METHOD AND APPARATUS FOR DETECTING AND DEALING WITH A LOST ELECTRONICS DEVICE
First Claim
1. A method comprising:
- determining that a device is lost; and
preventing access to information on the device based on a secondary security key not used for encrypting the information during normal operation of the device.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for detecting and dealing with a lost electronics device are disclosed. In one design, the device may autonomously determine whether it is lost. The device may destroy at least one component to render it inoperable and may perform other actions in response to determining that it is lost. In another design, the device may determine available battery power of the device upon determining that it is lost, select at least one action in a list of possible actions based on the available battery power, and perform the selected action(s). In yet another design, upon determining that it is lost, the device may prevent access to information on the device based on a secondary security key, which is not used for encrypting information during normal operation. In yet another design, the device may notify at least one contact and may perform at least one additional action upon determining that it is lost.
-
Citations
13 Claims
-
1. A method comprising:
-
determining that a device is lost; and preventing access to information on the device based on a secondary security key not used for encrypting the information during normal operation of the device. - View Dependent Claims (2, 3, 4)
-
-
5. An apparatus comprising:
-
means for determining that a device is lost; and means for preventing access to information on the device based on a secondary security key not used for encrypting the information during normal operation of the device. - View Dependent Claims (6, 7)
-
-
8. An apparatus comprising:
at least one processor configured to determine that a device is lost, and to prevent access to information on the device based on a secondary security key not used for encrypting the information during normal operation of the device. - View Dependent Claims (9, 10)
-
11. A computer program product, comprising:
-
a non-transitory computer-readable medium comprising; code for causing at least one computer to determine that a device is lost, and code for causing the at least one computer to prevent access to information on the device based on a secondary security key not used for encrypting the information during normal operation of the device. - View Dependent Claims (12, 13)
-
Specification