Enabling remote and anonymous control of mobile and portable multimedia devices for security, tracking and recovery
First Claim
1. A method comprising:
- at a server system,receiving an indication message from a user, the indication message including an identifier of an access device to be monitored for unauthorized use by an unauthorized user of the access device and identification of activity of the access device to be monitored, the user being an owner or authorized user of the access device;
receiving from the access device a secure unique identifier of the access device, the unique identifier being securely stored on the access device under control of the user and being independent of a network access identifier for the access device;
authenticating the access device based on the received identifier of the access device from the user and the received unique identifier from the access device; and
in response, providing to the access device commands for execution by the access device for monitoring activity of the access device.
7 Assignments
0 Petitions
Accused Products
Abstract
Aspects of the invention comprise a remote tracking and control server operable to transparently activate control of resources and to monitor operations on a target handheld communication device utilizing code installed on the handheld device. The resources may comprise a camera, microphone, GPS receiver, input device, display, speaker, wireless and/or wire-line transmitter and/or receiver. The monitoring and/or controlling activity is protected from interruption. The handheld device may be accessed by a securely stored unique identifier. Access to the controlling function and/or the resources by a user of the handheld device may be restricted. Monitored information is stored on the handheld device and communicated to the tracking server. The control server may receive monitored information from the handheld device whenever the device is coupled to a communication network. Monitoring may be initiated based on detected motion, sound, user input, video and/or touch.
24 Citations
20 Claims
-
1. A method comprising:
at a server system, receiving an indication message from a user, the indication message including an identifier of an access device to be monitored for unauthorized use by an unauthorized user of the access device and identification of activity of the access device to be monitored, the user being an owner or authorized user of the access device; receiving from the access device a secure unique identifier of the access device, the unique identifier being securely stored on the access device under control of the user and being independent of a network access identifier for the access device; authenticating the access device based on the received identifier of the access device from the user and the received unique identifier from the access device; and in response, providing to the access device commands for execution by the access device for monitoring activity of the access device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
11. A server system comprising:
-
a user interface for secure access over a network by users to receive from the users information defining remote control of one or more access devices and information defining respective unique identifiers for each respective access device of the one or more access devices; a communication interface for communication with the one or more access devices; data defining a user account associating a respective user with one or more respective access devices based in part on the information defining the respective unique identifiers provided by the respective user for each respective access device of the one or more access devices; code to gain secure access via the communication interface to the one or more respective access devices and to receive from the one or more respective access devices respective unique device identifiers which have been securely stored on the respective access devices under control of the respective user for each respective access device of the one or more access devices; code to remotely control via the communication interface resources of the one or more respective access devices in response to the information defining remote control and the received respective unique device identifiers and the respective unique identifiers for each respective access device of the one or more access devices. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A method comprising:
at a tracking and control server, receiving from a user device over a network a communication identifying an access device associated with a user of the user device as a target of surveillance; receiving from the access device a request for secure access to the server system, the request including identifying information for the access device; authenticating the access device in response to the request; receiving a challenge communication from the access device; in response to the received challenge, communicating a status of target surveillance to the access device; receiving from the access device surveillance data; and communicating information about the surveillance data to the user device. - View Dependent Claims (19, 20)
Specification