Methods and systems for recovering lost or stolen mobile devices
First Claim
1. A method for recovering a mobile device, comprising:
- presenting a standard user interface on the mobile device during normal authorized operation;
activating an anti-theft software module;
presenting a secondary user interface on the mobile device when the anti-theft software module is activated, wherein the secondary interface limits access to select programs and data stored on the mobile device, and wherein the secondary user interface provides an appearance of the standard user interface on the mobile device;
collecting biometric data of an unauthorized user of the mobile device when the anti-theft software module is activated; and
transmitting the collected biometric data to a server, wherein the biometric data is compared to records in a biometric database to identify the unauthorized user.
1 Assignment
0 Petitions
Accused Products
Abstract
To facilitate recovering lost or stolen mobile devices, methods and systems are provided that enable mobile devices to report information that can be used to locate the device and/or identify an unauthorized user. Owners can report the loss or theft of their mobile devices to a server which can transmit an anti-theft activation message. Reception of the anti-theft activation message prompts activation of a anti-theft software module may limit access to programs and data on the mobile device while allowing the normal use of the mobile device through a secondary user interface. Unbeknownst to unauthorized users, data related to the user and the device are collected and transmitted to a server. Collected data may include user biometric data and non-biometric data. User biometric data may be matched against biometric databases to identify the user. Non-biometric data may be used to help locate the mobile devices.
41 Citations
38 Claims
-
1. A method for recovering a mobile device, comprising:
-
presenting a standard user interface on the mobile device during normal authorized operation; activating an anti-theft software module; presenting a secondary user interface on the mobile device when the anti-theft software module is activated, wherein the secondary interface limits access to select programs and data stored on the mobile device, and wherein the secondary user interface provides an appearance of the standard user interface on the mobile device; collecting biometric data of an unauthorized user of the mobile device when the anti-theft software module is activated; and transmitting the collected biometric data to a server, wherein the biometric data is compared to records in a biometric database to identify the unauthorized user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A mobile device, comprising:
-
a processor; and a memory coupled to the processor; wherein the processor is configured with processor-executable instructions to perform operations comprising; presenting a standard user interface on the mobile device during normal authorized operation; activating an anti-theft software module; presenting a secondary user interface on the mobile device when the anti-theft software module is activated, wherein the secondary interface limits access to select programs and data stored on the mobile device, and wherein the secondary user interface provides an appearance of the standard user interface on the mobile device; collecting biometric data of an unauthorized user of the mobile device when the anti-theft software module is activated; and transmitting the collected biometric data to a server, wherein the biometric data is compared to records in a biometric database to identify the unauthorized user. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A mobile device, comprising:
-
means for presenting a standard user interface on the mobile device during normal authorized operation; means for activating an anti-theft software module; means for presenting a secondary user interface on the mobile device when the anti-theft software module is activated, wherein the secondary interface limits access to select programs and data stored on the mobile device, and wherein the secondary user interface provides an appearance of the standard user interface on the mobile device; means for collecting biometric data of an unauthorized user of the mobile device when the anti-theft software module is activated; and means for transmitting the collected biometric data to a server, wherein the biometric data is compared to records in a biometric database to identify the unauthorized user. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A non-transitory storage medium having stored thereon processor-executable software instructions that would cause a processor of a mobile device to perform operations comprising:
-
presenting a standard user interface on the mobile device during normal authorized operation; activating an anti-theft software module; presenting a secondary user interface on the mobile device when the anti-theft software module is activated, wherein the secondary interface limits access to select programs and data stored on the mobile device, and wherein the secondary user interface provides an appearance of the standard user interface on the mobile device; collecting biometric data of an unauthorized user of the mobile device when the anti-theft software module is activated; and transmitting the collected biometric data to a server, wherein the biometric data is compared to records in a biometric database to identify the unauthorized user. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38)
-
Specification