发明名称 |
METHODS AND SYSTEMS FOR ADDRESSING MOBILE COMMUNICATIONS DEVICES THAT ARE LOST OR STOLEN BUT NOT YET REPORTED AS SUCH |
摘要 |
A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource. In the method, a detected usage of the mobile communications device is compared to a stored usage pattern of an authorized user. When a measure associated with the difference between the detected usage and the stored usage pattern exceeds a threshold, it is concluded that the mobile communications device is being used by an unauthorized user. In response to this conclusion, a restriction is placed on an ability of the mobile communications device to access the resource. |
申请公布号 |
US2016066189(A1) |
申请公布日期 |
2016.03.03 |
申请号 |
US201514937781 |
申请日期 |
2015.11.10 |
申请人 |
LOOKOUT, INC. |
发明人 |
Mahaffey Kevin Patrick;Hering John G.;Burgess James David;Grkov Vance;Richardson David Luke;Mandal Ayan;Mangat Cherry;Buck Brian James;Robinson William |
分类号 |
H04W12/08;H04L29/06;H04W4/02;H04W12/06;H04M15/00 |
主分类号 |
H04W12/08 |
代理机构 |
|
代理人 |
|
主权项 |
1. A method comprising:
detecting, by a security component on a mobile communications device, a usage of the mobile communications device; comparing, by the security component, the detected usage to a stored usage pattern associated with an authorized user of the mobile communications device to determine if there is a difference between the detected usage and the stored usage pattern; associating, by the security component, a measure with the stored usage pattern when there is a difference between the detected usage and the stored usage pattern; determining, by the security component, that the detected usage was not caused by the authorized user when the associated measure is beyond a threshold measure; and in response to the determination, issuing a command by the security component, the command causing a restriction of an ability of the mobile communications device to be used to access a resource. |
地址 |
San Francsico CA US |