BYPASSING SECURITY AUTHENTICATION SCHEME ON A LOST DEVICE TO RETURN THE DEVICE TO THE OWNER
0 Assignments
0 Petitions
Accused Products
Abstract
Some embodiments provide a method for bypassing device security protections to communicate with a contact of a secure device. The method displays a selectable user interface object on the device enabling a user to bypass the security protections of the device. Upon receiving a selection of the user interface object, the method initiates a communication to a contact that is preselected from a list of contacts.
0 Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A method for bypassing device security protections to communicate with a privileged contact of a secure device, the method comprising:
-
displaying, while the device is in a locked mode in which a plurality of services are unavailable on the device, a selectable user interface (UI) item on the device for enabling a person to operate the device to communicate with a privileged contact while the device is in the locked mode; upon the selection of the UI item, displaying a list of privileged contacts while the device is in the locked mode, wherein the list of privileged contacts includes an owner of the device; and initiating a communication with a privileged contact selected from a list of privileged contacts. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. A non-transitory machine readable medium storing a program which when executed by at least one processing unit of a secure device bypasses device security protections to communicate with a privileged contact of the device, the program comprising sets of instructions for:
-
displaying, while the device is in a locked mode in which a plurality of services are unavailable on the device, a selectable user interface (UI) item on the device for enabling a person to operate the device to communicate with a privileged contact while the device is in the locked mode; upon the selection of the UI item, displaying a list of privileged contacts while the device is in the locked mode, wherein the list of privileged contacts includes an owner of the device; and initiating a communication with a privileged contact selected from a list of privileged contacts. - View Dependent Claims (29, 30, 31, 32, 33)
-
-
34. An electronic device comprising:
-
a set of processing units; and a non-transitory machine readable medium storing a program which when executed by at least one processing unit of a secure device bypasses device security protections to communicate with a privileged contact of the device, the program comprising sets of instructions for; displaying, while the device is in a locked mode in which a plurality of services are unavailable on the device, a selectable user interface (UI) item on the device for enabling a person to operate the device to communicate with a privileged contact while the device is in the locked mode; upon the selection of the UI item, displaying a list of privileged contacts while the device is in the locked mode, wherein the list of privileged contacts includes an owner of the device; and initiating a communication with a privileged contact selected from a list of privileged contacts. - View Dependent Claims (35, 36, 37, 38, 39, 40)
-
Specification