Device theft protection associating a device identifier and a user identifier
First Claim
1. A method implemented in a computing device, the method comprising:
- determining that theft protection is to be enabled on the computing device;
sending, to an identity service over a network, user credentials of a user of the computing device;
receiving, from the identity service, a ticket indicating that the user credentials have been verified by the identity service;
sending, to a key service over the network, the ticket;
receiving, from the key service, a data value having been generated by the key service by applying a cryptographic hash function to a combination of a recovery key for the computing device and a device identifier that identifies the computing device;
saving the data value as an authenticated variable on the computing device by writing the data value to an authenticated variable storage system of the computing device;
receiving user input that is the recovery key of the computing device;
writing the recovery key to the authenticated variable storage system as an unauthenticated variable;
generating an additional data value based on the user input as well as the device identifier that identifies the computing device;
determining whether the data value and the additional data value are the same value; and
changing the computing device to an unprotected state in response to the data value and the additional data value being the same value.
1 Assignment
0 Petitions
Accused Products
Abstract
When theft protection of a computing device is initiated, credentials of the user are provided to one or more services that verify the credentials and generate a recovery key. A data value is generated based on the recovery key and an identifier of the computing device (e.g., by applying a cryptographic hash function to the recovery key and the computing device identifier), and the data value is provided to the computing device, which stores the data value at the computing device. When a user is prompted to prove his or her ownership of the device, the owner can prove his or her ownership of the device in different manners by accessing the one or more services via a network (e.g., the Internet), or by providing the recovery key (e.g., obtained using another computing device) to the computing device.
-
Citations
20 Claims
-
1. A method implemented in a computing device, the method comprising:
-
determining that theft protection is to be enabled on the computing device; sending, to an identity service over a network, user credentials of a user of the computing device; receiving, from the identity service, a ticket indicating that the user credentials have been verified by the identity service; sending, to a key service over the network, the ticket; receiving, from the key service, a data value having been generated by the key service by applying a cryptographic hash function to a combination of a recovery key for the computing device and a device identifier that identifies the computing device; saving the data value as an authenticated variable on the computing device by writing the data value to an authenticated variable storage system of the computing device; receiving user input that is the recovery key of the computing device; writing the recovery key to the authenticated variable storage system as an unauthenticated variable; generating an additional data value based on the user input as well as the device identifier that identifies the computing device; determining whether the data value and the additional data value are the same value; and changing the computing device to an unprotected state in response to the data value and the additional data value being the same value. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computing device comprising:
-
one or more hardware processors; and computer-readable storage medium having stored thereon multiple instructions that, responsive to execution by the one or more processors, cause the one or more processors to perform acts including; determining that theft protection is to be enabled on the computing device; sending, to an identity service over a network, user credentials of a user of the computing device; receiving, from the identity service, a data structure indicating that the user credentials have been verified by the identity service; sending, to a key service over the network, the data structure; receiving, from the key service, a first data value having been generated by the key service by applying a cryptographic hash function to a combination of a recovery key for the computing device and a device identifier that identifies the computing device; saving the first data value as an authenticated variable on the computing device by writing the first data value to an authenticated variable storage system of the computing device; receiving user input that is the recovery key of the computing device; writing the recovery key to the authenticated variable storage system as an unauthenticated variable; generating a second data value based on the user input as well as the device identifier that identifies the computing device; determining whether the first data value and the second data value are the same value; and changing the computing device to an unprotected state in response to the first data value and the second data value being the same value. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A device comprising:
-
one or more hardware processors; an authenticated variable storage system; and computer-readable storage medium having stored thereon multiple instructions that, responsive to execution by the one or more processors, cause the one or more processors to; determine that theft protection is to be enabled on the device; send, to an identity service over a network, user credentials of a user of the device; receive, from the identity service, a ticket indicating that the user credentials have been verified by the identity service; send, to a key service over the network, the ticket; receive, from the key service, a data value having been generated by the key service by applying a cryptographic hash function to a combination of a recovery key for the device and a device identifier that identifies the device; save the data value as an authenticated variable on the device by writing the data value to the authenticated variable storage system; receive user input that is the recovery key of the device; write the recovery key to the authenticated variable storage system as an unauthenticated variable; generate an additional data value based on the user input as well as the device identifier that identifies the device; determine whether the data value and the additional data value are the same value; and change the device to an unprotected state in response to the data value and the additional data value being the same value. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification