Systems and methods for locking and disabling a device in response to a request
First Claim
Patent Images
1. A method comprising:
- receiving, by a mobile communications device, a request to lock the mobile communications device, the request to lock the mobile communications device being received from an application operating remotely from the mobile communications device;
disabling at least some functionality of the mobile communications device in response to the request to lock the mobile communications device; and
displaying contact information on the display of the mobile communications device in response to the request to lock the mobile communications device, the contact information including one or more alternate contact addresses or numbers corresponding to an owner of the mobile communications device.
10 Assignments
0 Petitions
Accused Products
Abstract
A computing device may be locked and contact information associated with an owner of the computing device may be displayed. For example, a request to lock the computing device may be received. In response to such a request, at least some of the functionality of the computing device may be disabled. For example, control input or input keys of the computing device may be at least partially disabled. Furthermore, contact information may be shown on the display of the computing device. For example, the phone number, address, email address, or other information of the owner of the computing device may be displayed.
-
Citations
23 Claims
-
1. A method comprising:
-
receiving, by a mobile communications device, a request to lock the mobile communications device, the request to lock the mobile communications device being received from an application operating remotely from the mobile communications device; disabling at least some functionality of the mobile communications device in response to the request to lock the mobile communications device; and displaying contact information on the display of the mobile communications device in response to the request to lock the mobile communications device, the contact information including one or more alternate contact addresses or numbers corresponding to an owner of the mobile communications device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 21)
-
-
8. A non-transitory computer-readable medium carrying one or more sequences of instructions which, when executed by one or more processors, cause the one or more processors to perform operations comprising:
-
receiving, by a mobile communications device, a request to lock the mobile communications device, the request to lock the mobile communications device being received from an application operating remotely from the mobile communications device; disabling at least some functionality of the mobile communications device in response to the request to lock the mobile communications device; and displaying contact information on the display of the mobile communications device in response to the request to lock the mobile communications device, the contact information including one or more alternate contact addresses or numbers corresponding to an owner of the mobile communications device. - View Dependent Claims (9, 10, 11, 12, 13, 14, 22)
-
-
15. A method comprising:
-
receiving, by a mobile communications device, a lock command for the mobile communications device, the lock command for the mobile communications device being received from an application operating remotely from the mobile communications device; disabling at least some control input of the mobile communications device in response to the lock command for the mobile communications device; and displaying contact information on the display of the mobile communications device in response to the lock command for the mobile communications device, the contact information including one or more alternate contact addresses or numbers corresponding to an owner of the mobile communications device. - View Dependent Claims (16, 17, 18, 19, 20, 23)
-
Specification