MOBILE DEVICE SECURITY SYSTEMS AND METHODS
First Claim
Patent Images
1. A method for securing a mobile device, comprising:
- providing software for installation on the mobile device, the software being configured for disabling at least some functionality of the device;
storing a mobile device identifier identifying the mobile device;
determining an unlock code for unlocking the mobile device;
receiving a notification of sale of the mobile device; and
providing the unlock code.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for securing a mobile device may include providing software for installation on the mobile device where the software is configured for disabling at least some functionality of the device, storing a mobile device identifier identifying the mobile device, and determining an unlock code for unlocking the mobile device, receiving a notification of sale of the mobile device, and providing the unlock code. Systems and methods for receiving and verifying the unlock code are also described.
-
Citations
20 Claims
-
1. A method for securing a mobile device, comprising:
-
providing software for installation on the mobile device, the software being configured for disabling at least some functionality of the device; storing a mobile device identifier identifying the mobile device; determining an unlock code for unlocking the mobile device; receiving a notification of sale of the mobile device; and providing the unlock code. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for executing preloaded software by a processor at the time of startup of a mobile device, the method comprising:
-
disabling an input function disabling a storage function; disabling a communication function; preventing modification to the preloaded software; selectively enabling internal software services; read unique device identification information; store an unlock code through a secure algorithm; prevent normal startup of the operating system on the mobile device; and prepare the device for user interaction. - View Dependent Claims (9, 10, 11)
-
-
12. A system for implementing secure merchandising of mobile products, the method comprising:
-
a database storing a plurality of mobile product identifiers for respective mobile products; a database of verification information relating to the mobile products and status to; report status of sale of mobile device; report status of shipping confirmation; report status of disposition; report status of display; a processor configured for unlocking the mobile products by; determining an unlock code for unlocking the mobile device; providing the unlock code; receiving the unlock code; and verifying the unlock code. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A secure mobile device, comprising:
-
a mobile device readable storage medium configured for storing information; a processor configured for accessing the mobile device readable storage medium and performing processes based on the information; a bootloader stored on the mobile device readable storage medium, operable by the processor, and configured to control startup operations; an operating system stored on the mobile device readable storage medium and operable by the processor; a lockdown module stored on the mobile device readable storage medium, operable by the processor, and configured to restrict operation of the mobile device unless the device is verified as available for use, the lockdown module configured to; run at the time of startup of the mobile device and in conjunction with the operating system; operate in conjunction with a bootloader module of the mobile device; disable input functions to limit modification of the mobile device readable storage medium during startup; facilitate unlocking of the mobile device upon successful authentication; and provide user instructions and notifications. - View Dependent Claims (18, 19, 20)
-
Specification