Systems and methods for mitigating the unauthorized use of a device
First Claim
Patent Images
1. A method comprising:
- detecting that a security compromise event has occurred for a mobile device;
altering a function of the mobile device in response to the security compromise event to mitigate loss of control by an authorized user, wherein;
altering the function of the mobile device includes denying access to data stored on the mobile device; and
detecting that the security compromise event has occurred includes receiving, by the mobile device, a command to alter the function of the mobile device;
transmitting, by the mobile device, a first code to a security authority in response to receiving the command to alter the function of the mobile device;
receiving, by the mobile device, a second code from the security authority;
comparing, by the mobile device, the first code and the second code to a predetermined security protocol; and
altering the function of the mobile device if the first code and the second code are in accordance with the security protocol;
wherein denying access to data stored on the mobile device includes one of;
concealing at least a portion of a file system for the mobile device; and
encrypting at least a portion of a file system for the mobile device.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a method includes detecting that a security compromise event has occurred for a mobile device. The method also includes altering a function of the mobile device in response to the security compromise event to mitigate loss of control by an authorized user. Altering the function of the mobile device includes denying access to data stored on the mobile device.
-
Citations
37 Claims
-
1. A method comprising:
-
detecting that a security compromise event has occurred for a mobile device; altering a function of the mobile device in response to the security compromise event to mitigate loss of control by an authorized user, wherein; altering the function of the mobile device includes denying access to data stored on the mobile device; and detecting that the security compromise event has occurred includes receiving, by the mobile device, a command to alter the function of the mobile device; transmitting, by the mobile device, a first code to a security authority in response to receiving the command to alter the function of the mobile device; receiving, by the mobile device, a second code from the security authority; comparing, by the mobile device, the first code and the second code to a predetermined security protocol; and altering the function of the mobile device if the first code and the second code are in accordance with the security protocol; wherein denying access to data stored on the mobile device includes one of; concealing at least a portion of a file system for the mobile device; and encrypting at least a portion of a file system for the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method comprising:
-
detecting that a security compromise event has occurred for a mobile device; and altering a function of the mobile device in response to the security compromise event to mitigate loss of control by an authorized user, wherein; altering the function of the mobile device includes denying access to data stored on the mobile device; and detecting that the security compromise event has occurred includes receiving, by the mobile device, a command to alter the function of the mobile device; transmitting, by the mobile device, a first code to a security authority in response to receiving the command to alter the function of the mobile device; receiving, by the mobile device, a second code from the security authority; comparing, by the mobile device, the first code and the second code to a predetermined security protocol; and altering the function of the mobile device if the first code and the second code are in accordance with the security protocol. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A method comprising:
-
detecting that a security compromise event has occurred for a mobile device; displaying, on a user interface for the mobile device, a web page from a predetermined security authority indicating that the mobile device has been determined to be at least one of lost, stolen and subject to unauthorized use; providing a web-based form to solicit information to assist with returning the mobile device to the authorized user; altering a function of the mobile device in response to the security compromise event to mitigate loss of control by an authorized user, wherein altering the function of the mobile device includes denying access to data stored on the mobile device; and wherein denying access to data stored on the mobile device includes one of; concealing at least a portion of a file system for the mobile device; and encrypting at least a portion of a file system for the mobile device.
-
-
36. A method comprising:
-
detecting that a security compromise event has occurred for a mobile device; providing on a display of the mobile device an indication to an unauthorized user that security software has been activated and one or more options pertaining to the activation of the security software may be selected; altering a function of the mobile device in response to the security compromise event to mitigate loss of control by an authorized user, wherein altering the function of the mobile device includes denying access to data stored on the mobile device; and wherein denying access to data stored on the mobile device includes one of; concealing at least a portion of a file system for the mobile device; and encrypting at least a portion of a file system for the mobile device. - View Dependent Claims (37)
-
Specification