Automatic control of a security protection mode of an electronic device
First Claim
1. An automated method of remotely monitoring and controlling an electronic device, the method comprising:
- by a computer system of a monitoring center;
receiving a call over a network from the electronic device, said call initiated by an agent installed on the electronic device, said agent including functionality for tracking usage of the electronic device and for reporting information regarding said usage to the monitoring center, the agent thereby facilitating recovery of the electronic device when stolen;
in response to the call;
determining, at least, whether a sale of the electronic device has been reported and whether the electronic device is reported as stolen;
by communication with the agent, causing the electronic device to enter into a state that is dependent, at least, upon the determination of whether a sale of the electronic device has been reported, said state affecting whether the agent reports information to the monitoring center regarding usage of the electronic device; and
in response to determining that the electronic device has not been reported as sold and is not reported as stolen, (1) causing the electronic device to execute a rogue device procedure, and (2) causing an alert message to be transmitted to a manufacturer or distributor of the electronic device, said alert message representing a determination that the electronic device placed the call while having a status of both not sold and not reported as stolen.
2 Assignments
0 Petitions
Accused Products
Abstract
An automated method and apparatus is provided for deterring unauthorized use or theft of electronic devices, or other sorts of items into which a tracking device has been installed, particularly those in a distribution channel. The automated method is performed by a computer system of a monitoring center, and comprises the steps of: receiving a call over a network from the electronic device, said call initiated by an agent installed on the electronic device, said agent including functionality for tracking usage of the electronic device and for reporting information regarding said usage to the monitoring center, the agent thereby facilitating recovery of the electronic device when stolen; in response to the call, determining, at least, whether a sale of the electronic device has been reported; and by communication with the agent, causing the electronic device to enter into a state that is dependent, at least, upon the determination of whether a sale of the electronic device has been reported, said state affecting whether the agent reports information to the monitoring center regarding usage of the electronic device.
-
Citations
16 Claims
-
1. An automated method of remotely monitoring and controlling an electronic device, the method comprising:
by a computer system of a monitoring center; receiving a call over a network from the electronic device, said call initiated by an agent installed on the electronic device, said agent including functionality for tracking usage of the electronic device and for reporting information regarding said usage to the monitoring center, the agent thereby facilitating recovery of the electronic device when stolen; in response to the call; determining, at least, whether a sale of the electronic device has been reported and whether the electronic device is reported as stolen; by communication with the agent, causing the electronic device to enter into a state that is dependent, at least, upon the determination of whether a sale of the electronic device has been reported, said state affecting whether the agent reports information to the monitoring center regarding usage of the electronic device; and in response to determining that the electronic device has not been reported as sold and is not reported as stolen, (1) causing the electronic device to execute a rogue device procedure, and (2) causing an alert message to be transmitted to a manufacturer or distributor of the electronic device, said alert message representing a determination that the electronic device placed the call while having a status of both not sold and not reported as stolen. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A system for remotely monitoring and controlling in a distribution channel an electronic device comprising a processor and a device memory, and an interface for connection to a communications network, the system comprising:
-
an agent installed on the electronic device, the agent including functionality for tracking usage of the electronic device and for reporting information regarding said usage to a monitoring center, the agent thereby facilitating recovery of the electronic device when stolen; and a monitoring center comprising an interface for connection to a communications network, a processor and a monitoring center memory comprising a database of information relating to reported sales and reported thefts of electronic devices, said monitoring center being configured to; receive a call over a network from the electronic device, said call initiated by the agent installed on the electronic device; in response to the call, determine, at least, whether a sale of the electronic device has been reported and whether a theft of the electronic device has been reported; by communication with the agent, cause the electronic device to enter into a state that is dependent, at least, upon the determination of whether a sale of the electronic device has been reported, said state affecting whether the agent reports information to the monitoring center regarding usage of the electronic device; and when the electronic device has not been reported as either sold or stolen;
(1) cause the electronic device to execute a rogue device procedure, and, (2) cause an alert message to be transmitted to a manufacturer or distributor of the electronic device, said alert message representing a determination that the electronic device placed the call while having a status of both not sold and not reported as stolen.
-
-
10. A computer system comprising at least one physical computer, said computer system programmed, via executable instructions stored in computer storage, to perform an automated method of remotely monitoring and controlling an electronic device, the method comprising:
-
receiving a call over a network from the electronic device, said call initiated by an agent installed on the electronic device, said agent including functionality for tracking usage of the electronic device and for reporting information regarding said usage to the computer system, the agent thereby facilitating recovery of the electronic device when stolen; in response to the call, determining, at least, whether a sale of the electronic device has been reported and whether the electronic device is reported as stolen; by communication with the agent, causing the electronic device to enter into a state that is dependent, at least, upon the determination of whether a sale of the electronic device has been reported, said state affecting whether the agent reports information to the monitoring center regarding usage of the electronic device; and in response to determining that the electronic device has not been reported as either sold or stolen, (1) causing the electronic device to execute a rogue device procedure, and (2) causing an alert message to be transmitted to a retail seller of the electronic device, said alert message representing a determination that the electronic device placed the call while having a status of both not sold and not reported as stolen. - View Dependent Claims (11)
-
-
12. A computer system comprising at least one physical computer, said computer system programmed, via executable instructions stored in computer storage, to perform an automated process of remotely controlling an electronic device, the process comprising:
-
receiving a call over a network from the electronic device, said call initiated by an agent installed on the electronic device, said agent including functionality for tracking and reporting usage of the electronic device, the agent thereby facilitating recovery of the electronic device when stolen; in response to the call, accessing a data repository to determine a status of the electronic device, said data repository including information regarding at least the following conditions;
(a) whether the electronic device is registered with a retailer, (b) whether the electronic device is flagged as having been returned to a store, (c) whether a sale of the electronic device has been reported, and (d) whether the electronic device is reported as stolen;selecting a procedure to be executed by the agent based on said status, the procedure being dependent upon at least conditions (a)-(d), wherein selecting a procedure to be executed comprises, when the electronic device is determined to be (1) registered with a retailer, (2) not flagged as having been returned to a store, (3) not reported as sold, and (4) not reported as stolen, selecting a rogue device procedure that causes an alert message to be displayed on the electronic device; and when the electronic device is determined to have made the call while both (1) not reported as sold and (2) not reported as stolen, causing an alert message to be sent to a seller of the electronic device, said alert message representing a determination that the electronic device placed the call while having a status of both not sold and not reported as stolen. - View Dependent Claims (13, 14, 15, 16)
-
Specification