摘要 |
This is generally directed to identifying unauthorized users of an electronic device. In some embodiments, an unauthorized user of the electronic device can be detected by identifying particular activities that may indicate suspicious behavior. In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identity of the owner of the electronic device. When an unauthorized user is detected, various safety measures can be taken. For example, information related to the identity of the unauthorized user, the unauthorized user's operation of the electronic device, or the current location of the electronic device can be gathered. As another example, functions of the electronic device can be restricted. In some embodiments, the owner of the electronic device can be notified of the unauthorized user by sending an alert notification through any suitable medium, such as, for example, a voice mail, e-mail, or text message. |
主权项 |
1. A method for identifying unauthorized usage of an electronic device, the method comprising:
at the electronic device: monitoring a utilization of a memory included in the electronic device; and in response to determining, based on a usage increase of the memory by a particular amount within a predetermined period of time, that unauthorized usage of the electronic device is occurring:
configuring the electronic device to, upon being communicatively coupled to a computing device, collect information from the computing device. |