Remote diagnosis of unauthorized hardware change
First Claim
Patent Images
1. A method for diagnosing an unauthorized hardware change, comprising:
- detecting, by a computing device, a hardware change on a mobile device;
determining the hardware change is an unauthorized hardware change as a function of a component identification of the hardware and a behavior characteristic of the hardware corresponding to the component identification, including determining that an actual behavior characteristic of the hardware is different from an authorized behavioral characteristic stored on the mobile device for the hardware; and
performing an action based on an implementation policy that associates the action with the unauthorized hardware change, including;
determining a connectivity problem in attempting to transmit a message over a network to report the unauthorized hardware changed,during a specified amount of time, prompting a user to solve the connectivity problem and prompting the user to provide information regarding the unauthorized hardware change,restricting usage of the mobile device after expiration of the specified amount of time if the connectivity problem is not resolved prior to the expiration of the specified amount of time or if the information regarding the unauthorized hardware change is not received prior to the expiration of the specified amount of time, andlogging information associated with the unauthorized hardware change for reporting to a service provider.
1 Assignment
0 Petitions
Accused Products
Abstract
Aspects describe remotely diagnosing unauthorized hardware changes on a mobile device. The changes can be identified based on hardware component identification and/or based on behavior characteristics of the device. If an unauthorized change is detected, information relating to that change can be reported to a service provider. Further, actions associated with the authorized change can be automatically implemented or implemented after confirmation to proceed with the recommended action.
-
Citations
23 Claims
-
1. A method for diagnosing an unauthorized hardware change, comprising:
-
detecting, by a computing device, a hardware change on a mobile device; determining the hardware change is an unauthorized hardware change as a function of a component identification of the hardware and a behavior characteristic of the hardware corresponding to the component identification, including determining that an actual behavior characteristic of the hardware is different from an authorized behavioral characteristic stored on the mobile device for the hardware; and performing an action based on an implementation policy that associates the action with the unauthorized hardware change, including; determining a connectivity problem in attempting to transmit a message over a network to report the unauthorized hardware changed, during a specified amount of time, prompting a user to solve the connectivity problem and prompting the user to provide information regarding the unauthorized hardware change, restricting usage of the mobile device after expiration of the specified amount of time if the connectivity problem is not resolved prior to the expiration of the specified amount of time or if the information regarding the unauthorized hardware change is not received prior to the expiration of the specified amount of time, and logging information associated with the unauthorized hardware change for reporting to a service provider. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A wireless communications apparatus, comprising:
-
processor; and a memory that retains computer executable instructions that, when executed by the processor, cause the processor to perform the acts of; detecting a hardware change on a mobile device; ascertaining the hardware change is an unauthorized hardware change as a function of a component identification of the hardware and a behavior characteristic of the hardware corresponding to the component identification, including determining that an actual behavior characteristic of the hardware is different from an authorized behavioral characteristic stored on the mobile device for the hardware; and performing an action based on an implementation policy that associates the action with the unauthorized hardware change, including; determining a connectivity problem in attempting to transmit a message over a network to report the unauthorized hardware changed, during a specified amount of time, prompting a user to solve the connectivity problem and prompting the user to provide information regarding the unauthorized hardware change, restricting usage of the mobile device after expiration of the specified amount of time if the connectivity problem is not resolved prior to the expiration of the specified amount of time or if the information regarding the unauthorized hardware change is not received prior to the expiration of the specified amount of time, and logging information associated with the unauthorized hardware change for reporting to a service provider. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A wireless communications apparatus that detects an unauthorized hardware change to a device, comprising:
-
means for identifying a hardware change to a device; means for establishing that the change is an unauthorized hardware change as a function of a component identification of the hardware and a behavior characteristic of the hardware corresponding to the component identification, including determining that an actual behavior characteristic of the hardware is different from an authorized behavioral characteristic stored on the device for the hardware; and means for performing an action based on an implementation policy that associates the action with the unauthorized hardware change, including; means for determining a connectivity problem in attempting to transmit a message over a network to report the unauthorized hardware changed, means for prompting a user to solve the connectivity problem and means for prompting the user to provide information regarding the unauthorized hardware change, during a specified amount of time; means for restricting usage of the mobile device after expiration of the specified amount of time if the connectivity problem is not resolved prior to the expiration of the specified amount of time or if the information regarding the unauthorized hardware change is not received prior to the expiration of the specified amount of time, and means for logging information associated with the unauthorized hardware change for reporting to a service provider. - View Dependent Claims (20, 21, 22, 23)
-
Specification