Over-the-air device kill pill and lock
First Claim
Patent Images
1. A system, comprising:
- an instruction interface configured to receive an instruction from a user to restrict access to user data stored on a mobile computing device; and
a transmission interface configured to wirelessly transmit a computing command executable by the mobile computing device, wherein the computing command is generated in response to the instruction to restrict access to the user data, wherein execution of the computing command results in the mobile computing device erasing the user data on the mobile computing device.
9 Assignments
0 Petitions
Accused Products
Abstract
A client device may be managed in the event of, for example, device loss or mislocation. In such a case, a user can effectively cause a restriction command to be generated, where the restriction command is wirelessly transmitted to the client device. The restriction command can be specified to either lock user data on the client device or erase user data on the client device.
115 Citations
31 Claims
-
1. A system, comprising:
-
an instruction interface configured to receive an instruction from a user to restrict access to user data stored on a mobile computing device; and a transmission interface configured to wirelessly transmit a computing command executable by the mobile computing device, wherein the computing command is generated in response to the instruction to restrict access to the user data, wherein execution of the computing command results in the mobile computing device erasing the user data on the mobile computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of managing a client device, comprising:
-
receiving an instruction from a user to restrict access to user data stored on the client device; authenticating the user; in response to successful authentication, generating a restriction command corresponding to the received instruction; wirelessly transmitting the restriction command for execution by the client device; and allowing a phone functionality of the client device to be accessible after the restriction of the accessibility to the user data. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A mobile computing device, comprising:
-
a first module configured to wirelessly receive a first command and further configured to, in response to receiving the first command, locking user data on the mobile computing device from being accessible using the mobile computing device; and a second module configured to wirelessly receive a second command and further configured to, in response to receiving the second command, erasing user data on the mobile computing device. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31)
-
Specification