Apparatus and method for determining a wireless device's location after shutdown
First Claim
1. A machine-implemented method for securing a wireless data processing device comprising:
- receiving, by a wireless data processing device, at least one input which comprises image data which provides a security code;
powering down the wireless data processing device into a security mode in response to the wireless data processing device determining that the received at least one input which provides the security code has been entered incorrectly a predetermined number of times;
powering up predetermined portions of the wireless data processing device, in the security mode;
obtaining location information, in the security mode, of the wireless data processing device;
transmitting, in the security mode, the location information of the wireless data processing device over one or more communication channels; and
automatically powering down the predetermined portions of the wireless data processing device in the security mode.
0 Assignments
0 Petitions
Accused Products
Abstract
A wireless data processing device is described which periodically exits an unpowered state and transmits location data. For example, one embodiment of a wireless data processing device comprises: power circuitry for maintaining the wireless data processing device in a powered or unpowered state, the power circuitry causing the wireless data processing device to enter into an unpowered state responsive to user input; a timer to periodically power up the wireless device or portion thereof in response to reaching a predetermined time; a location services module determining a current location of the wireless data processing device using one or more specified location determination techniques; a transmit thread transmitting the current location of the wireless device over one or more specified communication channels; and the power circuitry powering down the wireless data processing device a second time after the current location has been transmitted.
28 Citations
27 Claims
-
1. A machine-implemented method for securing a wireless data processing device comprising:
-
receiving, by a wireless data processing device, at least one input which comprises image data which provides a security code; powering down the wireless data processing device into a security mode in response to the wireless data processing device determining that the received at least one input which provides the security code has been entered incorrectly a predetermined number of times; powering up predetermined portions of the wireless data processing device, in the security mode; obtaining location information, in the security mode, of the wireless data processing device; transmitting, in the security mode, the location information of the wireless data processing device over one or more communication channels; and automatically powering down the predetermined portions of the wireless data processing device in the security mode. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer readable medium programmed with instructions that when executed by a processing system, perform operations that implement a method for securing a wireless data processing device, the operations comprising:
-
receiving, by a wireless data processing device, at least one input which comprises image data which provides a security code; powering down the wireless data processing device into a security mode in response to the wireless data processing device determining that the received at least one input which provides the security code has been entered incorrectly a predetermined number of times; powering up predetermined portions of the wireless data processing device, in the security mode; obtaining location information, in the security mode, of the wireless data processing device; transmitting, in the security mode, the location information of the wireless data processing device over one or more communication channels; and automatically powering down the predetermined portions of the wireless data processing device in the security mode. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system comprising:
-
a processing system programmed with executable instructions that, when executed, perform a machine-implemented method for securing a wireless data processing device comprising; receiving, by a wireless data processing device, at least one input which comprises image data which provides a security code; powering down the wireless data processing device into a security mode in response to the wireless data processing device determining that the received at least one input which provides the security code has been entered incorrectly a predetermined number of times; powering up predetermined portions of the wireless data processing device, in the security mode; obtaining location information, in the security mode, of the wireless data processing device; transmitting, in the security mode, the location information of the wireless data processing device over one or more communication channels; and automatically powering down the predetermined portions of the wireless data processing device in the security mode. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification