Protecting electronic devices from extended unauthorized use
First Claim
1. A method for guarding against unauthorized use of a device, the method comprising:
- powering up the device, wherein the device is a cell phone;
establishing, by the device, a wireless connection between the device and a remote server;
transmitting a request to download one or more media files to the remote server, wherein the request includes an identifier assigned to the device,wherein the remote server, in response to the request, looks up the device identifier in a database accessible by the remote server, and the remote server determines from the database that the device has been reported stolen; and
disabling, by the device in response to a reply from the remote server, a recharging circuit so that the recharging circuit cannot recharge the device.
2 Assignments
0 Petitions
Accused Products
Abstract
When unauthorized use of a device is suspected, a recharging mechanism (e.g., recharge-circuit) of the device is disabled in order to guard against extended unauthorized use of the device. The recharging mechanism normally recharges the rechargeable-power-supply that powers the device. Consequently, normal use and enjoyment of the device can be significantly reduced by disabling the rechager. Moreover, for devices that are mainly powered by a rechargeable-power-supply (e.g., music-players, phones, Personal Digital Assistants), disabling the recharger effectively renders the device inoperable when the power of the main power-supply has run out. As such, disabling the recharger should serve as a deterrent to theft.
38 Citations
20 Claims
-
1. A method for guarding against unauthorized use of a device, the method comprising:
-
powering up the device, wherein the device is a cell phone; establishing, by the device, a wireless connection between the device and a remote server; transmitting a request to download one or more media files to the remote server, wherein the request includes an identifier assigned to the device, wherein the remote server, in response to the request, looks up the device identifier in a database accessible by the remote server, and the remote server determines from the database that the device has been reported stolen; and disabling, by the device in response to a reply from the remote server, a recharging circuit so that the recharging circuit cannot recharge the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a processor; a memory storing computer executable instructions that when executed by the processor cause the processor to; power up the device, wherein the device is a cell phone; establish, by the device, a wireless connection between the device and a remote server; transmit a request to download one or more media files to the remote server, wherein the request includes an identifier assigned to the device, wherein the remote server is configured to, in response to the request, look up the device identifier in a database accessible by the remote server, and the remote server is further configured to determine from the database that the device has been reported stolen; and disable, by the device in response to a reply from the remote server, a recharging circuit so that the recharging circuit cannot recharge the device. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transitory machine-readable medium for a computer system, the non-transitory machine-readable medium having stored thereon a series of instructions executable by a processor, the series of instructions comprising:
-
instructions that cause the processor to power up the device, wherein the device is a cell phone; instructions that cause the processor to establish, by the device, a wireless connection between the device and a remote server; instructions that cause the processor to transmit a request to download one or more media files to the remote server, wherein the request includes an identifier assigned to the device, wherein the remote server is configured to, in response to the request, look up the device identifier in a database accessible by the remote server, and the remote server is further configured to determine from the database that the device has been reported stolen; and instructions that cause the processor to disable, by the device in response to a reply from the remote server, a recharging circuit so that the recharging circuit cannot recharge the device. - View Dependent Claims (17, 18, 19, 20)
-
Specification