System for monitoring the unauthorized use of a device
First Claim
1. A tracking and loss mitigation system comprising:
- a mobile device, the device comprising;
a user interface including a display and a data entry interface; and
a communications interface to a security authority;
wherein the mobile device is configured to;
provide, by the user interface of the mobile device, a notification to the current user of the mobile device describing how to return the mobile device to an authorized user;
detect that a security compromise event has occurred; and
determine whether the function of the device should be altered in response to said security event.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
-
Citations
48 Claims
-
1. A tracking and loss mitigation system comprising:
-
a mobile device, the device comprising; a user interface including a display and a data entry interface; and a communications interface to a security authority; wherein the mobile device is configured to; provide, by the user interface of the mobile device, a notification to the current user of the mobile device describing how to return the mobile device to an authorized user; detect that a security compromise event has occurred; and determine whether the function of the device should be altered in response to said security event. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 47, 48)
-
-
38. A tracking and loss mitigation system comprising:
-
a mobile device comprising a communications interface; a database, coupled to the mobile device, including situational information indicating that operation of a device is to be modified; wherein the mobile device is configured to; present to a current user of the mobile device information regarding returning the device to an authorized user, the information being provided through a user interface of the mobile device; determine that the use of the device is to be restricted; and modify a permitted functionality set of the device from a first feature set to a second feature set. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46)
-
Specification