Stylus-based remote wipe of lost device
First Claim
1. A stylus configured to communicatively pair with a computing device that is out of control of a user through loss or theft, the stylus comprising:
- a tip at a first end of the stylus;
an input control feature at a second end of the stylus opposite the first end, the input control feature configured to receive a user action;
a processor disposed within the stylus that, responsive to the received user action, causes transmission of an instruction to the computing device to execute a remote data wipe function that is initiated by the computing device within a first period of time following receipt of the instruction, the remote data wipe function configured to render all data stored in the lost or stolen computing device irretrievably unavailable in response to of the instruction from the communicatively paired stylus, the remote data wipe function rendering all data stored in the lost or stolen computing device irretrievably inaccessible prior to physical recovery of the computing device and restoration of a backup version of the data previously stored on the computing device, the processor further configured to receive a corresponding confirmation of completion of the data wipe from the computing device; and
one or more indicators operatively coupled to the processor and configured to indicate one or more statuses of execution of the remote data wipe function, the statuses including a completed status that manifests in response to the processor indicating receipt of the confirmation of completion.
10 Assignments
0 Petitions
Accused Products
Abstract
Techniques for remotely wiping data from a computing device are provided. Instructions for wiping data from the computing device can be sent via an input device such as a stylus associated with the computing device, or a dedicated module. In cases where the computing device is lost or stolen, the user, via the stylus, may remotely activate a data wipe function so as to remove selected or all information from the computing device, ensuring that sensitive information is not extracted from the device. In some cases, a back-up application configured to remotely back-up data of the target computing device is launched before that data is wiped from the device.
-
Citations
19 Claims
-
1. A stylus configured to communicatively pair with a computing device that is out of control of a user through loss or theft, the stylus comprising:
-
a tip at a first end of the stylus; an input control feature at a second end of the stylus opposite the first end, the input control feature configured to receive a user action; a processor disposed within the stylus that, responsive to the received user action, causes transmission of an instruction to the computing device to execute a remote data wipe function that is initiated by the computing device within a first period of time following receipt of the instruction, the remote data wipe function configured to render all data stored in the lost or stolen computing device irretrievably unavailable in response to of the instruction from the communicatively paired stylus, the remote data wipe function rendering all data stored in the lost or stolen computing device irretrievably inaccessible prior to physical recovery of the computing device and restoration of a backup version of the data previously stored on the computing device, the processor further configured to receive a corresponding confirmation of completion of the data wipe from the computing device; and one or more indicators operatively coupled to the processor and configured to indicate one or more statuses of execution of the remote data wipe function, the statuses including a completed status that manifests in response to the processor indicating receipt of the confirmation of completion. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for interacting with a remote target computing device that is out of control of a user due to loss or theft via a communicatively paired stylus that is within control of the user, the method comprising:
-
receiving, at the stylus, a user input at a user input control feature of the stylus, the user input generating an instruction to transmit a wipe data command to the remote target computing device; transmitting, via a communication network, the wipe data command from the stylus to the remote target computing device, the wipe data command configured to remotely wipe data from the remote target computing device in response to the wipe data command, the remote wiping initiated within a first period of time following receipt of the wipe data command, the remote wiping rendering all data stored in the remote target computing device irretrievably unavailable; receiving, via the communication network, a corresponding confirmation of completion of the data wipe from the remote target computing device; and indicating, at the stylus, a completed status that manifests in response to receipt of the confirmation of completion. - View Dependent Claims (16)
-
-
17. A non-transitory computer program product comprising a plurality of instructions encoded thereon that when executed by one or more processors cause a process to be carried out, the process comprising:
-
receiving, at a stylus, a user input at a user input control feature of the stylus; generating, at the stylus and in response to the user input, an instruction to transmit a wipe data command to a remote target computing device, the remote target computing device out of control of a user from loss or theft; causing transmission, via a communication network, of the wipe data command from the stylus to the remote target computing device, the wipe data command configured to remotely wipe data from the remote target computing device in response to the wipe data command, the remote wiping initiated within a first period of time following receipt of the wipe data command, the remote wiping rendering all data stored in the remote target computing device irretrievably unavailable; receiving, via the communication network, a corresponding confirmation of completion of the data wipe from the remote target computing device; and causing, at the stylus, indication of a completed status in response to receipt of the confirmation of completion. - View Dependent Claims (18, 19)
-
Specification