Managing wireless devices using access control
First Claim
Patent Images
1. A computerized method of managing a plurality of wireless devices, the method comprising:
- receiving a notification for one of the plurality of wireless devices at a computer system, wherein the receiving includes at least one of;
receiving the notification from the one of the plurality of wireless devices in response to an access attempt threshold being exceeded or receiving the notification from a party affiliated with the one of the plurality of wireless devices when the wireless device is displaced, wherein the access attempt threshold corresponds to a number of unsuccessful attempts to access the one of the plurality of wireless devices;
calling the one of the plurality of wireless devices in response to the notification;
obtaining, based on the calling, a location of the one of the plurality of wireless devices on the computer system;
sending the location from the computer system for use by a user remote from the computer system;
remotely locking the wireless device in response to the notification; and
in response to receiving the notification that the access attempt threshold is exceeded, automatically remotely clearing the at least one wireless device of data on at least one of;
storage or memory, and, in response to receiving the notification that the wireless device is displaced, automatically remotely clearing the at least one wireless device of data on at least one of;
storage or memory after a predetermined time period.
1 Assignment
0 Petitions
Accused Products
Abstract
An improved solution for managing wireless devices that uses access control is provided. In an embodiment of the invention, a method for managing wireless devices includes receiving a notification for one of the plurality of wireless devices, the notification indicating at least one of: an access attempt threshold is exceeded or the wireless device is displaced; and remotely locking the wireless device based on the notification.
22 Citations
18 Claims
-
1. A computerized method of managing a plurality of wireless devices, the method comprising:
-
receiving a notification for one of the plurality of wireless devices at a computer system, wherein the receiving includes at least one of;
receiving the notification from the one of the plurality of wireless devices in response to an access attempt threshold being exceeded or receiving the notification from a party affiliated with the one of the plurality of wireless devices when the wireless device is displaced, wherein the access attempt threshold corresponds to a number of unsuccessful attempts to access the one of the plurality of wireless devices;calling the one of the plurality of wireless devices in response to the notification; obtaining, based on the calling, a location of the one of the plurality of wireless devices on the computer system; sending the location from the computer system for use by a user remote from the computer system; remotely locking the wireless device in response to the notification; and in response to receiving the notification that the access attempt threshold is exceeded, automatically remotely clearing the at least one wireless device of data on at least one of;
storage or memory, and, in response to receiving the notification that the wireless device is displaced, automatically remotely clearing the at least one wireless device of data on at least one of;
storage or memory after a predetermined time period. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computerized system, comprising:
-
at least one computing device for managing a plurality of wireless device by performing a method including; for receiving a notification for one of the plurality of wireless devices, wherein the receiving includes at least one of;
receiving the notification from the one of the plurality of wireless devices in response to an access attempt threshold being exceeded or receiving the notification from a party affiliated with the one of the plurality of wireless devices when the wireless device is displaced, wherein the access attempt threshold corresponds to a number of unsuccessful attempts to access the one of the plurality of wireless devices;calling the one of the plurality of wireless devices in response to the notification; obtaining, based on the calling, a location of the one of the plurality of wireless devices; sending the location for use by a user; remotely locking the wireless device in response to the notification; and in response to receiving the notification that the access attempt threshold is exceed, automatically remotely clearing the at least one wireless device of data on at least one of;
storage or memory, and, in response to receiving the notification that the wireless device is displaced, automatically remotely clearing the at least one wireless device of data on at least one of;
storage or memory after a predetermined time period. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program comprising program code stored on a non-transitory computer-readable medium, which when executed, enables a computer system to implement a method of managing a plurality of wireless devices, the method comprising:
-
receiving a notification for one of the plurality of wireless devices, wherein the receiving includes at least one of;
receiving the notification from the one of the plurality of wireless devices in response to an access attempt threshold being exceeded or receiving the notification from a party affiliated with the one of the plurality of wireless devices when the wireless device is displaced, wherein the access attempt threshold corresponds to a number of unsuccessful attempts to access the one of the plurality of wireless devices;calling the one of the plurality of wireless devices in response to the notification; obtaining, based on the calling, a location of the one of the plurality of wireless devices; sending the location for use by a user; remotely locking the wireless device in response to the notification; and in response to receiving the notification that the access attempt threshold is exceeded, automatically remotely clearing the at least one wireless device of data on at least one of;
storage or memory, and, in response to receiving the notification that the wireless device is displaced, automatically remotely clearing the at least one wireless device of data on at least one of;
storage or memory after a predetermined time period.
-
-
18. A method of generating a system for managing a plurality of wireless devices, the method comprising:
providing a computer system operable to; receive a notification for one of the plurality of wireless devices, wherein the receiving includes at least one of;
receiving the notification from the one of the plurality of wireless devices in response to an access attempt threshold being exceeded or receiving the notification from a party affiliated with the one of the plurality of wireless devices when the wireless device is displaced, wherein the access attempt threshold corresponds to a number of unsuccessful attempts to access the one of the plurality of wireless devices;call the one of the plurality of wireless devices in response to the notification; obtain, based on the calling, a location of the one of the plurality of wireless devices; send the location for use by a user; remotely lock the wireless device in response to the notification; and in response to receiving the notification that the access attempt threshold is exceeded, automatically remotely clear the at least one wireless device of data on at least one of;
storage or memory, and, in response to receiving the notification that the wireless device is displaced, automatically remotely clear the at least one wireless device of data on at least one of;
storage or memory after a predetermined time period.
Specification