Device theft protection associating a device identifier and a user identifier
First Claim
1. A method implemented in a computing device, the method comprising:
- determining that theft protection is to be enabled on the computing device;
sending, to an identity service over a network, user credentials of a user of the computing device;
receiving, from the identity service, a ticket indicating that the user credentials have been verified by the identity service;
sending, to a key service over the network, the ticket;
receiving, from the key service, a data value having been generated by the key service based on both a recovery key for the computing device and a device identifier that identifies the computing device;
saving the data value as an authenticated variable on the computing device by writing the data value to an authenticated variable storage system of the computing device;
receiving user input that is the recovery key of the computing device;
generating an additional data value based on the user input as well as the device identifier that identifies the computing device;
determining whether the data value and the additional data value are the same value;
changing the computing device to an unprotected state in response to the data value and the additional data value being the same value;
allowing the user to access the computing device in the unprotected state in response to the data value and the additional data value being the same value; and
denying the user access to the computing device in response to the data value and the additional data value not being the same value.
1 Assignment
0 Petitions
Accused Products
Abstract
When theft protection of a computing device is initiated, credentials of the user are provided to one or more services that verify the credentials and generate a recovery key. A data value is generated based on the recovery key and an identifier of the computing device (e.g., by applying a cryptographic hash function to the recovery key and the computing device identifier), and the data value is provided to the computing device, which stores the data value at the computing device. When a user is prompted to prove his or her ownership of the device, the owner can prove his or her ownership of the device in different manners by accessing the one or more services via a network (e.g., the Internet), or by providing the recovery key (e.g., obtained using another computing device) to the computing device.
28 Citations
20 Claims
-
1. A method implemented in a computing device, the method comprising:
-
determining that theft protection is to be enabled on the computing device; sending, to an identity service over a network, user credentials of a user of the computing device; receiving, from the identity service, a ticket indicating that the user credentials have been verified by the identity service; sending, to a key service over the network, the ticket; receiving, from the key service, a data value having been generated by the key service based on both a recovery key for the computing device and a device identifier that identifies the computing device; saving the data value as an authenticated variable on the computing device by writing the data value to an authenticated variable storage system of the computing device; receiving user input that is the recovery key of the computing device; generating an additional data value based on the user input as well as the device identifier that identifies the computing device; determining whether the data value and the additional data value are the same value; changing the computing device to an unprotected state in response to the data value and the additional data value being the same value; allowing the user to access the computing device in the unprotected state in response to the data value and the additional data value being the same value; and denying the user access to the computing device in response to the data value and the additional data value not being the same value. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computing device comprising:
-
one or more hardware processors; and one or more computer-readable storage media having stored thereon multiple instructions that, responsive to execution by the one or more processors, cause the one or more processors to perform acts including; determining that theft protection is to be enabled on the computing device; sending, to an identity service over a network, user credentials of a user of the computing device; receiving, from the identity service, a data structure indicating that the user credentials have been verified by the identity service; sending, to a key service over the network, the data structure; receiving, from the key service, a first data value having been generated by the key service based on both a recovery key for the computing device and a device identifier that identifies the computing device; saving the first data value as an authenticated variable on the computing device by writing the first data value to an authenticated variable storage system of the computing device; receiving user input that is the recovery key of the computing device; generating a second data value based on the user input as well as the device identifier that identifies the computing device; determining whether the first data value and the second data value are the same value; changing the computing device to an unprotected state in response to the first data value and the second data value being the same value; allowing the user to access the computing device in the unprotected state in response to the first data value and the second data value being the same value; and denying the user access to the computing device in response to the first data value and the second data value not being the same value. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A system with a computing device comprising:
-
an authenticated variable storage device; and a theft protection system, implemented at least in part by a processor, configured to; determine that theft protection is to be enabled on the computing device; send, to an identity service over a network, user credentials of a user of the computing device; receive, from the identity service, a ticket indicating that the user credentials have been verified by the identity service; send, to a key service over the network, the ticket; receive, from the key service, a data value having been generated by the key service based on both a recovery key for the computing device and a device identifier that identifies the computing device; save the data value as an authenticated variable on the computing device by writing the data value to the authenticated variable storage system; receive user input that is the recovery key of the computing device; generate an additional data value based on the user input as well as the computing device identifier that identifies the device; determine whether the data value and the additional data value are the same value; change the computing device to an unprotected state in response to the data value and the additional data value being the same value; allow the user to access the computing device in the unprotected state in response to the data value and the additional data value being the same value; and deny the user access to the computing device in response to the data value and the additional data value not being the same value. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification