Electronic device security and tracking system and method
First Claim
1. A mobile device, comprising:
- a central processing unit (CPU);
a non-transitory machine-readable storage medium responsive to the CPU;
a user information module responsive to the CPU;
a phone number for the mobile device associated with the user information module;
device identification information stored in the mobile device; and
instructions in the non-transitory machine-readable storage medium which, when executed by the mobile device, cause the mobile device to perform operations comprising;
after registering with a security and tracking server, receiving a message indicating that the mobile device has been registered with the security and tracking server;
in response to receiving the message indicating that the mobile device has been registered with the security and tracking server, setting the mobile device to an active state and allowing the mobile device to operate normally;
after (a) receiving the message indicating that the mobile device has been registered with the security and tracking server and (b) setting the mobile device to the active state, performing the following actions;
(1)(a) receiving a second message, wherein the second message comprises a backup command; and
(b) in response to the backup command, backing up user data from the mobile device to a remote system; and
(2)(a) automatically determining if the user information module associated with the phone number has been changed; and
(b) if the user information module associated with the phone number has been changed, disabling a function of the mobile device,wherein, when the mobile device is in the active state, a security application is operating on the mobile device.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for securing and tracking an electronic device. The system includes hardware, software and firmware components that cooperate to allow tracking, disabling, and other interaction with the stolen electronic device. The system includes an application component, non-viewable component and Basic Input/Output Subsystem (BIOS) component that are present on the electronic device. The BIOS component maintains the secured environment of the application and non-viewable components. If only the application component was provided, a simple low level format of the hard disk drive would remove the application and bypass the security features. The system implements an “application and BIOS” based solution to electronic device security.
-
Citations
26 Claims
-
1. A mobile device, comprising:
-
a central processing unit (CPU); a non-transitory machine-readable storage medium responsive to the CPU; a user information module responsive to the CPU; a phone number for the mobile device associated with the user information module; device identification information stored in the mobile device; and instructions in the non-transitory machine-readable storage medium which, when executed by the mobile device, cause the mobile device to perform operations comprising; after registering with a security and tracking server, receiving a message indicating that the mobile device has been registered with the security and tracking server; in response to receiving the message indicating that the mobile device has been registered with the security and tracking server, setting the mobile device to an active state and allowing the mobile device to operate normally; after (a) receiving the message indicating that the mobile device has been registered with the security and tracking server and (b) setting the mobile device to the active state, performing the following actions; (1)(a) receiving a second message, wherein the second message comprises a backup command; and (b) in response to the backup command, backing up user data from the mobile device to a remote system; and (2)(a) automatically determining if the user information module associated with the phone number has been changed; and (b) if the user information module associated with the phone number has been changed, disabling a function of the mobile device, wherein, when the mobile device is in the active state, a security application is operating on the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 20)
-
-
10. A method for securing a mobile device, the method comprising:
-
after registering with a security and tracking server, receiving a message at a mobile device, wherein the message indicates that the mobile device has been registered with the security and tracking server, and wherein the mobile device comprises (a) device identification information and (b) a user information module associated with a phone number for the mobile device; in response to receiving the message indicating that the mobile device has been registered with the security and tracking server, setting the mobile device to an active state and allowing the mobile device to operate normally; after (a) receiving the message indicating that the mobile device has been registered with the security and tracking server and (b) setting the mobile device to the active state, performing the following actions; (1) (a) receiving a second message, wherein the second message comprises a backup command; and (b) in response to the backup command, backing up user data from the mobile device to a remote system; and (2)(a) automatically determining the user information module associated with the phone number has been changed; and (b) if the user information module associated with the phone number has been changed, disabling a function of the mobile device, wherein, when the mobile device is in the active state, a security application is operating on the mobile device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. An article of manufacture, comprising:
-
a non-transitory machine-readable storage medium, and instructions in the non-transitory machine-readable storage medium which, when executed by a mobile device, cause the mobile device to perform operations comprising; after registering with a security and tracking server, receiving a message at the mobile device, wherein the message indicates that the mobile device has been registered with a security and tracking server, and wherein the mobile device comprises (a) device identification information and (b) a user information module associated with a phone number for the mobile device; in response to receiving the message indicating that the mobile device has been registered with the security and tracking server, setting the mobile device to an active state and allowing the mobile device to operate normally; after (a) receiving the message indicating that the mobile device has been registered with the security and tracking server and (b) setting the mobile device to the active state, performing the following actions; (1)(a) receiving a second message, wherein the second message comprises a backup command; and (b) in response to the backup command, backing up user data from the mobile device to a remote system; and (2)(a) automatically determining if the user information module associated with the phone number has been changed; and (b) if the user information module associated with the phone number has been changed, disabling a function of the mobile device, wherein, when the mobile device is in the active state, a security application is operating on the mobile device. - View Dependent Claims (19, 21, 22, 23, 24, 25, 26)
-
Specification