×

Method for mitigating the unauthorized use of a device

  • US 9,031,536 B2
  • Filed: 04/02/2008
  • Issued: 05/12/2015
  • Est. Priority Date: 04/02/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • providing, by a mobile device, instructions regarding how to return the mobile device to an authorized user;

    obtaining a theft notification record for the authorized user from a database maintained by a third-party security authority;

    detecting, by the mobile device, that a security compromise event has occurred; and

    altering the function of the mobile device in response to said security compromise event to mitigate loss of control by the authorized user by;

    obtaining from the authorized user a first list of zero or more data elements stored within the mobile device to be deleted upon occurrence of the security compromise event, and upon occurrence of the security compromise event, deleting the first list data elements from in the mobile device;

    obtaining from the authorized user a second list of zero or more data elements stored within the mobile device to be encrypted upon occurrence of the security compromise event, and upon occurrence of the security compromise event, encrypting, by the mobile device, the second list data elements in the mobile device with a password known by at least one of the security authority and the authorized user.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×