Systems for finding a lost transient storage device
First Claim
1. A method for identifying and locating a portable storage device that is lost to its owner and that is connected to a host system, the method comprising:
- sending, by the portable storage device to a remote service via the host system, identification information that identifies the portable storage device, where the portable storage device, the host system, and the remote service are separate and distinct from each other;
receiving, by the portable storage device from the remote service via the host system in response to the sending, status information;
determining, by the portable storage device based on the received status information, that the portable storage device is lost to its owner; and
executing, in response to the determining, a recovery plan that includes the portable storage device communicating with the remote service via the host system over a secure tunneling channel provided by the host system based, the provided secure tunneling channel based on an application provided to the host system by the remote service, and where the portable storage device is configured for being remotely controlled by the remote service via the host system over the provided secure tunneling channel.
2 Assignments
0 Petitions
Accused Products
Abstract
Processes for identifying and recovering a lost transient storage device are provided. In some processes, information regarding the owner of the device is obtained. The device ownership information may be stored on a remote service with which the device is registered and/or may be stored on the device itself. In one process, the remote service provides the device with customized device-executable code when the device is registered. The device may also contain information regarding trusted systems. The process includes obtaining status information indicating whether a device is lost when the device is connected to a host system. In some processes, the status is determined by a remote service. In other processes, the status is determined by the device. If the device is lost then a device recovery plan is executed. Portions of a device recovery plan may be executed on the remote service, the host system, and/or the device.
-
Citations
20 Claims
-
1. A method for identifying and locating a portable storage device that is lost to its owner and that is connected to a host system, the method comprising:
-
sending, by the portable storage device to a remote service via the host system, identification information that identifies the portable storage device, where the portable storage device, the host system, and the remote service are separate and distinct from each other; receiving, by the portable storage device from the remote service via the host system in response to the sending, status information; determining, by the portable storage device based on the received status information, that the portable storage device is lost to its owner; and executing, in response to the determining, a recovery plan that includes the portable storage device communicating with the remote service via the host system over a secure tunneling channel provided by the host system based, the provided secure tunneling channel based on an application provided to the host system by the remote service, and where the portable storage device is configured for being remotely controlled by the remote service via the host system over the provided secure tunneling channel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. At least one computer storage device storing computer-executable instructions that, when executed by a computing device, cause the computing device to perform actions for identifying and locating a portable storage device that is lost to its owner and that is connected with a host system, the actions comprising:
-
sending, by the portable storage device to a remote service via the host system, identification information that identifies the portable storage device, where the portable storage device, the host system, and the remote service are separate and distinct from each other; receiving, by the portable storage device from the remote service via the host system in response to the sending, status information; determining, by the portable storage device based on the received status information, that the portable storage device is lost to its owner; and executing, in response to the determining, a recovery plan that includes the portable storage device communicating with the remote service via the host system over a secure tunneling channel provided by the host system, the provided secure tunneling channel based on an application provided to the host system by the remote service, and where the portable storage device is configured for being remotely controlled by the remote service via the host system over the provided secure tunneling channel. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A system comprising a portable storage device that is lost to its owner and that is connected to a host system, the system configured for performing actions comprising:
-
sending, to a remote service via the host system, identification information that identifies the portable storage device, where the portable storage device, the host system, and the remote service are separate and distinct from each other; and receiving, by the portable storage device from the remote service via the host system in response to the sending, status information; determining, by the portable storage device based on the received status information, that the portable storage device is lost to its owner; and executing, in response to the determining, a recovery plan that includes the portable storage device communicating with the remote service via the host system over a secure tunneling channel provided by the host system, the provided secure tunneling channel based on an application provided to the host system by the remote service, and where the portable storage device is configured for being remotely controlled by the remote service via the host system over the provided secure tunneling channel. - View Dependent Claims (17, 18, 19, 20)
-
Specification