Systems and methods for collecting thief-identifying information on stolen computing devices
First Claim
1. A computer-implemented method for collecting thief-identifying information on stolen computing devices, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- receiving an indication that the computing device has been stolen;
determining that an attempt by a thief of the stolen computing device to log into a user account of the thief via the stolen computing device was successful;
collecting, at the stolen computing device based at least in part on determining that the attempt was successful, information capable of identifying the thief, wherein the information capable of identifying the thief is accessible at the stolen computing device only when the thief has successfully logged into the user account of the thief via the stolen computing device;
reporting, to a remote computing device, the information capable of identifying the thief.
6 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for collecting thief-identifying information on stolen computing devices may include (1) receiving an indication that a computing device has been stolen, (2) detecting an attempt by a thief of the stolen computing device to access a user account of the thief via the stolen computing device, (3) collecting, based at least in part on detecting the attempt by the thief of the stolen computing device to access the user account of the thief via the stolen computing device, information capable of identifying the thief, and (4) reporting, to a remote computing device, the information capable of identifying the thief. Various other methods, systems, and computer-readable media are also disclosed.
-
Citations
18 Claims
-
1. A computer-implemented method for collecting thief-identifying information on stolen computing devices, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
receiving an indication that the computing device has been stolen; determining that an attempt by a thief of the stolen computing device to log into a user account of the thief via the stolen computing device was successful; collecting, at the stolen computing device based at least in part on determining that the attempt was successful, information capable of identifying the thief, wherein the information capable of identifying the thief is accessible at the stolen computing device only when the thief has successfully logged into the user account of the thief via the stolen computing device; reporting, to a remote computing device, the information capable of identifying the thief. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for collecting thief-identifying information on stolen computing devices, the system comprising:
-
a receiving module that receives an indication that a computing device has been stolen; a detecting module that determines that an attempt by a thief of the stolen computing device to log into a user account of the thief via the stolen computing device was successful; a collecting module that collects, at the stolen computing device based at least in part on the determination that the attempt was successful, information capable of identifying the thief, wherein the information capable of identifying the thief is accessible at the stolen computing device only when the thief has successfully logged into the user account of the thief via the stolen computing device; a reporting module that reports, to a remote computing device, the information capable of identifying the thief; at least one processor that executes the receiving module, the detecting module, the collecting module, and the reporting module. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A non-transitory computer-readable medium comprising one or more computer-executable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
receive an indication that the computing device has been stolen; determine that an attempt by a thief of the stolen computing device to log into a user account of the thief via the stolen computing device was successful; collect, at the stolen computing device based at least in part on determining that the attempt was successful, information capable of identifying the thief, wherein the information capable of identifying the thief is accessible at the stolen computing device only when the thief has successfully logged into the user account of the thief via the stolen computing device; report, to a remote computing device, the information capable of identifying the thief.
-
Specification