Device locator disable authentication
First Claim
1. A method comprising:
- entering, by a mobile device, an activation operating mode, wherein the mobile device is configured to enable one or more functions in the activation operating mode, and wherein on the mobile device, user-erasable content and settings including one or more user-configured security settings have been erased, the one or more user-configured security settings including a setting for user authentication that specifies that network user credentials stored on a server shall be used for authentication after the user-erasable content and settings have been erased;
while in the activation operating mode, transmitting a request for user account information to the server, the request being associated with a hardware identifier of the mobile device, the hardware identifier uniquely identifying the mobile device to the server, wherein;
the user account information was stored on the server before the one or more user-configured security settings were erased on the mobile device, andthe user account information includes user credentials that are identifiable by the hardware identifier;
presenting, on the mobile device, a user interface for configuring the mobile device, the user interface including a challenge for authenticating a user of the mobile device based on the user account information received from the server; and
in response to receiving an input through the user interface responding to the challenge, activating the mobile device.
2 Assignments
0 Petitions
Accused Products
Abstract
A device locator mode or find my device (FMD) mode can allow a lost, stolen, or misplaced mobile device to be located. The FMD mode can be enabled or disabled on a mobile device. Sometimes thieves or unauthorized parties attempt to disable the FMD mode. To prevent this, the mobile device can transmit a unique device identifier to a remote server. The remote server can link the device identifier to a cloud-based user account associated with the user of the mobile device. Before an FMD mode is disabled on the mobile device, before the content or settings can be erased, and/or before a mobile device is permitted to be activated/reactivated, a user of the mobile device can be challenged for the credentials of the cloud-based user account. If valid credentials are provided, FMD can be disabled, the content or settings can be reset, and/or the device can be activated/reactivated.
-
Citations
11 Claims
-
1. A method comprising:
-
entering, by a mobile device, an activation operating mode, wherein the mobile device is configured to enable one or more functions in the activation operating mode, and wherein on the mobile device, user-erasable content and settings including one or more user-configured security settings have been erased, the one or more user-configured security settings including a setting for user authentication that specifies that network user credentials stored on a server shall be used for authentication after the user-erasable content and settings have been erased; while in the activation operating mode, transmitting a request for user account information to the server, the request being associated with a hardware identifier of the mobile device, the hardware identifier uniquely identifying the mobile device to the server, wherein; the user account information was stored on the server before the one or more user-configured security settings were erased on the mobile device, and the user account information includes user credentials that are identifiable by the hardware identifier; presenting, on the mobile device, a user interface for configuring the mobile device, the user interface including a challenge for authenticating a user of the mobile device based on the user account information received from the server; and in response to receiving an input through the user interface responding to the challenge, activating the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium comprising code that, when executed by a processor, causes a device to perform operations including:
-
entering, by a mobile device, an activation operating mode, wherein the mobile device is configured to enable one or more functions in the activation operating mode, and wherein on the mobile device, user-erasable content and settings including one or more user-configured security settings have been erased, the one or more user-configured security settings including a setting for user authentication that specifies that network user credentials stored on a server shall be used for authentication after the user-erasable content and settings have been erased; while in the activation operating mode, transmitting a request for user account information to the server, the request being associated with a hardware identifier of the mobile device, the hardware identifier uniquely identifying the mobile device to the server, wherein; the user account information was stored on the server before the one or more user-configured security settings were erased on the mobile device, and the user account information includes user credentials that are identifiable by the hardware identifier; presenting, on the mobile device, a user interface for configuring the mobile device, the user interface including a challenge for authenticating a user of the mobile device based on the user account information received from the server; and in response to receiving an input through the user interface responding to the challenge, activating the mobile device. - View Dependent Claims (9)
-
-
10. A system comprising:
-
a processor; and a non-transitory computer-readable medium comprising code that, when executed by the processor, causes the processor to perform operations including; entering, by a mobile device, an activation operating mode, wherein the mobile device is configured to enable one or more functions in the activation operating mode, and wherein on the mobile device, user-erasable content and settings including one or more user-configured security settings have been erased, the one or more user-configured security settings including a setting for user authentication that specifies that network user credentials stored on a server shall be used for authentication after the user-erasable content and settings have been erased; while in the activation operating mode, transmitting a request for user account information to the server, the request being associated with a hardware identifier of the mobile device, the hardware identifier uniquely identifying the mobile device to the server, wherein; the user account information was stored on the server before the one or more user-configured security settings were erased on the mobile device, and the user account information includes user credentials that are identifiable by the hardware identifier; presenting on the mobile device, a user interface for configuring the mobile device, the user interface including a challenge for authenticating a user of the mobile device based on the user account information received from the server; and in response to receiving an input through the user interface responding to the challenge, activating the mobile device. - View Dependent Claims (11)
-
Specification