Method, apparatus and system for remote management of mobile devices
First Claim
Patent Images
1. A method, comprising:
- continuously monitoring, by a theft deterrence agent on a device, for messages including at least one command specifying an action to secure the device, the theft deterrence agent executing on an embedded processor included in the device, the embedded processor operating independently from a central processing unit (CPU) included in the device, the CPU having an operating system configured to operate the device when executing on the CPU, the embedded processor having another operating system that is separate from the operating system and configured to operate the theft deterrence agent when executing on the embedded processor;
receiving, by the theft deterrence agent on the device, a message directly from another device via a secure network connection, the message including the at least one command specifying an action to secure the device, the action including one of deleting files, deleting a disk or deleting an encryption key;
executing, by the theft deterrence agent on the device, the at least one command in the message to delete files, a disk or an encryption key, the executing including powering on the device to enable the command be executed, upon determination that the device is powered down; and
sending, by the theft deterrence agent on the device, an acknowledgement upon completion of executing the at least one command in the message.
0 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and system for enabling users to remotely manage their devices. Specifically, in one embodiment, in the event of a theft of a device or other such occurrence, a user may send a command to the device to execute a specified command. The command may include actions such as locking the device, shutting down the device, disabling logon'"'"'s to the device and other such actions that may secure the device and the data on the device from unauthorized access. Upon receipt of an authorized unlock credential, the device may once again be made accessible.
26 Citations
21 Claims
-
1. A method, comprising:
-
continuously monitoring, by a theft deterrence agent on a device, for messages including at least one command specifying an action to secure the device, the theft deterrence agent executing on an embedded processor included in the device, the embedded processor operating independently from a central processing unit (CPU) included in the device, the CPU having an operating system configured to operate the device when executing on the CPU, the embedded processor having another operating system that is separate from the operating system and configured to operate the theft deterrence agent when executing on the embedded processor; receiving, by the theft deterrence agent on the device, a message directly from another device via a secure network connection, the message including the at least one command specifying an action to secure the device, the action including one of deleting files, deleting a disk or deleting an encryption key; executing, by the theft deterrence agent on the device, the at least one command in the message to delete files, a disk or an encryption key, the executing including powering on the device to enable the command be executed, upon determination that the device is powered down; and sending, by the theft deterrence agent on the device, an acknowledgement upon completion of executing the at least one command in the message. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus, comprising:
-
a secure embedded processor; and a theft deterrence agent coupled to the secure embedded processor, the theft deterrence agent to; continuously monitor for messages including at least one command specifying an action to secure the device; receive a message directly from another apparatus via a secure network connection, the message including the at least one command specifying an action to secure the device, wherein the action includes one of delete files, delete a disk or delete an encryption key; authenticate the message against the secure embedded processor via a secure protocol; execute the at least one command in the message to delete files, a disk or an encryption key, wherein to execute includes power on the apparatus to enable the command be executed, upon determination the apparatus is powered down; and send an acknowledgement to the user upon completion of executing the at least one command in the message, wherein the theft deterrence agent is to execute on the embedded processor included in the apparatus, the embedded processor operating independently from a central processing unit (CPU) included in the apparatus, the CPU having an operating system to operate the apparatus when executing on the CPU, the embedded processor having another operating system that is separate from the operating system and to operate the theft deterrence agent when executing on the embedded processor. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory machine accessible medium having stored thereon instructions that, when executed by a machine, cause the machine to enable a device to:
-
continuously monitor for messages including at least one command specifying an action to secure the device; receive in a theft deterrence agent on a device a message directly from another device via a secure network connection, the message including the at least one command specifying an action to secure the device, wherein the action includes one of delete files, delete a disk or delete an encryption key; authenticate the message against a secure embedded processor via a secure protocol; execute the at least one command in the message to delete files, a disk or an encryption key, wherein to execute includes power on the device to enable the command be executed, upon determination that the device is powered down; and send an acknowledgement upon completion of executing the at least one command in the message, wherein the theft deterrence agent is to execute on the embedded processor included in the device, the embedded processor operating independently from a central processing unit (CPU) included in the device, the CPU having an operating system to operate the device when executing on the CPU, the embedded processor having another operating system that is separate from the operating system and to operate the theft deterrence agent when executing on the embedded processor. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification