DEVICE LOCATOR DISABLE AUTHENTICATION
First Claim
1. A method comprising:
- activating a mobile device with a server, wherein activating the mobile device includes transmitting a hardware identifier from the mobile device to the server;
associating, by the mobile device, a cloud-based user account with the mobile device, wherein associating the user account with the mobile device includes transmitting user account information to the server, the user account information including a user account identifier and user authentication data;
enabling, by the mobile device, a device locator mode on the mobile device, wherein the device locator mode enables the mobile device to be located by a requesting user device;
after the device locator mode has been enabled, receiving, by the mobile device, a user input on the mobile device to disable the device locator mode;
presenting, by the mobile device, a challenge to a user of the mobile device for user authentication data; and
receiving, via a user interface of the mobile device, a challenge response from the user; and
disabling the device locator mode when the challenge response is valid.
2 Assignments
0 Petitions
Accused Products
Abstract
A device locator mode or find my device (FMD) mode can allow a lost, stolen, or misplaced mobile device to be located. The FMD mode can be enabled or disabled on a mobile device. Sometimes thieves or unauthorized parties attempt to disable the FMD mode. To prevent this, the mobile device can transmit a unique device identifier to a remote server. The remote server can link the device identifier to a cloud-based user account associated with the user of the mobile device. Before an FMD mode is disabled on the mobile device, before the content or settings can be erased, and/or before a mobile device is permitted to be activated/reactivated, a user of the mobile device can be challenged for the credentials of the cloud-based user account. If valid credentials are provided, FMD can be disabled, the content or settings can be reset, and/or the device can be activated/reactivated.
-
Citations
20 Claims
-
1. A method comprising:
-
activating a mobile device with a server, wherein activating the mobile device includes transmitting a hardware identifier from the mobile device to the server; associating, by the mobile device, a cloud-based user account with the mobile device, wherein associating the user account with the mobile device includes transmitting user account information to the server, the user account information including a user account identifier and user authentication data; enabling, by the mobile device, a device locator mode on the mobile device, wherein the device locator mode enables the mobile device to be located by a requesting user device; after the device locator mode has been enabled, receiving, by the mobile device, a user input on the mobile device to disable the device locator mode; presenting, by the mobile device, a challenge to a user of the mobile device for user authentication data; and receiving, via a user interface of the mobile device, a challenge response from the user; and disabling the device locator mode when the challenge response is valid. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable medium comprising code that, when executed by a processor, causes a device to perform a method including:
-
activating a mobile device with a server, wherein activating the mobile device includes transmitting a hardware identifier from the mobile device to the server; associating a cloud-based user account with the mobile device; enabling a device locator mode on the mobile device, wherein the device locator mode enables the mobile device to be located by a requesting user device; after the device locator mode has been enabled, receiving a user input on the mobile device to disable the device locator mode; presenting a challenge to a user of the mobile device for user authentication data; and receiving a challenge response from the user; and disabling the device locator mode when the challenge response is valid. - View Dependent Claims (10, 11, 12)
-
-
13. A method comprising:
-
receiving, by a server, a hardware identifier for a mobile device and cloud-based user account identifier from the mobile device, wherein the user account identifier is associated with user authentication data; associating, by the server, the hardware identifier with the user account identifier; storing, in a database coupled to the server, the associated hardware identifier and user account identifier; after a device locator mode has been enabled on the mobile device, receiving, by the server, the hardware identifier from the mobile device; determining, with the server, whether the hardware identifier has been previously associated with the user account identifier; and when the hardware identifier has been previously associated with the user account identifier, initiating, by the server, a challenge to the mobile device, wherein the challenge includes a request for the user authentication data; transmitting, with the server, an instruction to disable the device locator mode to the mobile device, when a challenge response is valid, wherein the challenge response is input by a user of the mobile device. - View Dependent Claims (14, 15, 16)
-
-
17. A non-transitory computer-readable medium comprising code that, when executed by a processor, causes a device to perform a method including:
-
receiving a hardware identifier for a mobile device and a cloud-based user account identifier, wherein the user account identifier is associated with user authentication data; associating the hardware identifier with the user account identifier; storing the associated hardware identifier and user account identifier; after a device locator mode has been enabled on the mobile device, receiving the hardware identifier from the mobile device; determining whether the hardware identifier has been previously associated with the user account identifier; when the hardware identifier has been previously associated with the user account identifier, initiating a challenge to a user including a request for the user authentication data; and generating an instruction to disable the device locator mode to the mobile device, when a challenge response is valid, wherein the challenge response is input by a user of the mobile device. - View Dependent Claims (18, 19, 20)
-
Specification