DEVICE MONITORING USING MULTIPLE SERVERS OPTIMIZED FOR DIFFERENT TYPES OF COMMUNICATIONS
First Claim
1. A monitoring system for monitoring electronic devices, the system comprising:
- a first server that is configured to communicate with the electronic devices according to a first protocol, said first server configured to transmit security instructions to electronic devices that are reported as lost or stolen, including security instructions that protect data stored on the electronic devices; and
a second server that is configured to communicate relatively frequently with the electronic devices according to a second protocol, said second server configured to instruct an electronic device that is reported as lost or stolen to contact the first server, such that the electronic device can retrieve a security instruction from the first server,wherein the second protocol is optimized for relatively short, low data transfer communications in comparison with the first protocol.
2 Assignments
0 Petitions
Accused Products
Abstract
An electronic device monitoring system uses two different types of servers to communicate with electronic devices of users. One type of server, which may be a rapid contact server, is optimized or configured for relatively short and frequent communications with the electronic devices. The other type of server is optimized or configured for less frequent but (typically) longer communications with the electronic devices. In some embodiments, the electronic devices are configured to communicate relatively frequently (e.g., every few minutes) with the rapid contact server. When an electronic device is reported as lost or stolen, the rapid contact server may instruct the electronic device to contact the other type of server to obtain security-related instructions.
8 Citations
31 Claims
-
1. A monitoring system for monitoring electronic devices, the system comprising:
-
a first server that is configured to communicate with the electronic devices according to a first protocol, said first server configured to transmit security instructions to electronic devices that are reported as lost or stolen, including security instructions that protect data stored on the electronic devices; and a second server that is configured to communicate relatively frequently with the electronic devices according to a second protocol, said second server configured to instruct an electronic device that is reported as lost or stolen to contact the first server, such that the electronic device can retrieve a security instruction from the first server, wherein the second protocol is optimized for relatively short, low data transfer communications in comparison with the first protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A non-transitory computer readable medium that stores an executable agent, said executable agent comprising instructions that direct an electronic device to perform a process that comprises:
-
communicating with a first server of a monitoring system according to a first protocol, and with a second server of the monitoring system according to a second protocol, wherein the second protocol is optimized for short communications relative to the first protocol; receiving, from the second server, in a session based on the second protocol, an instruction to contact the first server; in response to the instruction, initiating a communication session with the first server according to the first protocol, wherein the electronic device receives a security instruction from the first server during the communication session, said security instruction specifying a security action associated with a theft or loss of the electronic device; and executing the security instruction. - View Dependent Claims (25, 26)
-
-
27. A method for monitoring electronic devices comprising the steps of:
-
receiving in a first server a notification that an electronic device has an awaiting security instruction; receiving in a second server a notification that the electronic device should contact the first server; receiving in the second server a single packet from the electronic device comprising an identification of the electronic device; confirming that the identification is flagged to contact the first server; establishing a short session between the second server and the electronic device during which the second server instructs the electronic device to contact the first server; and establishing a long session between the first server and the electronic device during which the first server communicates the security instruction to the electronic device. - View Dependent Claims (28, 29, 30, 31)
-
Specification