Method for mitigating the unauthorized use of a device
First Claim
1. A method comprising:
- detecting, by a mobile device, that a security compromise event has occurred; and
altering the function of the mobile device in response to said security compromise event to mitigate loss of control by the authorized user by presenting, by the mobile device an automated message to a current user of the mobile device, wherein the automated message comprises at least one of a notification;
that the current user may press any button to initiate contact with a security authority, wherein the security authority is an entity other than the owner of the mobile device and the authorized user of the mobile device;
that the mobile device has been lost or stolen;
that the current user of the mobile device should return the device;
commanding the current user to return the device;
that a reward is offered for the prompt return of the mobile device; and
regarding instructions informing the current user how to return the mobile device to an authorized user;
obtaining a theft notification record for the authorized user; and
contacting the authorized user by at least one of;
a phone call placed to a phone number specified in the theft notification record, whereupon audio instructions are provided to the authorized user regarding how to contact the current user of the mobile device to recover the mobile device; and
a text message sent electronically to an address specified in the theft notification record, whereupon textual instructions are provided to the authorized user regarding how to contact the current user of the mobile device to recover the mobile, device; and
a printed message sent by conventional mail to an address specified in the theft notification record, whereupon textual instructions are provided to the authorized user regarding how to contact the current user of the mobile device to recover the mobile devicewherein;
the address specified in the theft notification record is furnished by the authorized user during a registration process.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
-
Citations
25 Claims
-
1. A method comprising:
-
detecting, by a mobile device, that a security compromise event has occurred; and altering the function of the mobile device in response to said security compromise event to mitigate loss of control by the authorized user by presenting, by the mobile device an automated message to a current user of the mobile device, wherein the automated message comprises at least one of a notification; that the current user may press any button to initiate contact with a security authority, wherein the security authority is an entity other than the owner of the mobile device and the authorized user of the mobile device; that the mobile device has been lost or stolen; that the current user of the mobile device should return the device; commanding the current user to return the device; that a reward is offered for the prompt return of the mobile device; and regarding instructions informing the current user how to return the mobile device to an authorized user; obtaining a theft notification record for the authorized user; and contacting the authorized user by at least one of; a phone call placed to a phone number specified in the theft notification record, whereupon audio instructions are provided to the authorized user regarding how to contact the current user of the mobile device to recover the mobile device; and a text message sent electronically to an address specified in the theft notification record, whereupon textual instructions are provided to the authorized user regarding how to contact the current user of the mobile device to recover the mobile, device; and a printed message sent by conventional mail to an address specified in the theft notification record, whereupon textual instructions are provided to the authorized user regarding how to contact the current user of the mobile device to recover the mobile device wherein;
the address specified in the theft notification record is furnished by the authorized user during a registration process.- View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method comprising:
-
providing, by a mobile device, instructions regarding how to return the mobile device to an authorized user, said instructions including a notification that the current user may press any button to initiate contact with a security authority, wherein the security authority is an entity other than the owner of the mobile device and the authorized user of the mobile device; detecting, by the mobile device, that a security compromise event has occurred; and altering the function of the mobile device in response to said security compromise event to mitigate loss of control by the authorized user by providing a notification that the current user may press any button to initiate contact with a security authority and further by sending a message to the authorized user, the message comprising information selected from the group consisting of; a phone number called by the mobile device; a statement that the mobile device has been removed from a predetermined location; a statement that the mobile device is in motion; an alarm indicating the need for the authorized user to read a notification message; and instructions to call a security authority to initiate a recovery process; wherein altering the function of the mobile device further comprises commanding the mobile device to perform a destructive function that renders the mobile device inoperable, wherein the destructive function comprises executing an instruction by the mobile device that results in one of; an integrated circuit within the mobile device becoming permanently inoperable; a fusible link within the mobile device being destroyed; and an internal circuit breaker in the mobile device being tripped. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. A method comprising:
-
providing, by a mobile device, instructions regarding how to return the mobile device to an authorized user; detecting, by the mobile device, that a security compromise event has occurred; obtaining a theft notification record for the authorized user; contacting the authorized user by at least one of; a phone call placed to a phone number specified in the theft notification record, whereupon audio instructions are provided to the authorized user regarding how to contact the current user of the mobile device to recover the mobile device; a text message sent electronically to an address furnished by the authorized user during a registration process and specified in the theft notification record, whereupon textual instructions are provided to the authorized user regarding how to contact the current user of the mobile device to recover the mobile device; and a printed message sent by conventional mail to an address specified in the theft notification record, whereupon textual instructions are provided to the authorized user regarding how to contact the current user of the mobile device to recover the mobile device; and altering the function of the mobile device in response to said security compromise event to mitigate loss of control by the authorized user by presenting, by the mobile device an automated message to a current user of the mobile device, wherein the automated message comprises a notification that the current user may press any button to initiate contact with a security authority.
-
Specification