Permanently affixed un-decryptable identifier associated with mobile device
First Claim
1. A system for creating and storing an un-decryptable identifier on a mobile device, the system comprising:
- a memory device with computer-readable program code stored thereon;
a communication device;
a processing device operatively coupled to the memory device and the communication device, wherein the processing device is configured to execute the computer-readable program code to;
receive a request and authorization from a user to generate the identifier on the mobile device of the user;
present one or more objects to the user that can be coded as the identifier, wherein the one or more objects presented have an original function associated with each of the one or more objects;
receive a selected object from the user, wherein the selected object is selected to be the identifier;
code the selected object allowing the identifier to be maintained on the mobile device after a complete wipe out, deletion, or clearing of all the data on the mobile device, wherein coding comprises coding the selected object with a beacon code, and a remote deletion code to become the identifier, wherein coding the selected object further comprises maintaining the original function of the selected object;
transmit the identifier to the mobile device associated with the user;
store, upon user authorization, the identifier on the mobile device, wherein storing further comprises integrating the identifier into storage with like objects;
identify misplacement or misappropriation of the mobile device; and
activate, based on identifying the misplacement or the misappropriation of the mobile device, the beacon code for identifying a location of the mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention are directed to a system, method, or computer program product for providing a permanently affixed un-decryptable coded identifier onto a mobile device. The identifier may be one or more applications, pictures, widgets, tokens, or the like that may be transformed into an identifier to include the objects original functionality plus additional coding. The identifier, once selected by the user may be coded to include a tracker, beacon, and coded with remote access abilities. The identifier may then be permanently installed onto the user'"'"'s mobile device. As such providing a trackable code associated with a mobile device, if the mobile device is misplaced. Furthermore, the identifier may be permanently stored within the mobile device preventing complete erasing of the identifier upon complete data deletion of the user device.
-
Citations
20 Claims
-
1. A system for creating and storing an un-decryptable identifier on a mobile device, the system comprising:
-
a memory device with computer-readable program code stored thereon; a communication device; a processing device operatively coupled to the memory device and the communication device, wherein the processing device is configured to execute the computer-readable program code to; receive a request and authorization from a user to generate the identifier on the mobile device of the user; present one or more objects to the user that can be coded as the identifier, wherein the one or more objects presented have an original function associated with each of the one or more objects; receive a selected object from the user, wherein the selected object is selected to be the identifier; code the selected object allowing the identifier to be maintained on the mobile device after a complete wipe out, deletion, or clearing of all the data on the mobile device, wherein coding comprises coding the selected object with a beacon code, and a remote deletion code to become the identifier, wherein coding the selected object further comprises maintaining the original function of the selected object; transmit the identifier to the mobile device associated with the user; store, upon user authorization, the identifier on the mobile device, wherein storing further comprises integrating the identifier into storage with like objects; identify misplacement or misappropriation of the mobile device; and activate, based on identifying the misplacement or the misappropriation of the mobile device, the beacon code for identifying a location of the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product for creating and storing an un-decryptable identifier on a mobile device, the computer program product comprising at least one non-transitory computer-readable medium having computer-readable program code portions embodied therein, the computer-readable program code portions comprising:
-
an executable portion configured for receiving a request and authorization from a user to generate the identifier on the mobile device of the user; an executable portion configured for presenting one or more objects to the user that can be coded as the identifier, wherein the one or more objects presented have an original function associated with each of the one or more objects; an executable portion configured for receiving a selected object from the user, wherein the selected object is selected to be the identifier; an executable portion configured for coding the selected object allowing the identifier to be maintained on the mobile device after a complete wipe out, deletion, or clearing of all the data on the mobile device, wherein coding comprises coding the selected object with a beacon code, and a remote deletion code to become the identifier, wherein coding the selected object further comprises maintaining the original function of the selected object; an executable portion configured for transmitting the identifier to the mobile device associated with the user; an executable portion configured for storing, upon user authorization, the identifier on the mobile device, wherein storing further comprises integrating the identifier into storage with like objects; an executable portion configured for identifying misplacement or misappropriation of the mobile device; and an executable portion configured for activating, based on identifying the misplacement or the misappropriation of the mobile device, the beacon code for identifying a location of the mobile device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method for creating and storing an un-decryptable identifier on a mobile device, the method comprising:
providing a computing system comprising a computer processing device and a non-transitory computer readable medium, where the computer readable medium comprises configured computer program instruction code, such that when said instruction code is operated by said computer processing device, said computer processing device performs the following operations; receiving a request and authorization from a user to generate the identifier on the mobile device of the user; presenting one or more objects to the user that can be coded as the identifier, wherein the one or more objects presented have an original function associated with each of the one or more objects; receiving selected object from the user, wherein the selected object is selected to be the identifier; coding the selected object allowing the identifier to be maintained on the mobile device after a complete wipe out, deletion, or clearing of all the data on the mobile device, wherein coding comprises coding the selected object with a beacon code, and a remote deletion code to become the identifier, wherein coding the selected object further comprises maintaining the original function of the selected object; transmitting the identifier to the mobile device associated with the user; storing, upon user authorization, the identifier on the mobile device, wherein storing further comprises integrating the identifier into storage with like objects; identifying misplacement or misappropriation of the mobile device; and activating, based on identifying the misplacement or the misappropriation of the mobile device, the beacon code for identifying a location of the mobile device. - View Dependent Claims (16, 17, 18, 19, 20)
Specification