item, initiating a communication to a contact that is preselected from a list of contacts. - View Dependent Claims (12, 13, 14)
-
-
18. A device comprising:
-
a set of processing units; and a memory storing program for execution by at least one of the processing units, the program for providing a graphical user interface (GUI) for bypassing device security protections to communicate with a contact of the device, the GUI comprising; a display area for displaying UI objects; and a selectable UI object for enabling a user to initiate a communication with a contact of the device by bypassing the security protections of the device. - View Dependent Claims (19, 20)
-
Specification