System for mitigating the unauthorized use of a device
First Claim
1. A tracking and loss mitigation system comprising:
- a mobile device, the device comprising;
a user interface including a display and a data entry interface; and
a communications interface to a security authority;
wherein the mobile device is configured to;
provide instructions regarding how to return the mobile device to an authorized user;
detect that a security compromise event has occurred; and
alter the function of the mobile device in response to said securitycompromise event to mitigate loss of control by the authorized user by;
obtaining from the authorized user a first list of zero or more data elements stored within the mobile device to be deleted upon occurrence of the security compromise event, and upon occurrence of the security compromise event, deleting the first list data elements from in the mobile device;
obtaining from the authorized user a second list of zero or more data elements stored within the mobile device to be encrypted upon occurrence of the security compromise event, and upon occurrence of the security compromise event, encrypting, by the mobile device, the second list data elements in the mobile device with a password known by at least one of the security authority and the authorized user.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
-
Citations
92 Claims
-
1. A tracking and loss mitigation system comprising:
-
a mobile device, the device comprising; a user interface including a display and a data entry interface; and a communications interface to a security authority; wherein the mobile device is configured to; provide instructions regarding how to return the mobile device to an authorized user; detect that a security compromise event has occurred; and alter the function of the mobile device in response to said security compromise event to mitigate loss of control by the authorized user by; obtaining from the authorized user a first list of zero or more data elements stored within the mobile device to be deleted upon occurrence of the security compromise event, and upon occurrence of the security compromise event, deleting the first list data elements from in the mobile device; obtaining from the authorized user a second list of zero or more data elements stored within the mobile device to be encrypted upon occurrence of the security compromise event, and upon occurrence of the security compromise event, encrypting, by the mobile device, the second list data elements in the mobile device with a password known by at least one of the security authority and the authorized user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89)
-
-
90. A tracking and loss mitigation system comprising:
-
a mobile device, the device comprising; a user interface including a display and a data entry interface; and a communications interface to a security authority; wherein the mobile device is configured to; provide instructions regarding how to return the mobile device to an authorized user; detect that a security compromise event has occurred; determine whether the function of the device should be altered in response to said security compromise event; alter the function of the mobile device in response to said security compromise event to mitigate loss of control by the authorized user; and wherein the mobile device is further configured to alter the function of the mobile device by; establishing within the mobile device a specified location to store one or more sensitive data elements; upon occurrence of the security compromise event executing a function selected from the group consisting of; encrypting one or more of the sensitive data elements with a password known to at least one of the authorized user and a security authority; deleting one or more of the sensitive data elements; multiply overwriting one or more of the sensitive data elements; and transmitting one or more of the sensitive data elements to an address specified by the authorized user.
-
-
91. A tracking and loss mitigation system comprising:
-
a mobile device, the device comprising; a user interface including a display and a data entry interface; and a communications interface to a security authority wherein; an authorized user may specify an alternative caller identification indicia; wherein the mobile device is configured to; provide instructions regarding how to return the mobile device to the authorized user; detect that a security compromise event has occurred; determine whether the function of the device should be altered in response to said security compromise event; alter the function of the mobile device in response to said security compromise event to mitigate loss of control by the authorized user by; obtaining from the authorized user a first list of zero or more data elements stored within the mobile device to be deleted upon occurrence of the security compromise event, and upon occurrence of the security compromise event, deleting the first list data elements from in the mobile device; obtaining from the authorized user a second list of zero or more data elements stored within the mobile device to be encrypted upon occurrence of the security compromise event, and upon occurrence of the security compromise event, encrypting, by the mobile device, the second list data elements in the mobile device with a password known by at least one of the security authority and the authorized user. - View Dependent Claims (92)
-
Specification