×

Electronic device security and tracking system and method

DC
  • US 8,506,649 B2
  • Filed: 07/11/2006
  • Issued: 08/13/2013
  • Est. Priority Date: 08/23/2003
  • Status: Active Grant
First Claim
Patent Images

1. A mobile electronic device, comprising:

  • a processor;

    one or more non-transitory machine-readable storage media responsive to the processor; and

    a security application in at least one of the non-transitory machine-readable storage media, wherein the security application is operable to perform operations comprising;

    enabling an owner of the mobile electronic device to register the mobile electronic device with a security service residing at least partially on one or more servers;

    causing the mobile electronic device to automatically send identifying information for the mobile electronic device to the security service;

    after the owner has registered the mobile electronic device with the security service, causing the mobile electronic device to periodically communicate with the security service, when the mobile electronic device is in a state other than a state in which the mobile electronic device is powered off;

    after the owner has registered the mobile electronic device with the security service, accepting a notification at the mobile electronic device from the security service, wherein the notification comprises a message indicating that the owner of the mobile electronic device has reported a loss or requested disabling of the mobile electronic device;

    in response to receiving the notification, automatically disabling at least one user function of the mobile electronic device while still allowing the mobile electronic device to communicate with the security service; and

    automatically causing at least some user data to be copied from the mobile electronic device to at least one of the servers;

    wherein the one or more non-transitory machine-readable storage media comprises non-volatile memory;

    wherein the non-volatile memory comprises a changeable area that can be modified by a user and a system area that cannot be modified by the user;

    wherein the security application utilizes code residing at least partially in the system area; and

    wherein the security application receives the notification from at least one of the servers via the system area.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×