Systems and methods for identifying unauthorized users of an electronic device
First Claim
1. A method for identifying unauthorized usage of an electronic device, the method comprising:
- at the electronic device;
monitoring a utilization of a memory included in the electronic device; and
in response to determining, based on a usage increase of the memory by a particular amount within a predetermined period of time, that unauthorized usage of the electronic device is occurring;
configuring the electronic device to, upon being communicatively coupled to a computing device, collect information from the computing device.
0 Assignments
0 Petitions
Accused Products
Abstract
This is generally directed to identifying unauthorized users of an electronic device. In some embodiments, an unauthorized user of the electronic device can be detected by identifying particular activities that may indicate suspicious behavior. In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identity of the owner of the electronic device. When an unauthorized user is detected, various safety measures can be taken. For example, information related to the identity of the unauthorized user, the unauthorized user'"'"'s operation of the electronic device, or the current location of the electronic device can be gathered. As another example, functions of the electronic device can be restricted. In some embodiments, the owner of the electronic device can be notified of the unauthorized user by sending an alert notification through any suitable medium, such as, for example, a voice mail, e-mail, or text message.
29 Citations
20 Claims
-
1. A method for identifying unauthorized usage of an electronic device, the method comprising:
-
at the electronic device; monitoring a utilization of a memory included in the electronic device; and in response to determining, based on a usage increase of the memory by a particular amount within a predetermined period of time, that unauthorized usage of the electronic device is occurring; configuring the electronic device to, upon being communicatively coupled to a computing device, collect information from the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer readable storage medium configured to store instructions that, when executed by a processor included in an electronic device, cause the electronic device to identify unauthorized usage of the electronic device, by carrying out steps that include:
-
monitoring a utilization of a memory included in the electronic device; and in response to determining, based on a usage increase of the memory by a particular amount within a predetermined period of time, that unauthorized usage of the electronic device is occurring; configuring the electronic device to, upon being communicatively coupled to a computing device, collect information from the computing device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. An electronic device configured to identify unauthorized usage of the electronic device, the electronic device comprising:
-
a memory; and a processor configured to carry out steps that include; monitoring a utilization of the memory; and in response to determining, based on a usage increase of the memory by a particular amount within a predetermined period of time, that unauthorized usage of the electronic device is occurring; configuring the electronic device to, upon being communicatively coupled to a computing device, collect information from the computing device. - View Dependent Claims (18, 19, 20)
-
Specification