Systems and methods for executing anti-theft procedures for a device
First Claim
Patent Images
1. A computer-implemented method to execute anti-theft procedures for a device, comprising:
- detecting, by a processor of a mobile communications device, a receipt of a first audio file in a voicemail system external to the mobile communications device, wherein the first audio file comprises a voicemail message;
downloading, by the processor, the first audio file from the voicemail system;
identifying, by the processor, a size of the first audio file;
responsive to the size of the first audio file satisfying a predefined size, converting, by the processor, the first audio file to a first text file, the size of the first audio file satisfying the predefined size being indicative of the first audio file including an anti-theft command;
analyzing, by the processor, the first text file to identify the anti-theft command, wherein the anti-theft command delivered via the first audio file comprises a lock command, a wipe command, or a find command;
executing, by the processor, the anti-theft command based at least in part on the analysis;
upon executing the anti-theft command, generating, by the processor, a second text file;
converting, by the processor, the second text file to a second audio file;
determining, by the processor, a telephone number linked to a source of the first audio file;
upon determining the telephone number, performing, by the processor, a dialing operation to dial the telephone number linked to the source of the first audio file; and
upon connecting with the source of the first audio file, communicating, by the processor, the second audio file to the source of the first audio file.
5 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method to execute anti-theft procedures for a device is described. Receipt of a first audio file is detected. The first audio file is converted to a first text file. The first text file is analyzed to identify an anti-theft command. The anti-theft command is executed based at least in part on the analysis.
16 Citations
12 Claims
-
1. A computer-implemented method to execute anti-theft procedures for a device, comprising:
-
detecting, by a processor of a mobile communications device, a receipt of a first audio file in a voicemail system external to the mobile communications device, wherein the first audio file comprises a voicemail message; downloading, by the processor, the first audio file from the voicemail system; identifying, by the processor, a size of the first audio file; responsive to the size of the first audio file satisfying a predefined size, converting, by the processor, the first audio file to a first text file, the size of the first audio file satisfying the predefined size being indicative of the first audio file including an anti-theft command; analyzing, by the processor, the first text file to identify the anti-theft command, wherein the anti-theft command delivered via the first audio file comprises a lock command, a wipe command, or a find command; executing, by the processor, the anti-theft command based at least in part on the analysis; upon executing the anti-theft command, generating, by the processor, a second text file; converting, by the processor, the second text file to a second audio file; determining, by the processor, a telephone number linked to a source of the first audio file; upon determining the telephone number, performing, by the processor, a dialing operation to dial the telephone number linked to the source of the first audio file; and upon connecting with the source of the first audio file, communicating, by the processor, the second audio file to the source of the first audio file. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A device configured to execute anti-theft procedures, comprising:
-
a processor of a mobile communications device; and memory in electronic communication with the processor; and instructions stored in the memory, the instructions being executable by the processor to; detect a receipt of a first audio file in a voicemail system external to the mobile communications device, wherein the first audio file comprises a voicemail message; download the first audio file from the voicemail system; identify, by the processor, a size of the first audio file; responsive to the size of the first audio file satisfying a predefined size, convert, by the processor, the first audio file to a first text file, the size of the first audio file satisfying the predefined size being indicative of the first audio file including an anti-theft command; analyze, by the processor, the first text file to identify the anti-theft command, wherein the anti-theft command delivered via the first audio file comprises a lock command, a wipe command, or a find command; and execute by the processor the anti-theft command based at least in part on the analysis; upon executing the anti-theft command, generate a second text file; convert the second text file to a second audio file; determine a telephone number linked to a source of the first audio file; upon determining the telephone number, perform a dialing operation to dial the telephone number linked to the source of the first audio file; and upon connecting with the source of the first audio file, communicate the second audio file to the source of the first audio file. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer-program product to execute, via a processor of a mobile communications device, anti-theft procedures for a device, the computer-program product comprising a non-transitory computer-readable medium having instructions thereon, the instructions being executable by the processor to:
-
detect a receipt of a first audio file in a voicemail system external to the mobile communications device, wherein the first audio file comprises a voicemail message; download the first audio file from the voicemail system; identify, by the processor, a size of the first audio file; responsive to the size of the first audio file satisfying a predefined size, convert, by the processor, the first audio file to a first text file, the size of the first audio file satisfying the predefined size being indicative of the first audio file including an anti-theft command; analyze, by the processor, the first text file to identify the anti-theft command, wherein the anti-theft command delivered via the first audio file comprises a lock command, a wipe command, or a find command; and execute by the processor the anti-theft command based at least in part on the analysis; upon executing the anti-theft command, generate a second text file; convert the second text file to a second audio file; determine a telephone number linked to a source of the first audio file; upon determining the telephone number, perform a dialing operation to dial the telephone number linked to the source of the first audio file; and upon connecting with the source of the first audio file, communicate the second audio file to the source of the first audio file. - View Dependent Claims (12)
-
Specification