Systems for finding a lost transient storage device
First Claim
1. A method performed on a computing device comprising at least one processor and memory, the method comprising:
- communicatively coupling the computing device with a host;
receiving, by the computing device from the host to which the computing device is communicatively coupled, status information about the computing device that was provided to the host from a remote service, the status information indicating that the computing device is lost or stolen;
establishing, responsive to the received status information, a secure tunneling channel between the computing device and the remote service, where the secure tunneling channel passes through the host and is provided by the host; and
mutually authenticating, by the computing device with the remote service, via the secure tunneling channel;
communicating, by the computing device in response to the mutual authenticating, data through the host with the remote service over the secure tunneling channel between the computing device and the remote service, where the computing device, the host, and the remote service are separate and distinct from each other.
2 Assignments
0 Petitions
Accused Products
Abstract
Processes for identifying and recovering a lost transient storage device are provided. In some processes, information regarding the owner of the device is obtained. The device ownership information may be stored on a remote service with which the device is registered and/or may be stored on the device itself. In one process, the remote service provides the device with customized device-executable code when the device is registered. The device may also contain information regarding trusted systems. The process includes obtaining status information indicating whether a device is lost when the device is connected to a host system. In some processes, the status is determined by a remote service. In other processes, the status is determined by the device. If the device is lost then a device recovery plan is executed. Portions of a device recovery plan may be executed on the remote service, the host system, and/or the device.
-
Citations
20 Claims
-
1. A method performed on a computing device comprising at least one processor and memory, the method comprising:
-
communicatively coupling the computing device with a host; receiving, by the computing device from the host to which the computing device is communicatively coupled, status information about the computing device that was provided to the host from a remote service, the status information indicating that the computing device is lost or stolen; establishing, responsive to the received status information, a secure tunneling channel between the computing device and the remote service, where the secure tunneling channel passes through the host and is provided by the host; and mutually authenticating, by the computing device with the remote service, via the secure tunneling channel; communicating, by the computing device in response to the mutual authenticating, data through the host with the remote service over the secure tunneling channel between the computing device and the remote service, where the computing device, the host, and the remote service are separate and distinct from each other. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. At least one computer storage device that comprises computer-executable instructions that, based on execution by at least one processor of a computing device that also includes memory, configure the computing device to perform actions comprising:
-
communicatively coupling the computing device with a host; receiving, by the computing device from the host to which the computing device is communicatively coupled, status information about the computing device that was provided to the host from a remote service, the status information indicating that the computing device is lost or stolen; establishing, responsive to the received status information, a secure tunneling channel between the computing device and the remote service, where the secure tunneling channel passes through the host and is provided by the host; and mutually authenticating, by the computing device with the remote service, via the secure tunneling channel; communicating, by the computing device in response to the mutual authenticating, data through the host with the remote service over the secure tunneling channel between the computing device and the remote service, where the computing device, the host, and the remote service are separate and distinct from each other. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computing device comprising:
-
at least one processor; memory coupled to the at least one processor; and a port coupled to the at least one processor and memory and via which the computing device is configured to communicatively coupling the computing device with a host; the port via which the computing device is further configured to receive, from the host to which the computing device is communicatively coupled, status information about the computing device that was provided to the host from a remote service, the status information indicating that the computing device is lost stolen; the port via which the computing device is further configured to establish, responsive to the received status information, a secure tunneling channel between the computing device and the remote service, where the secure tunneling channel passes through the host and is provided by the host; and the port via which the computing device is further configured to mutually authenticate with the remote service via the secure tunneling channel; the port via which the computing device is further configured to communicate, in response to the computing device mutual authenticating with the remote service via the secure tunneling channel, data through the host with the remote service over the secure tunneling channel between the computing device and the remote service, where the computing device, the host, and the remote service are separate and distinct from each other. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification