×

Method for mitigating the unauthorized use of a device

  • US 9,576,157 B2
  • Filed: 09/03/2008
  • Issued: 02/21/2017
  • Est. Priority Date: 04/02/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • detecting, by a mobile device, that a security compromise event has occurred; and

    altering the function of the mobile device in response to said security compromise event to mitigate loss of control by the authorized user by presenting, by the mobile device an automated message to a current user of the mobile device, wherein the automated message comprises at least one of a notification;

    that the current user may press any button to initiate contact with a security authority, wherein the security authority is an entity other than the owner of the mobile device and the authorized user of the mobile device;

    that the mobile device has been lost or stolen;

    that the current user of the mobile device should return the device;

    commanding the current user to return the device;

    that a reward is offered for the prompt return of the mobile device; and

    regarding instructions informing the current user how to return the mobile device to an authorized user;

    obtaining a theft notification record for the authorized user; and

    contacting the authorized user by at least one of;

    a phone call placed to a phone number specified in the theft notification record, whereupon audio instructions are provided to the authorized user regarding how to contact the current user of the mobile device to recover the mobile device; and

    a text message sent electronically to an address specified in the theft notification record, whereupon textual instructions are provided to the authorized user regarding how to contact the current user of the mobile device to recover the mobile, device; and

    a printed message sent by conventional mail to an address specified in the theft notification record, whereupon textual instructions are provided to the authorized user regarding how to contact the current user of the mobile device to recover the mobile devicewherein;

    the address specified in the theft notification record is furnished by the authorized user during a registration process.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×