×

Systems and methods for collecting thief-identifying information on stolen computing devices

  • US 9,256,766 B1
  • Filed: 08/28/2013
  • Issued: 02/09/2016
  • Est. Priority Date: 08/28/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for collecting thief-identifying information on stolen computing devices, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • receiving an indication that the computing device has been stolen;

    determining that an attempt by a thief of the stolen computing device to log into a user account of the thief via the stolen computing device was successful;

    collecting, at the stolen computing device based at least in part on determining that the attempt was successful, information capable of identifying the thief, wherein the information capable of identifying the thief is accessible at the stolen computing device only when the thief has successfully logged into the user account of the thief via the stolen computing device;

    reporting, to a remote computing device, the information capable of identifying the thief.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×