×

Bypassing security authentication scheme on a lost device to return the device to the owner

  • US 9,763,098 B2
  • Filed: 01/11/2013
  • Issued: 09/12/2017
  • Est. Priority Date: 01/11/2013
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory machine readable medium storing a program for execution by at least one processing unit, the program for bypassing device security protections to communicate with a privileged contact of a secure device, the program comprising sets of instructions for:

  • displaying, while the device is in a locked mode in which a plurality of services are unavailable on the device, a selectable user interface (UI) item on the device for enabling a person to operate the device to communicate with a privileged contact while the device is in the locked mode;

    determining whether a secured router that provides restricted access for lost devices is available;

    upon the selection of the UI item, displaying a list of available Wi-Fi networks to select a Wi-Fi network while the device is in the locked mode, wherein a Wi-Fi network for the secured router is displayed with an indication that indicates that the secured router provides restricted access for lost devices, wherein selection of the Wi-Fi network for the secured router allows a connection to the Wi-Fi network without a password when the device is in the locked mode; and

    initiating a communication, through a Wi-Fi network of the list of available Wi-Fi networks while the device is in the locked mode, with the privileged contact from a list of privileged contacts stored on the device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×