Bypassing security authentication scheme on a lost device to return the device to the owner
First Claim
Patent Images
1. A non-transitory machine readable medium storing a program for execution by at least one processing unit, the program for bypassing device security protections to communicate with a privileged contact of a secure device, the program comprising sets of instructions for:
- displaying, while the device is in a locked mode in which a plurality of services are unavailable on the device, a selectable user interface (UI) item on the device for enabling a person to operate the device to communicate with a privileged contact while the device is in the locked mode;
determining whether a secured router that provides restricted access for lost devices is available;
upon the selection of the UI item, displaying a list of available Wi-Fi networks to select a Wi-Fi network while the device is in the locked mode, wherein a Wi-Fi network for the secured router is displayed with an indication that indicates that the secured router provides restricted access for lost devices, wherein selection of the Wi-Fi network for the secured router allows a connection to the Wi-Fi network without a password when the device is in the locked mode; and
initiating a communication, through a Wi-Fi network of the list of available Wi-Fi networks while the device is in the locked mode, with the privileged contact from a list of privileged contacts stored on the device.
1 Assignment
0 Petitions
Accused Products
Abstract
Some embodiments provide a method for bypassing device security protections to communicate with a contact of a secure device. The method displays a selectable user interface object on the device enabling a user to bypass the security protections of the device. Upon receiving a selection of the user interface object, the method initiates a communication to a contact that is preselected from a list of contacts.
44 Citations
20 Claims
-
1. A non-transitory machine readable medium storing a program for execution by at least one processing unit, the program for bypassing device security protections to communicate with a privileged contact of a secure device, the program comprising sets of instructions for:
-
displaying, while the device is in a locked mode in which a plurality of services are unavailable on the device, a selectable user interface (UI) item on the device for enabling a person to operate the device to communicate with a privileged contact while the device is in the locked mode; determining whether a secured router that provides restricted access for lost devices is available; upon the selection of the UI item, displaying a list of available Wi-Fi networks to select a Wi-Fi network while the device is in the locked mode, wherein a Wi-Fi network for the secured router is displayed with an indication that indicates that the secured router provides restricted access for lost devices, wherein selection of the Wi-Fi network for the secured router allows a connection to the Wi-Fi network without a password when the device is in the locked mode; and initiating a communication, through a Wi-Fi network of the list of available Wi-Fi networks while the device is in the locked mode, with the privileged contact from a list of privileged contacts stored on the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A device comprising:
-
a set of processing units; and a memory storing a program for execution by at least one of the processing units, the program for providing a graphical user interface (GUI) for bypassing device security protections to communicate with a contact of the device, the GUI comprising; a display area for displaying UI objects; and a selectable UI object for enabling a person to operate the device to communicate with a privileged contact while the device is in a locked mode in which a plurality of services are unavailable on the device and in which the device must be unlocked before making the plurality of services available, wherein a selection of the UI object causes a display of a list of privileged contacts while the device is in the locked mode, wherein the list of privileged contacts comprises a set of automatically generated privileged contacts when no contacts were previously designated as privileged contacts, and wherein a selection of a displayed privileged contact causes an initiation of a communication with the selected privileged contact while the device is in the locked mode using a communication mechanism assigned to the selected privileged contact. - View Dependent Claims (10, 11, 12)
-
-
13. A non-transitory computer readable medium storing a program which when executed by at least one processing unit presents a graphical user interface (GUI) for bypassing device security protections to communicate with a contact of the device, the GUI comprising:
-
a display area for displaying UI objects; and a selectable UI object for enabling a person to operate the device to communicate with a privileged contact while the device is in a locked mode in which a plurality of services are unavailable on the device and in which the device must be unlocked before making the plurality of services available, wherein a selection of the UI object causes a display of a list of privileged contacts while the device is in the locked mode, wherein the list of privileged contacts comprises a set of automatically generated privileged contacts when no contacts were previously designated as privileged contacts, and wherein a selection of a displayed privileged contact causes an initiation of a communication with the selected privileged contact while the device is in the locked mode using a communication mechanism assigned to the selected privileged contact. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification