发明名称 Method for mitigating the unauthorized use of a device
摘要 The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
申请公布号 US9031536(B2) 申请公布日期 2015.05.12
申请号 US200812060867 申请日期 2008.04.02
申请人 Yougetitback Limited 发明人 Fitzgerald William;Bermingham Peter;Hannigan Frank;Prendergast Paul
分类号 H04M1/66;H04W12/12;G06F21/31;G06F21/55;G06F21/88;H04M1/725;H04M3/42;H04W88/02 主分类号 H04M1/66
代理机构 Squire Patton Boggs (US) LLP 代理人 Moss Allen J.;Squire Patton Boggs (US) LLP
主权项 1. A method comprising: providing, by a mobile device, instructions regarding how to return the mobile device to an authorized user; obtaining a theft notification record for the authorized user from a database maintained by a third-party security authority; detecting, by the mobile device, that a security compromise event has occurred; and altering the function of the mobile device in response to said security compromise event to mitigate loss of control by the authorized user by: obtaining from the authorized user a first list of zero or more data elements stored within the mobile device to be deleted upon occurrence of the security compromise event, and upon occurrence of the security compromise event, deleting the first list data elements from in the mobile device; obtaining from the authorized user a second list of zero or more data elements stored within the mobile device to be encrypted upon occurrence of the security compromise event, and upon occurrence of the security compromise event, encrypting, by the mobile device, the second list data elements in the mobile device with a password known by at least one of the security authority and the authorized user.
地址 Cork IE