Systems and methods for identifying unauthorized users of an electronic device
First Claim
1. A method for identifying an unauthorized user of an electronic device, the method comprising:
- monitoring with the electronic device usage of at least one memory of the electronic device;
detecting with the electronic device a sudden increase in the monitored memory usage; and
determining with the electronic device that a current user of the electronic device is the unauthorized user in response to the detecting.
1 Assignment
0 Petitions
Accused Products
Abstract
This is generally directed to identifying unauthorized users of an electronic device. In some embodiments, an unauthorized user of the electronic device can be detected by identifying particular activities that may indicate suspicious behavior. In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identity of the owner of the electronic device. When an unauthorized user is detected, various safety measures can be taken. For example, information related to the identity of the unauthorized user, the unauthorized user'"'"'s operation of the electronic device, or the current location of the electronic device can be gathered. As another example, functions of the electronic device can be restricted. In some embodiments, the owner of the electronic device can be notified of the unauthorized user by sending an alert notification through any suitable medium, such as, for example, a voice mail, e-mail, or text message.
96 Citations
30 Claims
-
1. A method for identifying an unauthorized user of an electronic device, the method comprising:
-
monitoring with the electronic device usage of at least one memory of the electronic device; detecting with the electronic device a sudden increase in the monitored memory usage; and determining with the electronic device that a current user of the electronic device is the unauthorized user in response to the detecting. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 19, 20)
-
-
11. An electronic device operable to detect an unauthorized user of the electronic device, the electronic device comprising:
-
a memory; and a processor operable to; monitor a usage of the memory; detect a sudden increase in the monitored usage; and determine that a current user of the electronic device is the unauthorized user in response to the detection of the sudden increase. - View Dependent Claims (12, 13, 14, 15, 16, 21, 22)
-
-
17. Non-transitory machine-readable media for identifying unauthorized users of an electronic device, comprising machine-readable instructions recorded thereon for:
-
monitoring with the electronic device usage of at least one memory of the electronic device; detecting with the electronic device a sudden increase in the monitored usage; and determining with the electronic device that a current user of the electronic device is an unauthorized user in response to the detecting. - View Dependent Claims (18)
-
-
23. A method comprising:
-
determining with an electronic device that the electronic device is at least one of turned on and unlocked; in response to the determining; capturing with the electronic device at least one photograph of a current user of the electronic device; and detecting with the electronic device at least one current operation that is being performed by the electronic device; and storing with the electronic device the captured at least one photograph and the detected at least one current operation in a log of the electronic device. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30)
-
Specification