Systems and methods for remotely controlling a lost mobile communications device
First Claim
1. A method for a client computer user to remotely control a lost mobile communications device comprising:
- at a server, processing authorization credentials received from the client computer user to determine whether the client computer user is authorized to access the server to issue a request for an action to be performed by the lost mobile communications device;
at the server, and after authenticating the authorization credentials, receiving from the client computer user a command request for an action to be performed by the lost mobile communications device;
transmitting a command from the server to the lost mobile communications device, the command corresponding to the received request for the action to be performed by the lost mobile communications device;
in response to the transmitted command, receiving at the server, information about the lost mobile communications device;
interpreting the received information about the lost mobile communications device to determine whether the transmitted command was performed or not performed by the lost mobile communications device;
if the interpretation of the received information indicates that the command was performed by the lost mobile communications device, providing a first notification from the server to the client computer user that the command was performed, the notification formatted for display after a request for action status; and
if the interpretation of the received information indicates that the command was not performed by the lost mobile communications device, providing a second notification from the server to the client computer user that the command was not performed, the second notification formatted for display after a request for action status.
11 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for remotely controlling a lost mobile communications device are disclosed. Authorization credentials may be received and a command request for an action to be performed by a lost mobile communications device may further be received. A command corresponding to the command request may be transmitted to the lost mobile communications device. In response to the transmission of the command, information about the lost mobile communications device may be received and interpreted to determine whether the transmitted command was performed or not performed by the lost mobile communications device. A notification may be provided based on whether or not the command was performed by the lost mobile communications device.
-
Citations
43 Claims
-
1. A method for a client computer user to remotely control a lost mobile communications device comprising:
-
at a server, processing authorization credentials received from the client computer user to determine whether the client computer user is authorized to access the server to issue a request for an action to be performed by the lost mobile communications device; at the server, and after authenticating the authorization credentials, receiving from the client computer user a command request for an action to be performed by the lost mobile communications device; transmitting a command from the server to the lost mobile communications device, the command corresponding to the received request for the action to be performed by the lost mobile communications device; in response to the transmitted command, receiving at the server, information about the lost mobile communications device; interpreting the received information about the lost mobile communications device to determine whether the transmitted command was performed or not performed by the lost mobile communications device; if the interpretation of the received information indicates that the command was performed by the lost mobile communications device, providing a first notification from the server to the client computer user that the command was performed, the notification formatted for display after a request for action status; and if the interpretation of the received information indicates that the command was not performed by the lost mobile communications device, providing a second notification from the server to the client computer user that the command was not performed, the second notification formatted for display after a request for action status. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for a client computer user to remotely place a lost mobile communications device into a lost mode comprising:
-
at a server, processing authorization credentials received from the client computer user to determine whether the client computer user is authorized to access the server to issue a request for an action to be performed by the lost mobile communications device; at the server, and after authenticating the authorization credentials, receiving from the client computer user at least one command request for placing the lost mobile communication device in a lost mode, the lost mode including locking the lost mobile communication device, displaying a contact phone number on a lock screen of the lost mobile device, and transmitting from the lost mobile device for display to the client computer user a recent location history of the lost mobile communications device; transmitting at least one command from the server to the lost mobile communications device, the command corresponding to the at least one command request for the actions to be performed by the lost mobile communications device; in response to the transmitted command, receiving at the server, information about the lost mobile communications device; interpreting the received information about the lost mobile communications device to determine whether the transmitted command was performed or not performed by the lost mobile communications device; if the interpretation of the received information indicates that the command was performed by the lost mobile communications device, providing a first notification from the server to the client computer user that the command was performed, the notification formatted for display after a request for action status; and if the interpretation of the received information indicates that the command was not performed by the lost mobile communications device, providing a second notification from the server to the client computer user that the command was not performed, the second notification formatted for display after a request for action status. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A non-transitory computer-readable storage medium having stored thereon a plurality of instructions which, when executed by a processor, cause the processor to perform the steps of a method comprising:
-
at a server, processing authorization credentials received from a client computer user to determine whether the client computer user is authorized to access the server to issue a request for an action to be performed by a lost mobile communications device; at the server, and after authenticating the authorization credentials, receiving from the client computer user a command request for an action to be performed by the lost mobile communications device; transmitting a command from the server to the lost mobile communications device, the command corresponding to the received request for the action to be performed by the lost mobile communications device; in response to the transmitted command, receiving at the server, information about the lost mobile communications device; interpreting the received information about the lost mobile communications device to determine whether the transmitted command was performed or not performed by the lost mobile communications device; if the interpretation of the received information indicates that the command was performed by the lost mobile communications device, providing a first notification from the server to the client computer user that the command was performed, the notification formatted for display after a request for action status; and if the interpretation of the received information indicates that the command was not performed by the lost mobile communications device, providing a second notification from the server to the client computer user that the command was not performed, the second notification formatted for display after a request for action status. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A non-transitory computer-readable storage medium having stored thereon a plurality of instructions which, when executed by a processor, cause the processor to perform the steps of a method comprising:
-
at a server, processing authorization credentials received from a client computer user to determine whether the client computer user is authorized to access the server to issue a request for an action to be performed by a lost mobile communications device; at the server, and after authenticating the authorization credentials, receiving from the client computer user at least one command request for placing the lost mobile communication device in a lost mode, the lost mode including locking the lost mobile communication device, displaying a contact phone number on a lock screen of the lost mobile device, and transmitting from the lost mobile device for display to the client computer user a recent location history of the lost mobile communications device; transmitting at least one command from the server to the lost mobile communications device, the command corresponding to the at least one command request for the actions to be performed by the lost mobile communications device; in response to the transmitted command, receiving at the server, information about the lost mobile communications device; interpreting the received information about the lost mobile communications device to determine whether the transmitted command was performed or not performed by the lost mobile communications device; if the interpretation of the received information indicates that the command was performed by the lost mobile communications device, providing a first notification from the server to the client computer user that the command was performed, the notification formatted for display after a request for action status; and if the interpretation of the received information indicates that the command was not performed by the lost mobile communications device, providing a second notification from the server to the client computer user that the command was not performed, the second notification formatted for display after a request for action status. - View Dependent Claims (31, 32, 33, 34)
-
-
35. A method for a client computer user to remotely control a lost mobile communications device comprising:
-
at a server, processing authentication information received from the client computer user to determine whether the client computer user is authorized to access the server to issue a request for an action to be performed by the lost mobile communications device; at the server, and after authenticating the authentication information, receiving from the client computer user a request for an action to be performed by the lost mobile communications device; transmitting a command from the server to the lost mobile communications device, the command corresponding to the received request for the action to be performed by the lost mobile communications device; in response to the transmitted command, receiving at the server, information about the lost mobile communications device; interpreting the received information about the lost mobile communications device to determine whether the transmitted command was performed or not performed by the lost mobile communications device; if the interpretation of the received information indicates that the command was performed by the lost mobile communications device, providing a first notification from the server to the client computer user that the command was performed, the notification formatted for display after a request for action status; and if the interpretation of the received information indicates that the command was not performed by the lost mobile communications device, providing a second notification from the server to the client computer user that the command was not performed, the second notification formatted for display after a request for action status, wherein the request for action includes remotely erasing at least some user data stored on the lost mobile communications device and displaying a contact phone number on a lock screen of the lost mobile communication device, and wherein the contact phone number may be called from the lock screen.
-
-
36. A method for a client computer user to remotely control a lost mobile communications device comprising:
-
at a server, processing authentication information received from the client computer user to determine whether the client computer user is authorized to access the server to issue a request for an action to be performed by the lost mobile communications device; at the server, and after authenticating the authentication information, receiving from the client computer user a request for an action to be performed by the lost mobile communications device; transmitting a command from the server to the lost mobile communications device, the command corresponding to the received request for the action to be performed by the lost mobile communications device; in response to the transmitted command, receiving at the server, information about the lost mobile communications device; interpreting the received information about the lost mobile communications device to determine whether the transmitted command was performed or not performed by the lost mobile communications device; if the interpretation of the received information indicates that the command was performed by the lost mobile communications device, providing a first notification from the server to the client computer user that the command was performed, the notification formatted for display after a request for action status; and if the interpretation of the received information indicates that the command was not performed by the lost mobile communications device, providing a second notification from the server to the client computer user that the command was not performed, the second notification formatted for display after a request for action status, wherein the request for action includes remotely erasing at least some user data stored on the lost mobile communication device, and wherein the client computer user may reactivate the lost mobile communication device by entering at least some of the authentication information onto a screen of the lost mobile communication device.
-
-
37. A method for retrieving a lost mobile communications device comprising:
-
processing authentication information received from a mobile communications device user to determine whether the mobile communications device user is authorized to remotely issue a request for an action to be performed by the lost mobile communications device; after authenticating the authentication information, receiving from the mobile communications device user a request for an action to be performed by the lost mobile communications device; and transmitting a command to the lost mobile communications device, the command corresponding to the received request for the action to be performed by the lost mobile communications device, wherein the request for action includes remotely erasing at least some user data stored on the lost mobile communications device and displaying a contact phone number on a lock screen of the lost mobile communication device, and wherein the contact phone number may be called from the lock screen.
-
-
38. A method for retrieving a lost mobile communications device comprising:
-
processing authentication information received from a mobile communications device user to determine whether the mobile communications device user is authorized to remotely issue a request for an action to be performed by the lost mobile communications device; after authenticating the authentication information, receiving from the mobile communications device user a request for an action to be performed by the lost mobile communications device; and transmitting a command to the lost mobile communications device, the command corresponding to the received request for the action to be performed by the lost mobile communications device, wherein the request for action includes remotely erasing at least some of user data stored on the lost mobile communication device, and wherein the mobile communications device user may reactivate the lost mobile communication device by entering at least some of the authentication information onto a screen of the lost mobile communication device.
-
-
39. A method for securing a lost mobile communications device comprising:
-
processing authentication information received from a mobile communications device user to determine whether the mobile communications device user is authorized to remotely issue a request for an action to be performed by the lost mobile communications device; after authenticating the authentication information, receiving from the mobile communications device user a request for an action to be performed by the lost mobile communications device; and transmitting a command to the lost mobile communications device, the command corresponding to the received request for the action to be performed by the lost mobile communications device, wherein the request for action includes remotely erasing at least some of user data stored on the lost mobile communication device.
-
-
40. A method for retrieving a lost mobile communications device comprising:
-
processing authentication information received from a mobile communications device user to determine whether the mobile communications device user is authorized to remotely issue a request for an action to be performed by the lost mobile communications device; after authenticating the authentication information, receiving from the mobile communications device user a request for an action to be performed by the lost mobile communications device; and transmitting a command to the lost mobile communications device, the command corresponding to the received request for the action to be performed by the lost mobile communications device, wherein the request for action includes remotely playing a sound from the lost mobile communication device at full volume for a predetermined period of time.
-
-
41. A method for retrieving a lost mobile communications device comprising:
-
processing authentication information received from a mobile communications device user to determine whether the mobile communications device user is authorized to remotely issue a request for an action to be performed by the lost mobile communications device; after authenticating the authentication information, receiving from the mobile communications device user a request for an action to be performed by the lost mobile communications device; and transmitting a command to the lost mobile communications device, the command corresponding to the received request for the action to be performed by the lost mobile communications device, wherein the request for action includes remotely retrieving location information from the lost mobile communication device, and displaying to the mobile communication device user a map indicating the approximate location of the lost mobile communication device, location accuracy information and a time the lost mobile communication device was located.
-
-
42. A method for retrieving a lost mobile communications device comprising:
-
processing authentication information received from a mobile communications device user to determine whether the mobile communications device user is authorized to remotely issue a request for an action to be performed by the lost mobile communications device; after authenticating the authentication information, receiving from the mobile communications device user requests for an action to be performed by the lost mobile communications device; and transmitting commands to the lost mobile communications device, the commands corresponding to the received requests for the action to be performed by the lost mobile communications device, wherein one request for action includes remotely retrieving location information from the lost mobile communication device, and in response thereto, displaying to the mobile communication device user a map indicating the approximate location of the lost mobile communication device, location accuracy information and a time the lost mobile communication device was located, and wherein further requests for action include at least one of (a) remotely playing a sound from the lost mobile communication device at full volume for a predetermined period of time, (b) remotely erasing at least some of user data stored on the lost mobile communication device, (c) remotely locking the lost mobile communication device, and (d) remotely changing a password of the mobile communication device.
-
-
43. A method for a client computer user to remotely control a lost mobile communications device comprising:
-
at a server, processing authentication information received from the client computer user user to determine whether the mobile communications device user is authorized to remotely issue a request for an action to be performed by the lost mobile communications device; at a server, after authenticating the authentication information, receiving from the client computer user requests for an action to be performed by the lost mobile communications device; and transmitting commands to the lost mobile communications device, the commands corresponding to the received requests for the action to be performed by the lost mobile communications device, wherein one request for action includes remotely retrieving location information from the lost mobile communication device, and in response thereto, displaying to the mobile communication device user a map indicating the approximate location of the lost mobile communication device, location accuracy information and a time the lost mobile communication device was located, and wherein further requests for action include at least one of (a) remotely playing a sound from the lost mobile communication device at full volume for a predetermined period of time, (b) remotely erasing at least some of user data stored on the lost mobile communication device, (c) remotely locking the lost mobile communication device, and (d) remotely changing a password of the mobile communication device.
-
Specification