Device monitoring using multiple servers optimized for different types of communications
First Claim
1. A monitoring system for monitoring electronic devices, the system comprising:
- a first server that is configured to communicate via the Internet with the electronic devices according to a first protocol, said first server configured to transmit security instructions to electronic devices that are reported as lost or stolen, including security instructions that protect data stored on the electronic devices; and
a second server that is configured to communicate via the Internet with the electronic devices according to a second protocol at a greater frequency than said first server communicates with the electronic devices, said second server configured to instruct an electronic device that is reported as lost or stolen to contact the first server, such that the electronic device can retrieve a security instruction from the first server,wherein the second protocol is optimized for communications conducted using packets having a smaller byte size than packets carrying communications according to the first protocol.
2 Assignments
0 Petitions
Accused Products
Abstract
An electronic device monitoring system uses two different types of servers to communicate with electronic devices of users. One type of server, which may be a rapid contact server, is optimized or configured for relatively short and frequent communications with the electronic devices. The other type of server is optimized or configured for less frequent but (typically) longer communications with the electronic devices. In some embodiments, the electronic devices are configured to communicate relatively frequently (e.g., every few minutes) with the rapid contact server. When an electronic device is reported as lost or stolen, the rapid contact server may instruct the electronic device to contact the other type of server to obtain security-related instructions.
-
Citations
31 Claims
-
1. A monitoring system for monitoring electronic devices, the system comprising:
-
a first server that is configured to communicate via the Internet with the electronic devices according to a first protocol, said first server configured to transmit security instructions to electronic devices that are reported as lost or stolen, including security instructions that protect data stored on the electronic devices; and a second server that is configured to communicate via the Internet with the electronic devices according to a second protocol at a greater frequency than said first server communicates with the electronic devices, said second server configured to instruct an electronic device that is reported as lost or stolen to contact the first server, such that the electronic device can retrieve a security instruction from the first server, wherein the second protocol is optimized for communications conducted using packets having a smaller byte size than packets carrying communications according to the first protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A non-transitory computer readable medium that stores an executable agent, said executable agent comprising instructions that direct an electronic device to perform a process that comprises:
-
communicating with a first server of a monitoring system according to a first protocol via the Internet, and with a second server of the monitoring system according to a second protocol via the Internet, wherein the second protocol is optimized for communications conducted using packets having a smaller byte size than packets carrying communications according to the first protocol; receiving, from the second server, in a session based on the second protocol, an instruction to contact the first server; in response to the instruction, initiating a communication session with the first server according to the first protocol, wherein the electronic device receives a security instruction from the first server during the communication session, said security instruction specifying a security action associated with a theft or loss of the electronic device; and executing the security instruction. - View Dependent Claims (25, 26)
-
-
27. A method for monitoring electronic devices comprising the steps of:
-
receiving in a first server a notification that an electronic device that is reported as lost or stolen has an awaiting security instruction; receiving in a second server a notification that the electronic device should contact the first server; receiving via the Internet in the second server a single packet from the electronic device comprising an identification of the electronic device; confirming in the second server that the identification is flagged for the electronic device to contact the first server; establishing a first session over the Internet between the second server and the electronic device during which the second server instructs the electronic device to contact the first server; and establishing a second session over the Internet between the first server and the electronic device during which the first server communicates the security instruction to the electronic device, wherein the first session with the second server is conducted (a) using a packet having a smaller byte size than a packet in the second session with the first server and (b) according to a protocol in which the electronic device communicates at a greater frequency than the electronic device communicates with the first server. - View Dependent Claims (28, 29, 30, 31)
-
Specification