Mobile device or computer theft recovery system and method
First Claim
1. A computer theft recovery system, comprising:
- a mobile device including a memory and a processor that;
receives a reported theft status and an external internet protocol (IP) address, wherein the reported theft status indicates that the mobile device is or was reported lost or stolen;
collects available Wi-Fi, cellular tower or global positioning system (GPS) location data representative of a current location of the mobile device and for forwarding the same to a geo-location service provider;
receives geo-location data from the geo-location service provider;
detects network configuration data of the mobile device including an internal IP address and an internal host address;
forwards the network configuration data and the geolocation data directly to a specified personal e-mail address belonging to a registered owner of the mobile device;
receives a data wipe command; and
communicates with a storage server to back up encrypted data from the mobile device prior to a data wipe of the mobile device.
3 Assignments
0 Petitions
Accused Products
Abstract
A mobile device, e.g. portable computer, location tracking and data backup-and-wipe system and method enable a lost or stolen device to be recovered by reporting to its rightful owner and optionally to others its approximate location via triangulation and the use of location service providers. Social network members may be made aware automatically of the location of a reported lost or stolen device and can assist the rightful owner in recovering it based upon their identification of the user of the device, whether by the location coordinates or by viewing a photographic image taken by the computer. Alternatively, in governmental and/or institutional settings having privacy concerns, no photographic images are sent to a public website. Instead, they are sent to a proprietary employer server and maintained behind an institutional firewall.
44 Citations
20 Claims
-
1. A computer theft recovery system, comprising:
a mobile device including a memory and a processor that; receives a reported theft status and an external internet protocol (IP) address, wherein the reported theft status indicates that the mobile device is or was reported lost or stolen; collects available Wi-Fi, cellular tower or global positioning system (GPS) location data representative of a current location of the mobile device and for forwarding the same to a geo-location service provider; receives geo-location data from the geo-location service provider; detects network configuration data of the mobile device including an internal IP address and an internal host address; forwards the network configuration data and the geolocation data directly to a specified personal e-mail address belonging to a registered owner of the mobile device; receives a data wipe command; and communicates with a storage server to back up encrypted data from the mobile device prior to a data wipe of the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
12. A mobile device theft recovery and data recovery method comprising:
-
receiving a reported theft status and an external internet protocol (IP) address, wherein the reported theft status indicates that a mobile device is or was reported lost or stolen; collecting available Wi-Fi, cellular tower or global positioning system (GPS) location data representative of a current location of the mobile device and for forwarding the same to a geo-location service provider; receiving geo-location data from the geo-location service provider; detecting the mobile device'"'"'s network configuration data including an internal IP address and an internal host address; forwarding the network configuration data and the geolocation data directly to a specified personal e-mail address belonging to a registered owner of the mobile device; receiving a data wipe command; and backing up encrypted data from the mobile device to a storage server prior to a data wipe of the mobile device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable medium storing instructions that, when executed by a processor, causes the processor to:
-
receive a reported theft status and an external internet protocol (IP) address, wherein the reported theft status indicates that a mobile device is or was reported lost or stolen; collect available Wi-Fi, cellular tower or global positioning system (GPS) location data representative of a current location of the mobile device and for forwarding the same to a geo-location service provider; receive geo-location data from the geo-location service provider; detect the mobile device'"'"'s network configuration data including an internal IP address and an internal host address; forward the network configuration data and the geolocation data directly to a specified personal e-mail address belonging to a registered owner of the mobile device; receive a data wipe command; and back up encrypted data from the mobile device to a storage server prior to a data wipe of the mobile device.
-
Specification