Electronic device communication system and method
First Claim
Patent Images
1. A method for providing security for an electronic device, the method comprising:
- transmitting a message from a local application in a client device to a remote application in a server device;
receiving an encrypted message at the local application from the remote application, wherein the encrypted message indicates whether the client device has been reported stolen;
in response to receiving the encrypted message from the remote application, decoding the encrypted message into a decoded message, wherein the operation of decoding the encrypted message comprises converting the encrypted message from an American Standard Code of Information Interchange (ASCII) text format into a binary format;
using an encryption/decryption module in the client device to decrypt the decoded, encrypted message, wherein the operation of decrypting the decoded, encrypted message comprises using the encryption/decryption module to decrypt the decoded, encrypted message from the binary format;
determining, at the client device, whether the client device has been reported stolen, based at least in part on the decrypted message; and
automatically disabling the client device in response to a determination that the client device has been reported stolen,wherein the operation of converting the encrypted message from the ASCII text format into the binary format comprises generating a first number of bytes of binary data from a second number of bytes of ASCII text, wherein the first number is different from the second number.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for electronic device communication. A system includes a client device application including an encryption/decryption module, wherein the module directly transmits and receives data to and from the client device application; and a server device application including an encryption/decryption module coupled to the client device application through a communication medium, wherein the module directly transmits and receives data to and from the server device application.
66 Citations
18 Claims
-
1. A method for providing security for an electronic device, the method comprising:
-
transmitting a message from a local application in a client device to a remote application in a server device; receiving an encrypted message at the local application from the remote application, wherein the encrypted message indicates whether the client device has been reported stolen; in response to receiving the encrypted message from the remote application, decoding the encrypted message into a decoded message, wherein the operation of decoding the encrypted message comprises converting the encrypted message from an American Standard Code of Information Interchange (ASCII) text format into a binary format; using an encryption/decryption module in the client device to decrypt the decoded, encrypted message, wherein the operation of decrypting the decoded, encrypted message comprises using the encryption/decryption module to decrypt the decoded, encrypted message from the binary format; determining, at the client device, whether the client device has been reported stolen, based at least in part on the decrypted message; and automatically disabling the client device in response to a determination that the client device has been reported stolen, wherein the operation of converting the encrypted message from the ASCII text format into the binary format comprises generating a first number of bytes of binary data from a second number of bytes of ASCII text, wherein the first number is different from the second number. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for providing security for an electronic device, the method comprising:
-
receiving a query from a client device at a server device, wherein the query asks if the client device has been reported stolen; in response to receiving the query, automatically determining whether the client device has been reported stolen; and in response to determining that the client device has been reported stolen, automatically performing operations comprising; generating a response that comprises a command for the client device to automatically disable itself; using an encryption/decryption module in the server device to encrypt the response, transmitting the encrypted response from the server device to the client device, wherein the encrypted response comprises the command for the client device to automatically disable itself, and before transmitting the encrypted response from the server device to the client device, encoding the encrypted response, wherein the operation of encoding the encrypted response comprises converting the encrypted response from a binary format into an American Standard Code of Information Interchange (ASCII) text format, and wherein the operation of converting the encrypted response from the binary format to the ASCII text format comprises generating a second number of bytes of ASCII data from a first number of bytes of binary data, wherein the second number is different from the first number. - View Dependent Claims (7, 8, 9)
-
-
10. An article of manufacture, comprising:
-
a non-transitory machine accessible storage medium; and instructions in the non-transitory machine accessible storage medium, wherein the instructions, when executed by a client device, enable the client device to perform operations comprising; transmitting a message from a local application in the client device to a remote application in a server device; receiving an encrypted message at the local application from the remote application, wherein the encrypted message indicates whether the client device has been reported stolen; in response to receiving the encrypted message from the remote application, decoding the encrypted message into a decoded message, wherein the operation of decoding the encrypted message comprises converting the encrypted message from an American Standard Code of Information Interchange (ASCII) text format into a binary format; using an encryption/decryption module in the client device to decrypt the decoded, encrypted message, wherein the operation of decrypting the decoded, encrypted message comprises using the encryption/decryption module to decrypt the decoded, encrypted message from the binary format; determining, at the client device, whether the client device has been reported stolen, based at least in part on the decrypted message; and automatically disabling the client device in response to a determination that the client device has been reported stolen, wherein the operation of converting the encrypted message from the ASCII text format into the binary format comprises generating a first number of bytes of binary data from a second number of bytes of ASCII text, wherein the first number is different from the second number. - View Dependent Claims (11, 12, 13, 14)
-
-
15. An article of manufacture, comprising:
-
a non-transitory machine accessible storage medium; and instructions in the non-transitory machine accessible storage medium which, when executed by a server device, enable the server device to perform operations comprising; receiving a query from a client device, wherein the query asks if the client device has been reported stolen; in response to receiving the query, automatically determining whether the client device has been reported stolen; and in response to determining that the client device has been reported stolen, automatically performing operations comprising; generating a response that comprises a command for the client device to automatically disable itself; using an encryption/decryption module in the server device to encrypt the response, transmitting the encrypted response from the server device to the client device, wherein the encrypted response comprises the command for the client device to automatically disable itself, and before transmitting the encrypted response to the client device, encoding the encrypted response, wherein the operation of encoding the encrypted response comprises converting the encrypted response from a binary format into an American Standard Code of Information Interchange (ASCII) text format, and wherein the operation of converting the encrypted response from the binary format to the ASCII text format comprises generating a second number of bytes of ASCII data from a first number of bytes of binary data, wherein the second number is different from the first number. - View Dependent Claims (16, 17, 18)
-
Specification