Method, apparatus and system for remote management of mobile devices
First Claim
Patent Images
1. A method, comprising:
- continuously monitoring, with a theft deterrence agent powered by a first battery included in a device while the device in a power-off state, for messages including at least one command specifying an action to secure the device, wherein the first battery is different than a second battery configured to power on the device;
receiving, in the theft deterrence agent on the device a message directly from a user of the device, via a secure network connection, the message including the at least one command specifying the action to secure the device;
authenticating the message against a secure embedded processor via a secure protocol;
executing the at least one command in the message; and
sending an acknowledgement upon completion of executing the at least one command in the message,wherein the theft deterrence agent is powered by the second battery when the device is in a power-on state provided by the second battery.
1 Assignment
0 Petitions
Accused Products
Abstract
An apparatus and system for enabling users to remotely manage their devices. Specifically, in one embodiment, in the event of a theft of a device or other such occurrence, a user may send a command to the device to execute a specified command. The command may include actions such as locking the device, shutting down the device, disabling logon'"'"'s to the device and other such actions that may secure the device and the data on the device from unauthorized access. Upon receipt of an authorized unlock credential, the device may once again be made accessible.
32 Citations
18 Claims
-
1. A method, comprising:
-
continuously monitoring, with a theft deterrence agent powered by a first battery included in a device while the device in a power-off state, for messages including at least one command specifying an action to secure the device, wherein the first battery is different than a second battery configured to power on the device; receiving, in the theft deterrence agent on the device a message directly from a user of the device, via a secure network connection, the message including the at least one command specifying the action to secure the device; authenticating the message against a secure embedded processor via a secure protocol; executing the at least one command in the message; and sending an acknowledgement upon completion of executing the at least one command in the message, wherein the theft deterrence agent is powered by the second battery when the device is in a power-on state provided by the second battery. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus, comprising:
-
a secure embedded processor; and a theft deterrence agent coupled to the secure embedded processor and powered by a first battery included in the apparatus while the apparatus in a power-off state, for messages including at least one command specifying an action to secure the apparatus, wherein the first battery is different than a second battery configured to power on the apparatus, and the theft deterrence agent is powered by the second battery when the device is in a power-on state provided by the second battery, wherein the theft deterrence agent is capable of; receiving a message directly from a user of the apparatus, via a secure network connection, the message including the at least one command specifying the action to secure the apparatus; authenticating the message against the secure embedded processor via a secure protocol; and executing the at least one command in the message and sending an acknowledgement to the user upon completion of executing the at least one command in the message. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory machine accessible medium having stored thereon instructions that, when executed by a machine, cause the machine to:
-
continuously monitor, with a theft deterrence agent powered by a first battery included in a device while the device in a power-off state, for messages including at least one command specifying an action to secure the device, the first battery being different than a second battery configured to power on the device, the theft deterrence agent being powered by the second battery when the device is in a power-on state provided by the second battery, wherein the device is associated with the machine; receive in the theft deterrence agent on the device a message directly from a user of the machine, via a secure network connection, the message including the at least one command specifying the action to secure the device; authenticate the message against a secure embedded processor via a secure protocol; execute the at least one command in the message; and send an acknowledgement upon completion of executing the at least one command in the message. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification