SYSTEMS AND METHODS FOR IDENTIFYING UNAUTHORIZED USERS OF AN ELECTRONIC DEVICE
0 Assignments
0 Petitions
Accused Products
Abstract
This is generally directed to identifying unauthorized users of an electronic device. In some embodiments, an unauthorized user of the electronic device can be detected by identifying particular activities that may indicate suspicious behavior. In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identity of the owner of the electronic device. When an unauthorized user is detected, various safety measures can be taken. For example, information related to the identity of the unauthorized user, the unauthorized user'"'"'s operation of the electronic device, or the current location of the electronic device can be gathered. As another example, functions of the electronic device can be restricted. In some embodiments, the owner of the electronic device can be notified of the unauthorized user by sending an alert notification through any suitable medium, such as, for example, a voice mail, e-mail, or text message.
-
Citations
21 Claims
-
1. (canceled)
-
2. A method for denying unauthorized usage of an electronic device, the method comprising:
by the electronic device; collecting at least one current usage identity; comparing the current usage identity to at least one authorized usage identity associated with an authorized user profile; determining an unauthorized usage of the electronic device when the current usage identity does not match the authorized usage identity; and denying access to one or more functions provided by the electronic device when it is determined that there is an unauthorized usage of the electronic device. - View Dependent Claims (3, 4, 5, 6, 7, 8)
-
9. A non-transitory computer readable medium storing instructions that, when executed by a processor included in a computing device, cause the computing device to carry out steps that include:
-
receiving a first input to perform a requested function on the computing device; determining whether the requested function matches one or more authorized user functions associated with an authorized user profile; and when the requested function does not match the authorized user functions; denying access, by the computing device, to the requested function. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computing device configured for denying unauthorized usage of a computing device, the computing device comprising:
-
a memory; and a processor configured to cause the computing device to carry out steps that include; collecting at least one current usage identity; comparing the at least one current usage identity to at least one authorized usage identity associated with an authorized user profile; determining an unauthorized usage of the computing device when the at least one current usage identity does not match the at least one authorized usage identity; and denying access to one or more functions provided by the computing device. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification