专利摘要:
system and method for remotely initiating lost mode on a computing device. the present invention relates to computer-readable non-transient storage systems, methods and media for remotely starting lost mode on a computing device. the request that a lost mode be initiated may include a message and contact information provided by the requesting user. once authenticated, a command to initiate loss mode is sent to the lost device. starting lost mode includes blocking the lost device and suppressing selected functionality. the message and contact information are displayed and the lost device is activated to contact the requesting user using the contact information. the lost device can also collect and transmit location data to the requesting user. location data can be displayed on a map indicating the location of the lost device and the time when the lost device was at the location. location data can be programmed to be forwarded to the user based on several factors, such as a defined schedule, rules or heuristics.
公开号:BR102013012756B1
申请号:R102013012756-6
申请日:2013-05-23
公开日:2020-09-29
发明作者:Raghu Pai;Karthik Narayanan;Megan M. Frost;Patrice Olivier Gautier;Usama Mikael Hajj
申请人:Apple Inc;
IPC主号:
专利说明:

BACKGROUND 1. Technical field
[0001] The present invention relates to computing devices and, more specifically, remotely starting a lost mode on a computing device. 2. Introduction
[0002] Modern advances in computing devices have resulted in smaller, more powerful and wirelessly connected computing devices that can be easily transported by users at all times. As a result, the owners of these devices rely heavily on them and generally believe in them to store personal and confidential information. Along with the great power and convenience of these devices also comes a high price.
[0003] Naturally, theft of such devices has increased since thieves are attracted by the high price and high demand for such computing devices, as well as the possibility of stealing personal information from the owner of the computing device. The high prices and demand for a computing device can also tempt a non-thief, who finds a lost computing device to keep the device instead of looking for its rightful owner. Alternatively, a person who finds a lost device and wants to return it may find it difficult to locate the owner.
[0004] Current systems attempt to address these problems by providing the location of the device to the owner of a lost device, however, these types of systems do not help a person who finds the lost device and wants to return it to its owner. Other systems allow the lost device to be locked to prevent theft. While effective, blocking also makes it even more difficult for a person who finds the device to determine who owns the device, as the information on the device cannot be accessed. Leaving the device unlocked increases the likelihood that the identity of the owner can be determined, however, it also increases the likelihood that the device will not be returned and leaves personal or sensitive data stored on the lost device unprotected. Therefore, there is a need for an improved system for locating a lost computing device that allows the owner of the computing device to protect personal or sensitive data on the computing device, while also making it easier for the person who finds it. computing device return the computing device to its owner. SUMMARY
[0005] Additional features and advantages of the description will be set out in the description that follows, and in part will be evident from the description, or can be learned by practicing the principles disclosed here. The characteristics and advantages of the present description can be perceived and obtained through the instruments and combinations particularly pointed out in the embodiments. These and other features of the description will become more evident from the following description and embodiments, or can be learned by practicing the principles set out here.
[0006] Non-transient, computer-readable storage systems, methods and means for remotely starting lost mode on a computing device are described. A requesting user can request that the lost mode be started on a lost computing device. The order can be placed on a requesting device in network communication with a server configured to communicate with the lost device. The order may include ordering data such as a message, contact information and password. The request data can be provided by the requesting user when requesting that the lost mode be started on the lost device. A requesting user may be required to enter authentication information to ensure that the requesting user is authorized to request that the lost mode be started on the lost device.
[0007] Once the request has been made by a requesting user and the requesting user is authenticated, the server can be configured to send a command, including the required data, to the lost device to initiate the lost mode on the lost device. Starting lost mode may include blocking the lost device and selecting removing functionality from the lost device so that the functionality of the lost device, as well as data and applications stored on the lost device, cannot be accessed by an unauthorized user.
[0008] In addition, the message and contact information provided by the requesting user can be displayed on the user's device to alert a person who finds the lost device on how to contact the requesting user. A user interface element, such as a button, can also be presented and configured to enable the lost device to contact the requesting user using the contact information provided. For example, a lost device, such as a smartphone, may be able to make a call to a phone number provided by a requesting user as their contact information, while all outgoing calls to all other numbers are restricted. The person who finds the phone can thus easily contact the requesting user, while all other functionality of the lost device and the data stored on it are protected.
[0009] When the lost mode is initiated, the lost device can also be configured to collect and transmit data that identifies the location of the lost device to the requesting user. Location data can be displayed on a map indicating the location of the lost device, as well as the time the lost device has been in place. Location data can be programmed to be forwarded to the user based on several factors, such as a defined schedule, rules or heuristics. BRIEF DESCRIPTION OF THE DRAWINGS
[00010] In order to describe how the above and other advantages and features of the description can be obtained, a more specific description of the principles briefly described above will be provided by reference to specific modalities thereof, which are illustrated in the drawings in attachment. Understanding that these drawings show only exemplary modalities of the description and are, therefore, not to be considered as limiting its scope, the principles described and explained here with additional details and specificity through the use of the attached drawings in which: FIG. 1 illustrates an exemplary embodiment of the system; FIG. 2 illustrates an exemplary modality of a general-purpose computing environment, in which a user can remotely initiate lost mode on a user's device; FIG. 3 illustrates an exemplary method of modality of remotely starting lost mode on a lost device; FIG. 4 illustrates an exemplary method of initiating the lost mode on the lost device; FIG. 5 illustrates an exemplary method of transmitting information data to the requesting user; FIG. 6 illustrates a screen image of an exemplary interface configured to authenticate a requesting user; FIG. 7 illustrates a screen image of an exemplary interface configured to receive a password from the requesting user; FIG. 8 illustrates a screen image of an exemplary interface in which a requesting user can enter contact information; FIG. 9 illustrates a screen image of an exemplary modality of an interface in which a requesting user can type a message; FIG. 10 illustrates a screen image of an exemplary mode of a lost device after the lost mode has been initiated; FIG. 11 illustrates a screen image of an exemplary mode of a lost device after the lost mode has been initiated; FIG. 12 illustrates a screen image of an exemplary embodiment of location data being presented, and FIG. 13 illustrates a screen image of an exemplary modality of location data being presented. DETAILED DESCRIPTION
[00011] Various types of description are discussed in detail below. Although specific implementations are discussed, it should be understood that this is done for illustrative purposes only. A person skilled in the relevant technique will recognize that other components and configurations can be used, without departing from the spirit and scope of the description.
[00012] With reference to FIG. 1, an exemplary system 100 includes a general purpose computing device 100, which includes a processing unit (CPU or processor) 120 and a system bus 110 that couples various system components including system memory 130 such as memory only readout (ROM) 140 and random access memory (RAM) 150 for processor 120. System 100 may include a high speed memory cache 122 directly linked with, in close proximity to, or integrated as part of processor 120. System 100 copies data from memory 130 and / or storage device 160 to cache 122 for quick access by processor 120. In this way, cache 122 provides a performance boost that avoids delays in processor 120 while waiting for data. These and other modules can control or be configured to control processor 120 to perform different actions. Another memory system 130 may also be available for use. Memory 130 may include several different types of memory with different performance characteristics. It can be seen that the described can operate on a computing device 100, with more than one processor 120 or on a group or set of computing devices connected in a network, to provide a greater processing capacity. Processor 120 may include any general purpose processor and a hardware module or software module, such as a module 1 162, module 2 164 and module 3 166 stored in storage device 160, configured to control processor 120, as well as a special purpose processor where software instructions are incorporated into the design of the actual processor. Processor 120 can essentially be a completely independent computing system, containing multiple cores or processors, a bus, memory controller, cache, etc. A multi-core processor can be symmetrical or asymmetric.
[00013] System bus 110 can be any one of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. A basic input / output (BIOS) stored in ROM 140, or similar, can provide the basic routine that helps to transfer information between elements inside the computing device 100, such as during initialization. Computing device 100 further includes storage devices 160, such as a hard disk, a magnetic disk drive, an optical disk drive, tape drive or the like. Storage device 160 may include software modules 162, 164, 166 for controlling processor 120. Other hardware or software modules are contemplated. The storage device 160 is connected to the system bus 110 via a unit interface. The associated computer-readable drives and storage media provide non-volatile storage of computer-readable instructions, data structures, programming modules and other data for computing device 100. In one aspect, a hardware module that performs a function particular includes the software component stored in a computer readable non-transient medium in connection with the necessary hardware components, such as processor 120, bus 110, output device 170, and so on, to perform the function. The basic components are known to those skilled in the art and appropriate variations are contemplated, depending on the type of device, such as whether device 100 is a small, portable computing device, a personal computer, a server computer.
[00014] Although the exemplary embodiment described here employs a storage device 160, it should be noted by those skilled in the art that other types of computer-readable media that can store data are accessible by a computer, such as magnetic cassettes, flash memory cards , versatile digital disks, cartridges, random access memories (RAM) 150, read-only memory (ROM) 140, a cable or wireless signal containing a sequence of bits and the like, can also be used in the operating environment of the example. Computer-readable non-transitory storage media exclude media such as energy, carrier signals, electromagnetic waves, and signals, on their own.
[00015] To allow user interaction with computing device 100, an input device 190 represents any number of input mechanisms, such as a microphone for speaking, a touch screen for gesture or graphical input, keyboard, mouse, motion input, speech and so on. An output device 170 can also be one or more of a series of output mechanisms known to those skilled in the art. In some cases, multimodal systems allow a user to have various types of input to communicate with computing device 100. Communication interface 180 generally governs and manages user input and output from the system. There is no restriction on operating on any specific hardware arrangement and, therefore, the basic features here can easily be replaced by better hardware or firmware arrangements as they are developed.
[00016] For clarity of explanation, the illustrative system modality is presented as including individual function blocks, including function blocks labeled as a "processor" or 120 processor. The functions that these blocks represent can be provided through the use of both dedicated hardware or shared, including, but not limited to, hardware capable of running the software and hardware, such as a 120 processor, which is specifically designed to operate as an equivalent to the software running on a general purpose processor. For example, the functions of one or more processors shown in FIG. 1 can be provided by a single shared processor or multiple processors. (The use of the term "processor" should not be interpreted as referring exclusively to hardware capable of running software). Illustrative embodiments may include microprocessor and / or digital signal processor (DSP) hardware, read-only memory (ROM) 140 for storing software that performs the operations discussed below, and random access memory (RAM) 150 for storing the results. Very large scale integration hardware (VLSI) modes, as well as custom VLSI circuits in combination with a general purpose DSP circuit, can also be provided.
[00017] The logical operations of the various modalities are implemented as: (1) a sequence of steps implemented, operations or computer procedures performed in a programmable circuit inside a general purpose computer, (2) a sequence of steps implemented, operations or computer procedures performed on a programmable circuit for specific use, and / or (3) interconnected machine modules or program motors within the programmable circuits. The system 100 illustrated in FIG. 1 may practice all or part of the aforementioned methods, may be a part of the aforementioned systems, and / or may operate in accordance with the instructions of said non-transitory computer-readable storage media. Such logic operations can be implemented as modules configured to control processor 120 to perform specific functions according to the module's programming. For example, FIG. 1 illustrates three Modi 162, Mod2 164, and Mod3 166 modules, which are modules configured to control processor 120. These modules can be stored on storage device 160 and loaded into RAM 150 or memory 130 at run time or can be stored as would be known in the art in other computer readable memory locations.
[00018] Having described some components of a computing system, the description now turns to FIG. 2, which illustrates a general purpose computing environment 200, in which a user can remotely initiate lost mode on a user's device. As illustrated, multiple computing devices can be connected to a communication network and be configured to communicate with each other through the use of the communications network. Communications network 210 can be any type of network, including a local area network ("LAN"), such as an intranet, a wide area network ("WAN"), such as the internet, or any combination thereof. In addition, communications network 210 may be a public network, a private network, or a combination thereof. The communication network can also be implemented using any type or types of physical means, including wired communication paths and wireless communication paths associated with one or more service providers. In addition, communications network 210 can be configured to support the transmission of messages formatted using a variety of protocols.
[00019] Multiple computing devices can be connected to the communication network. A computing device can be any type of general computing device capable of communicating in a network with other computing devices. For example, the computing device can be a personal computing device, such as a desktop or workstation, a commercial server, or a portable computing device, such as a laptop, smartphone, or a post-PC device. The computing device may include some or all of the features, components and peripherals of the computing device 100 of FIG. 1. To facilitate communication with other computing devices, the computing device may also include a communication interface configured to receive communication, such as a request, data, etc., from another computing device in network communication with the computing device and passing the communication over an appropriate module running on the computing device. The communication interface can also be configured to send a communication to another computing device in network communication with the computing device.
[00020] As illustrated in FIG. 2, the exemplary system includes three computing devices in network communication with each other, a lost user device 205, a "Find My Device" (FMD) server 215 and a requesting user device 220. The system illustrated in FIG . 2 can be configured to remotely initiate lost mode on the lost user device 205. The requesting user device 220 can be configured to communicate with the FMD server 215 to create a lost mode start request on the lost device 205.
[00021] The FMD 215 server can be configured to receive a lost start request on the lost user device 205 and sends a command to the lost user device 205 to initiate lost mode. As shown, the FMD 215 server can contain a number of components. Components can include one or more databases to store data relevant to the operation of the FMD 215 server, for example, an account database 225 and a database of locations 230, and one or more modules or interfaces to interact with the databases and / or control the functionality provided by the FMD 215 server, for example, an authentication module 235, a request module 240 and a location module 245. Each of these components will be discussed in more detail below, in However, it should be understood by a person skilled in the art that the illustrated configuration is only one possible configuration and that other configurations, with more or less components, are possible.
[00022] The FMD 215 server may include an account database 225 configured to store a user profile for each of a plurality of users. A user profile can include a variety of information about the user, for example, the information can include a username, password, a list of all user-owned computing devices, an identifier for each owned computing device user preferences, specified user preferences, contact information, demographic information, etc.
[00023] The FMD 215 server can also include an authentication module 235, configured to communicate with the database of accounts 225 and authenticate that the user requesting to start lost mode on the lost user device 205 is allowed to log in. the request. To correctly authenticate a requesting user, authentication module 235 can be configured to prompt the requesting user to enter authentication information, such as a username and password. To confirm that the authentication information received from the requesting user is correct, authentication module 235 can be configured to communicate with the account database 225 to confirm that the user name and password provided matches a user profile. in the account database 225. If the user name and password provided correspond to a user profile stored in the account database 225, the requesting user can be authenticated with permission to request that lost mode be initiated on anyone computing devices associated with the user profile. Although the username and password are used as an example, a person skilled in the art will recognize that any variety of authentication information may be required of the user, including personal information or answers to predetermined security questions.
[00024] The FMD server 215 may also include an order module 240 configured to allow a user to request the lost mode to be initiated on the lost user device 205. The request module 240 can be configured to provide the requesting user with an interface to create the request for the lost mode to be started on the lost user device 205. The interface can also be configured to receive order data from the requesting user. For example, order data can include an identifier that identifies the lost user's device. The identifier can be any type of identifier, which can identify the lost user device. For example, if the lost user device 205 is a smartphone, the identifier can include a phone number associated with the device. Alternatively, the identifier can include a unique name or ID associated with the device. In some embodiments, the authenticated requesting user can be presented with a list of all user devices listed in the user's profile, and the requesting user can select which user's device is lost.
[00025] In addition to the identifier, the order data can also include contact information. Contact information can include any type of information used to contact the requesting user. For example, contact information can include a phone number, e-mail address, physical address, instant messaging device, website, etc. Request module 240 can be configured to present contact information to the requesting user. In some embodiments, request module 240 can be configured to use the information specified in the user profile data, such as contact information. In some embodiments, request modules 240 can be configured to ask a requesting user whether the requesting user would like to use the contact information stored in the user's profile or enter new contact information.
[00026] The request data can also include a message specified by the requesting user. The message can be any message specified by the requesting user, which the requesting user would like to have displayed on the lost device 205. In some modalities, the message can be predetermined and stored in the user's profile and request module 240 can be configured to allow the requesting user to use the stored message or create a new one.
[00027] The request data can also include a password. The password can be any type of password known to those skilled in the art, such as a numeric pin, character password, gesture, etc. In some embodiments, the password can be programmed by the requesting user and request module 240 can be configured to allow the requesting user to use the memorized password or enter a new one.
[00028] The requesting user can access the FMD 215 server to request that the lost mode be started on the lost device 205 using the requesting device 220 to communicate with the FMD 215 server. For example, in some modalities, the requesting device 220 can include a web browser application configured to request access to the FMD server 215 through communication network 210. In some embodiments, authentication module 235 and request module 240, in whole or in part, can be executed on request device 220 and the user requester can access modules 235 240 from requesting device 220 to create the order.
[00029] Upon receiving the request, including request data, from the requesting user and authenticating that the requesting user is authorized to initiate lost mode on the lost device 205, request module 240 can be configured to send a command, including data of the received request, to the lost device 205 to initiate the lost mode. Lost device 205 can be configured to initiate lockout mode on lost device 205 upon receiving the command.
[00030] The FMD server 215 may also include a location module 245 configured to receive location data from the lost device 205 and transmit the location to the requesting user. Location data can include data indicating the location of the lost device 205, as well as the time the lost device 205 has been in place. Once received, the location module 245 can be configured to transmit location data to the requesting user in several ways. For example, in some embodiments, location data can be sent to requesting device 220. Location module 245 can determine whether requesting device 220 is available and, if available, send location data. If requesting device 220 is not available, the location module can be configured to store location data in a location database 230 on server 215 until requesting device 220 is available.
[00031] Location data can be presented to the requesting user in several ways. In some modalities, the location data can be presented to the requesting user, a map that follows the movement of the lost device 205. In some modalities, the location data can be presented to the requesting user, giving the street address or coordinates Lost device GPS 205.
[00032] Location data can also be sent to the requesting user in several ways. For example, in some modalities the requesting user can enter a web interface or application configured to communicate with the location module 245 to see the location of the lost device. In some embodiments, location data can be sent by email to the owner of the user's device. In some embodiments, the location data can be sent to the requesting device 220 via a push notification to immediately update the requesting user of the location of the lost device 205.
[00033] Although it is described in the examples above the sending of location data, these examples are not intended to be limiting and are just a few possible modalities. A person skilled in the art will recognize that there are numerous ways to send and present data.
[00034] The lost device 205 may contain a number of components. Components can include one or more databases to store data relevant to the functioning of the device and one or more modules or interfaces to interact with the databases and / or control the resources provided by the lost user device, for example, a user interface module 255, lost mode module 260, and module "Find My Device" (FMD) 265. Each of these components will be discussed in more detail below, however, should be understood by a person skilled in the art who the illustrated configuration is only one possible configuration and that other configurations, with more or less components, are possible.
[00035] The lost device 205 may include a user interface module 255 configured to manage the user interface on the lost device 205. This may include the display of all user interface elements on the device, such as icons, buttons , controls, date, time, notifications, warnings, etc.
[00036] The lost device 205 may also include an FMD 265 module configured to start lost mode on the lost device 205, upon receiving the command to start lost mode from the FMD 215 server. For example, in some embodiments, the FMD 265 module it can be a background daemon on the lost device 205 and configured to communicate with the operating system to launch applications and modules running on the lost device 205 as well as hardware control components of the lost device 205.
[00037] The FMD 265 module can be configured to receive a command from the FMD 215 server to initiate the lost mode on the lost device 205. Upon receiving the command, the FMD 265 module can be configured to run the lost mode 260 module. In addition, the FMD module 265 can be configured to communicate the order data received from the FMD 215 server to the lost mode module 260.
[00038] The lost mode module 260 can be configured to run with or as part of the 255 user interface module to graphically lock the lost device. For example, the lost mode module 260 can be a plug-in application configured to communicate with the user interface module 255 through the use of an Application Programming Interface (API) provided by the user interface module 255. The lost mode module 260 can be configured to instruct user interface module 255 to lock lost device 205 and to suppress lost device functionality 205. For example, lost mode module 260 can instruct user interface module 255 that certain user interface elements should not be displayed on the lost device 205. For example, the lost mode module 260 can instruct the user interface module 255 to suppress all user interface elements that allow access to data and / or applications on the lost device 205 and thus put the device in a useless locked state. In addition, the lost mode module 260 can instruct the user interface module 255 to suppress other features, such as displaying notifications on the lost device 205. Although the notification is suppressed, the lost device 205 can still be enabled for receive data that would normally cause the notification to be presented.
[00039] The lost mode module 260 can also instruct the user interface module to present contact information and a message received from the FMD 215 server.
[00040] In addition to displaying the contact information, the lost mode module 260 can also be configured to instruct the user interface module 255 to present a user interface element on the lost device 205 that is activated with limited functionality to allow the lost device 205 to contact the requesting user using the contact information. For example, if the lost device 205 is a smartphone and the contact information provided is a phone number, the lost mode module 260 can be configured to instruct the user interface module 255 to present the contact number and provide a user interface element that allows the smartphone to have limited functionality of making calls to the provided contact number, while outgoing calls to all other numbers are prohibited. Thus, if the smartphone is found, a "good Samaritan" can easily contact the owner of the device, simply by selecting the user interface element to be connected to the contact number provided. Alternatively, the contact information can be an email address and the user interface element can allow the user to compose and send an email to the owner of the device, at the email address provided.
[00041] In addition to running the lost mode module 260, in some modalities, the FMD module 265 can also be configured to transmit location data to the requesting user. For example, FMD module 265 can be configured to collect location data from a GPS component of the lost device 205 and periodically send location data to the requesting user. Location data can be any type of data that can identify the location of the lost device. For example, location data can be GPS coordinates, an address, etc. In addition, location data can include how long the lost device is at the specified location. For example, the FMD module 265 can be configured to receive the time of an internal clock running on the lost device 205.
[00042] In some modalities, the FMD 265 module can be configured to send the location data to the FMD 215 server, which then sends the location data to the requesting user. In some embodiments, the FMD module 265 sends the location data to the requesting device 220. In some embodiments, the FMD module determines whether the requesting device 220 is available to receive the location data, and if so, sends the location data. location to the requesting device 220, but if the requesting device is not available, module 265 sends the location data to the FMD 215 server. In some embodiments, the FMD 265 module sends the location data to a personal account associated with the requesting user, such as the requesting user's email account. Although sending location data to a requesting user is described in the examples above, these are only possible modalities and are not intended to be limiting. One skilled in the art will recognize that location information can be sent to the requesting user in a variety of other ways.
[00043] The FMD 265 module can be configured to program the transmission of location data in several ways. For example, in some modalities, the FMD 265 module can be configured to send location data, at defined time intervals, such as every 10 minutes, 30 minutes, 1 hour, etc. In some embodiments, location data can be sent based on a heuristic that determines when the requesting user would like location data to be sent. For example, the heuristic may conclude that, based on the lost device making a significant move at the location, the requesting user would like to be updated from the new location of the lost device 205. Alternatively, the heuristic may determine that the requesting user would like to be updated about the location of the lost device based on the time of day, for example, as the first thing in the morning, when the requesting user is likely to wake up. In some embodiments, the heuristic may determine that the requesting user would like messages to be sent less frequently, for example, when the battery is low and sending location data less frequently will preserve battery life and allow the 205 lost device is tracked as long as possible.
[00044] To end lost mode on lost device 205, lost mode module 260 can be configured to instruct user interface module 255 to present a request for a password to be entered. If the correct password is entered, the FMD module can be configured to terminate the module in a lost mode 260, thus returning the 255 user interface module to its regular functionality. The lost device 205 can be unlocked and all deleted features can be restored. In addition, the FMD 265 module can stop collecting and sending location data to the requesting user.
[00045] In some modalities, the lost mode can be ended remotely. For example, the lost device 205 may receive a command from the requesting user that the lost mode be terminated. The command can include the password or require the password to be entered before it is sent. In some embodiments, the command may be received from the FMD 215 server. In some embodiments, the command may be received from the requesting device 220.
[00046] FIG. 3 illustrates an exemplary modality method for remotely starting lost mode on a lost device. As illustrated, the method starts with a request being received by the server to initiate lost mode on a lost device 305. The request can inform the server that the lost device is lost and that the requesting user would like to initiate lost mode on the device lost. In addition, the order may include request data such as a device identifier, contact information, message and password. The device identifier can be any type of data that can identify the lost device such as a phone number, UUID, device name, etc.
[00047] The request data can also include contact information and a message provided by the requesting user to be displayed on the lost device. Contact information can be any identifying information as the requesting user can be contacted. For example, the contact information can be a phone number and be accompanied with the message: "Please call this number, if found." Alternatively, the contact information can be an email address and be accompanied with the message: "Please send me an email at this address, if you find this device."
[00048] In some embodiments, the request data may also include a password. For example, the requesting user can set a password that, when starting lost mode on the lost device, can be used to end lost mode and return the lost device to normal operation.
[00049] The requesting user can request that the lost mode be started on the lost device in several ways. For example, in some modalities, the requesting user can enter a website configured to request requesting data from a requesting user and send a request that the lost mode should be initiated on the lost device. In some modalities, the requesting user can use an application running on a requesting device in network communication with the server to request that the lost mode be started on the lost device. The application can be configured to request from the user the order data used to create the order.
[00050] After receiving the request on the server, the method proceeds to block 310 where the server determines whether the requesting user is authorized to initiate the lost mode on the lost device. To do this, the server may require the requesting user to enter authentication information. For example, the requesting user may be asked to enter a username and password associated with the lost device. Alternatively, the requesting user may be asked to answer predetermined authentication questions. For example, authentication issues may ask for personal information associated with the known owner of the lost device, such as the owner's social security number or the mother's maiden name, etc.
[00051] If it is determined that the requesting user is not authorized to initiate the lost mode on the lost device, the method can proceed to block 315 in which the server sends the user a message that indicates to the requesting user that it is not authorized to initiate the lost mode on the lost device and the method ends.
[00052] If it is determined that the requesting user is authorized to initiate the lost mode on the user's device, the method proceeds to block 320, in which a command is sent to the lost device instructing the lost device to initiate the lost mode. The command can include the order data received in the order to start lost mode, such as contact information, message, password, etc. An exemplary method of lost mode being initiated by the lost device is illustrated in FIG. 4 and explained in detail below.
[00053] The method illustrated in FIG. 3 then determines whether the location data is received from the lost device 325. The location data can be any type of data that describes the location of the lost device. For example, location data can include coordinates of the lost device's global positioning system (GPS) or the address of the lost device.
[00054] If none of the location data is received from the lost device, the method ends. If location data is received, the server can send location data to requesting user 330.
[00055] FIG. 4 illustrates an exemplary method of initiating the lost mode on the lost device. As illustrated, the method starts at block 405, when a command is received on the lost device to initiate the lost mode. The command can be received from a server that authenticated the requesting user as being authorized to request that lost mode be initiated on the lost device. The command can include request data, such as contact information, a message and a password.
[00056] After receiving the command, the method then proceeds to block 410, in which the lost device, blocks its use. For example, this may include the presentation of a lock screen that does not have any user interface elements that provide access to lost device functionality or any data or applications stored on the user's device. In some embodiments, the lost device can also be locked so that the data stored on the lost device cannot be accessed from another computing device connected to the lost device. For example, if the lost device is a smartphone connected to a desktop computer, the smartphone can be locked so that files stored on the smartphone cannot be accessed by the desktop computer. Locking the lost device can protect the lost device and prevent data stored on it from being accessed by an unauthorized user.
[00057] After blocking the lost device, the method then suppresses the functionality of selecting 415 from the lost device. This may include functionality that allows you to use the lost device or present information intended for the owner of the lost device. For example, functionality such as alerts and notifications displayed on the lost device can be suppressed so that information intended for the owner of the lost device cannot be seen by an unauthorized user. In some embodiments, any external buttons on the lost device can be deleted to prevent the user from accessing functionality of the lost device. In some embodiments, the functionality to turn off the lost device can be suppressed to prevent a thief from forbidding the lost device from sending location information. Other features that can be suppressed can include outgoing calls, voice command functionality, camera, video camera, microphone, power, etc. Although only the examples above are given, they are only a few possible modalities and are not intended to be a limiting factor. One skilled in the art will recognize that any functionality of the lost device can be suppressed.
[00058] Once the lost device is blocked 410 and functionality 415 is suppressed, the method proceeds to block 420, in which the lost device transmits location data to the requesting user. Location data can be any data that identifies the location of the lost device. For example, the location data can be the GPS coordinates of the lost device.
[00059] FIG. 5 illustrates an exemplary method of transmitting information data to the requesting user. As illustrated the method starts by collecting location data and the 505 time the location data was collected. For example, the missing terminal may include a GPS device capable of communicating with a GPS satellite to receive the GPS coordinates of the lost device. The lost device can collect location data directly from the GPS device. Alternatively, in some modalities, the GPS device can periodically store location data in a database on the lost device and the location can be collected from the database. The time the location data was collected can be obtained from an internal clock running on the lost device. In some modalities, the time can be received from a GPS satellite from where the lost device's GPS location coordinates are received.
[00060] After collecting data on the location and the associated time, the method determines whether the requesting device 510 is available to receive the location data. The requesting device may be available if the requesting device is in a state that allows data to be received at the requesting device from the lost device. For example, in some modalities, the requesting device is available, if the requesting device is in network communication with the lost device. In some modalities, the requesting device is available if the requesting device is connected or running an application configured to receive and present location data. If the requesting device is available, the lost device can transmit location data to the requesting device 515. If the requesting device is not available, the lost device can transmit location data to server 520 where it can be stored until the requesting device is available or until the requesting device accesses the data on the server.
[00061] After the location data has been transmitted, the method determines whether a 525 transmission condition has been triggered. A transmission condition can be a condition that, when satisfied, instructs the lost device to transmit location data to the requesting user. In some embodiments, the transmission condition can be triggered by a predetermined amount of time that passes from the time the last location data was transmitted. For example, the transmission condition can be triggered after an hour has passed since the last location data was transmitted.
[00062] In some modalities, the transmission condition can be triggered by the lost device making a significant change in the location since the last transmitted position. For example, if the transmission condition can be triggered, if the lost device travels a mile or more from the location previously transmitted.
[00063] The examples given when a transmission condition can be triggered are only examples of modalities and are not intended to be limiting. A person skilled in the art will recognize that the described system can be configured in any manner known in the art.
[00064] If it is determined that a transmission condition has to be triggered, the method may return to block 505. If a transmission condition is not triggered, the method may terminate.
[00065] Returning to FIG.4, by transmitting the location data, the method can then continue to block 425 where the contact information and the message are displayed on the lost device. For example, contact information can be a phone number associated with the requesting user and the message can read "Please call this number if you find this device." This allows a "good Samaritan" who finds the lost device to be able to easily contact the requesting user.
[00066] The method can also display a user interface element 430 which, if selected 435, allows the lost device to contact the requesting user in the provided contact information 440. For example, if the lost device is a telephone cell phone and contact information is a phone number, a user interface element can be displayed on the lost device which, after selection, allows the lost device to make a call to the phone number specified as the contact information. This allows a "good Samaritan" to easily contact the requesting user from the lost device itself, simply by pressing a single button. Although the user interface element is configured to activate suppressed functionality, such as making an outgoing call, the activated functionality can be limited to the contact information provided. For example, a lost smartphone can be activated only to make a call to the phone number provided by the requesting user.
[00067] A requesting user can choose to end lost mode on the lost device by entering a password. The method can determine whether the password was entered 445, and if so, terminate lost mode 450. Terminating lost mode may include removing the lost device lock and restoring all deleted functionality of the lost device. In some ways, the password can be entered on the lost device itself. In some embodiments, the password can be entered remotely, for example, on a requesting device communicating with the server, and a command that the password has been entered can be sent to the lost device.
[00068] FIG. 6 illustrates a screen image of an exemplary interface configured to authenticate a requesting user. As illustrated, a requesting user may be asked to enter a user name 605 and password 610 in the interface. A signal on button 615 can also be displayed and configured to, after selection, send the information that the requesting user entered the 605 username and the 610 password. The submitted username and password can be compared to records in a bank user data to authenticate the requesting user. If the provided username 605 and password 610 match the stored records, the requesting user can be authenticated.
[00069] FIG. 7 illustrates a screen image of an exemplary interface configured to receive a password from the requesting user. As illustrated, the requesting user can enter the password using the provided keyboard. In some modalities, this interface can be configured to receive a predetermined password to authenticate a requesting user. In some modalities, the interface can be configured to receive a new password from an already authenticated requesting user. The new password can be used to unlock the lost device after the lost mode has been started on the lost device.
[00070] FIG. 8 illustrates a screen image of an exemplary interface in which a requesting user can enter contact information. Contact information can be included as part of a lost order to open on a lost device. Contact information can be displayed on the lost device so that, if found, the requesting user can be contacted. As illustrated, the requesting user can enter contact information 805, such as a phone number, using a provided keyboard 810. The user interface may also include a "Next" button 815 configured to receive contact information 805 entered by the requesting user and directs the user to the interface illustrated in FIG. 9.
[00071] FIG. 9 illustrates a screen image of an exemplary modality of an interface in which a requesting user can type a message. The message can be included as part of a lost order to open on a lost device. The message may be displayed on the lost device when the lost mode is initiated. As illustrated, the interface can provide the user with a 905 message input field configured to receive the requesting user's message. Although not illustrated, a requesting user can enter the message using a keyboard or other input device. The interface may also include a "finish" 910 button that is configured to complete the open request on the lost device. After selecting the "complete" button, the typed message, as well as any other request data, such as a password and contact information, can be assembled into an order to initiate lost mode on a lost device and send to the server. Alternatively, the "finish" button can automatically send a command directly to the lost device to initiate the lost mode using the included request data.
[00072] FIG. 10 illustrates a screen image of an exemplary mode of a lost device after the lost mode has been initiated. As illustrated, the lost device has been blocked and runs out of all the user interface elements that allow access to lost device functionality or data or applications stored on the user's device. The lost device can display message 1005 that alerts anyone who finds the lost device that was lost and asks them to call the requesting user. In addition, the contact information of the requesting user 1010 can also be displayed. The illustrated mode also allows the user to enter a password that, if entered correctly, unlocks the lost device and ends the lost mode, thus restoring the lost device to its regular function state.
[00073] FIG. 11 illustrates an image of an exemplary screen mode other than a lost device after the lost mode has been initiated. Similar to the embodiment illustrated in FIG. 10, the lost device can be blocked and message 1105 and contact information 1110 can be displayed to alert anyone who finds the lost device that the device is lost and asks them to contact the requesting user.
[00074] In addition, an 1115 user interface element can be included that allows the lost device to contact the requesting user using contact information. As illustrated, the user interface element can be a button with the title "Touch here to call the owner" that is configured to contact the requesting user upon selection. Although the user interface element is configured to allow the lost device to make a call to a specific phone number for contact information, other calls cannot be made to any other phone numbers, nor any other blocked or enabled functionality suppressed. .
[00075] This mode also includes a sliding button 1120 to unlock instead of password interface 1015 in FIG 10. This is just another possible mode and the sliding unlock button 1120 can be configured to open another page where the user is requested to enter a password to unlock the lost device.
[00076] FIG. 12 illustrates a screen image of an exemplary modality of location data being presented. As illustrated, location data 1205 can be displayed as a dot on a map to illustrate the location of the device. In addition, an information box 1210 can be displayed with the dot showing the time the location data was collected. As illustrated, it was determined that the device is at the location identified one minute before the location data is displayed.
[00077] FIG. 13 illustrates a screen image of an exemplary modality of location data being presented. As illustrated, several location data points 1305 1310 1315 1320 can be displayed as points on the map to illustrate the movement of the lost device. The location data points can be connected by a line to indicate the path of the lost device and the points can be of different colors to mean which location data point is the most recent. For example, all previous location points that can be illustrated in a single color, such as green, while the most recent location point can be illustrated, in a different color, such as red. In addition, each location data point can be configured to display a 1325 information box associated with the location data point, which identifies the time the device was at the location determined by the location point. As illustrated, the missing device was at location point 1315 16 minutes earlier, at 11:30 am.
[00078] The present description recognizes that the use of such personal information data in the present technology can be used for the benefit of users. For example, personal information data can be used to better understand user behavior, facilitate and measure the effectiveness of ads, applications and delivered content. Therefore, the use of such personal information data allows calculated control of the delivered content. For example, the system can reduce the number of times a user receives a particular ad or other content and can thus select and deliver content that is most meaningful to users. Such changes in the system's behavior improve the user experience. In addition, other uses for personal information data that benefit the user are also covered by this description.
[00079] The present description also contemplates that the entities responsible for the collection, analysis, description, transfer, storage or other use of such personal information data must implement and use consistently the privacy policies and practices that are generally recognized as meeting or exceeding industry or government requirements for maintaining private and secure personal information data. For example, users' personal information must be collected for the entity's legitimate and reasonable uses and not shared or sold outside of legitimate uses. In addition, this collection should take place only after the users' informed consent. In addition, these entities must take all necessary measures to safeguard and guarantee access to such personal information data and to ensure that others with access to personal information data adhere to their privacy policies and security procedures. In addition, these entities can undergo assessment by third parties to certify their adherence to privacy policies and widely accepted practices.
[00080] Despite the above, this description also includes modalities in which users selectively block the use or access to personal information data. That is, the present description contemplates what elements of hardware and / or software can be provided to prevent or block access to said personal information data. For example, in the case of delivery of advertising services, current technology can be configured to allow users to select whether to "opt in" or "disagree" (opt out) to participate in collecting personal information data during registration for services. In another example, users may choose not to provide location information for advertising distribution services. In another example, users can configure their devices or user terminals to prevent the storage or use of cookies and other mechanisms from which personal information data can be discerned. This description also contemplates that other methods or technologies may exist to block access to your personal information data.
[00081] Therefore, while the present description largely covers the use of personal information data to implement one or more of the described modalities, the present description also contemplates that the various modalities can also be implemented without the need for access to such data. personal information. That is, the various modalities of this technology will not be non-operational due to the lack of all or part of the referred personal information data. For example, content can be selected and delivered to users by inferring preferences based on data from non-personal information or a minimal amount of personal information, such as the content being requested by the device associated with a user, other information not personal data available for publicly available content or information delivery services.
[00082] The modalities within the scope of the present description may also include non-transient, computer-readable and / or tangible storage media for execution or having instructions executable by computer or data structures stored therein. Such non-transient, computer-readable storage media can be any available media, which can be accessed by a general purpose or special purpose computer, including the functional design of any specific purpose processor, as discussed above. By way of example, and not limitation, such non-transitory, computer-readable media may include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that it can be used to transport or store desired program code media in the form of computer executable instructions, data structures, or processor chip design. When information is transferred or provided over a network or other communication connection (or wired, wireless, or a combination thereof) to a computer, the computer correctly displays the connection as a computer-readable medium. Thus, any such connection is duly considered a computer-readable medium. Combinations of the above should also be included in the scope of computer-readable media.
[00083] Computer executable instructions include, for example, instructions and data that cause a general purpose computer, special purpose computer, or specific purpose processing device to perform a particular function or group of functions. Executable computer instructions also include program modules that are run by computers in stand-alone or network environments. Program modules generally include routines, programs, components, data structures, objects and the functions inherent in the design of special-purpose processors, etc., that perform specific tasks or implement certain types of abstract data. Computer executable instructions, associated data structures, and program modules represent examples of the means of program codes for executing the method steps disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts to implement the functions described in such steps.
[00084] Those skilled in the art will note that other modes of description can be practiced in networked computing environments with many types of computer system configurations, including personal computers, portable devices, multiprocessor systems, based on microprocessors or programmable electronics, PC network, minicomputers, large computers and the like. The modalities can also be practiced in distributed computing environments, in which the tasks are performed by local and remote processing devices, which are connected (either by wired connections, wireless connections, or by a combination of them), through a communications network. In a distributed computing environment, program modules can be located on both local and remote memory storage devices.
[00085] The various modalities described above are provided for purposes of illustration only and should not be construed to limit the scope of the description. Those skilled in the art will readily recognize various modifications and changes that can be made to the principles described here, without following the modalities of examples and applications illustrated and described here, and without departing from the spirit and scope of the description.
权利要求:
Claims (15)
[0001]
1. Computer-implemented method to locate a computing device, characterized by the fact that it comprises the steps of: receiving, (405) in a lost computing device (205), an authorized command that the lost mode must be initiated in the lost computing device (205), where the authorized command includes contact information (1010) associated with a requesting user; and starting the lost mode on the lost computing device (205) upon receiving the authorized command, in which starting the lost mode comprises: blocking (410) the lost computing device (205), so that data and applications cannot be accessed by an unauthorized user; delete (415) selected functionality from the lost computing device (205); displaying (425) the contact information (1010) on the lost computing device (205); once the lost computing device (205) is blocked and functionality is suppressed, transmit location data identifying the location of the lost computing device data (205) to the requesting user (515), where the location data is transmitted through a transmission condition being triggered, in which the transmission condition is triggered (525) by means of the lost computing device (205) making a significant change in location; and presenting an element of the user interface on the lost computing device (205) that is configured to allow the lost computing device (205) to contact the requesting user based on the contact information associated with the requesting user.
[0002]
2. Method implemented by computer, according to claim 1, characterized by the fact that the authorized command includes a message to initiate the lost mode and also comprises displaying the message on the lost computing device (205).
[0003]
3. Method implemented by computer, according to claim 1 or 2, characterized by the fact that the contact information is a telephone number and to contact the requesting user comprises calling the telephone number.
[0004]
4. Method implemented by computer, according to claim 1 or 2, characterized by the fact that the contact information is an email address and contacting the requesting user comprises composing and sending an email to the email address.
[0005]
5. Method implemented by computer, according to any one of claims 1 to 4, characterized by the fact that suppressing the selected functionality includes suppressing notifications and alerts presented on the lost computing device (205).
[0006]
6. Computer-implemented method according to any one of claims 1 to 5, characterized by the fact that the location data includes the time when the computing device was at the identified location.
[0007]
7. Method implemented by computer, according to any one of claims 1 to 6, characterized by the fact that the location data is transmitted based on a predetermined time.
[0008]
8. Method implemented by computer, according to any one of claims 1 to 7, characterized by the fact that it still comprises the steps of: ending (450) the lost mode when receiving a correct password, in which ending the lost mode comprises : unlock the lost computing device (205); restore the functionality of the deleted computing device (205) deleted, and remove the displayed contact information (1010) associated with the requesting user.
[0009]
9. Method implemented by computer, according to any of claims 1 to 8, characterized by the fact that the authorized command results from the requesting user being authenticated.
[0010]
10. Method implemented by computer, according to any one of claims 1 to 9, characterized by the fact that the requesting user needs to enter authentication information to ensure that the requested user is authorized to request that the loss be initiated.
[0011]
11. Method implemented by computer, according to any one of claims 1 to 10, characterized by the fact that the request is made on a requesting device in network communication with a server configured to communicate with the lost device (205).
[0012]
12. Method implemented by computer, according to claim 11, characterized by the fact that the server is configured to receive a request to initiate the lost mode on the lost computing device (205) and send a command to the lost computing device ( 205) to start the lost mode.
[0013]
13. Computing device (205), characterized by the fact that the computing device (205) comprises: a processor (120); and a memory (130) containing instructions that, when executed, make the processor (120): receive (405), in the computing device, an authorized command that the lost mode must be initiated in the computing device, in which the authorized command includes contact information (1010) associated with a requesting user; and initiating the lost mode on the computing device upon receiving the authorized command, where initiating the lost mode comprises: locking (410) the computing device, so that data and applications cannot be accessed by an unauthorized user; delete (415) selected computing device functionality; display (425) the contact information (1010) on the computing device; once the lost computing device (205) is blocked and functionality is suppressed, transmit location data identifying the location of the lost computing device data (205) to the requesting user (515), where the location data is transmitted through a transmission condition being triggered, in which the transmission condition is triggered (525) by means of the lost computing device (205) making a significant change in the location; and presenting an element of the user interface on the lost computing device (205) that is configured to allow the lost computing device (205) to contact the requesting user based on the contact information associated with the requesting user.
[0014]
14. Computing device according to claim 13, characterized in that the authorized command includes a message and initiating the lost mode further comprises displaying the message on the computing device (205).
[0015]
15. Computer-readable non-transitory medium characterized by the fact that it contains instructions that, when executed by a computing device (205), cause the computing device to perform the method as defined in any of claims 1 to 12.
类似技术:
公开号 | 公开日 | 专利标题
BR102013012756B1|2020-09-29|COMPUTER IMPLEMENTED METHOD, COMPUTER DEVICE AND NON-TRANSITIONAL MEDIA READABLE BY COMPUTER
JP6758501B2|2020-09-23|Blockchain-based data processing methods and devices
US9477833B2|2016-10-25|Systems and methods for updating possession factor credentials
US10165003B2|2018-12-25|Identifying an imposter account in a social network
US8881309B2|2014-11-04|Systems for finding a lost transient storage device
US9830099B1|2017-11-28|Secure erase of storage devices
US11165780B2|2021-11-02|Systems and methods to secure publicly-hosted cloud applications to run only within the context of a trusted client application
WO2018134785A1|2018-07-26|System and method for the persistence of security agents in electronic devices
BR112013033877B1|2021-04-20|information processing device, method of controlling an information processing device, and means of storing information.
US11134081B2|2021-09-28|Authentication mechanism utilizing location corroboration
同族专利:
公开号 | 公开日
US20130326642A1|2013-12-05|
KR101703015B1|2017-02-06|
KR20130136395A|2013-12-12|
AU2013205563A1|2013-12-19|
EP3206155A1|2017-08-16|
EP2672420A2|2013-12-11|
AU2020204428B2|2021-09-09|
US10528770B2|2020-01-07|
AU2013205563B2|2016-01-21|
US9104896B2|2015-08-11|
CN103455771A|2013-12-18|
JP2014003595A|2014-01-09|
JP2018033162A|2018-03-01|
EP3206155B1|2018-09-12|
US8881310B2|2014-11-04|
US20200090415A1|2020-03-19|
US20190018987A1|2019-01-17|
AU2018200869A1|2018-02-22|
US20150324617A1|2015-11-12|
KR101567137B1|2015-11-06|
EP3407243B1|2021-07-14|
JP2015228652A|2015-12-17|
JP5830054B2|2015-12-09|
EP3407243A1|2018-11-28|
BR102013012756A2|2015-10-20|
JP6510610B2|2019-05-08|
EP2672420B1|2017-04-05|
AU2020204428A1|2020-07-23|
AU2018200869B2|2020-04-02|
EP2672420A3|2014-02-26|
US20130326643A1|2013-12-05|
AU2016202411A1|2016-05-12|
KR20150127009A|2015-11-16|
CN109635603A|2019-04-16|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

JP3442257B2|1997-05-06|2003-09-02|日本電信電話株式会社|Packet communication method|
US8289132B2|1997-10-27|2012-10-16|Direct Source International, Inc.|Locking system for electronic equipment|
US6609656B1|1998-03-27|2003-08-26|Micron Technology, Inc.|Method and system for identifying lost or stolen devices|
JPH11331366A|1998-05-15|1999-11-30|Nec Corp|Portable telephone set|
US6166688A|1999-03-31|2000-12-26|International Business Machines Corporation|Data processing system and method for disabling a portable computer outside an authorized area|
US6643781B1|1999-05-14|2003-11-04|Sun Microsystems, Inc.|Method and apparatus for rendering stolen computing devices inoperable|
JP3621612B2|1999-09-09|2005-02-16|株式会社日立国際電気|Mobile phone|
JP2001230858A|2000-02-17|2001-08-24|Mitsubishi Electric Corp|Mobile phone system and mobile phone|
JP2001359157A|2000-06-09|2001-12-26|Casio Comput Co Ltd|Communication system of mobile object and remote control method of communication terminal of mobile object and web server device|
US6662023B1|2000-07-06|2003-12-09|Nokia Mobile Phones Ltd.|Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused|
JP2002218048A|2000-12-28|2002-08-02|Nokia Mobile Phones Ltd|Mobile telephone apparatus|
US7987510B2|2001-03-28|2011-07-26|Rovi Solutions Corporation|Self-protecting digital content|
JP2003030085A|2001-07-10|2003-01-31|Ntt Docomo Inc|Content distribution system, content distribution controller, content distribution method and mobile terminal device|
EP1410667A1|2001-07-18|2004-04-21|Wizard Mobile Solutions Limited|Data security device|
US20030134648A1|2001-10-04|2003-07-17|Reed Mark Jefferson|Machine for providing a dynamic data base of geographic location information for a plurality of wireless devices and process for making same|
US20030074577A1|2001-10-17|2003-04-17|Bean Heather N.|Return-to-owner security lockout for a portable electronic device|
JP2003143649A|2001-10-31|2003-05-16|Nec Access Technica Ltd|Mobile phone system and method for preventing illegal use of mobile phone|
JP2003224886A|2002-01-31|2003-08-08|Toshiba Corp|Communication system and mobile communication terminal|
JP2004112126A|2002-09-17|2004-04-08|Nec Engineering Ltd|Mobile phone|
JP2004166013A|2002-11-14|2004-06-10|Matsushita Electric Ind Co Ltd|Mobile terminal, mobile terminal remote control systems, and method therefor|
JP2004260345A|2003-02-24|2004-09-16|Docomo Aol Inc|Mobile communication apparatus, and apparatus, method and program for managing mobile communication apparatus|
JP2004356685A|2003-05-27|2004-12-16|Nec Corp|Portable communication terminal and system for controlling portable communication terminal|
US9336393B2|2003-08-23|2016-05-10|Softex Incorporated|System and method for protecting files stored on an electronic device|
US7590837B2|2003-08-23|2009-09-15|Softex Incorporated|Electronic device security and tracking system and method|
US6940407B2|2003-08-28|2005-09-06|Motorola, Inc.|Method and apparatus for detecting loss and location of a portable communications device|
JP4117240B2|2003-10-07|2008-07-16|三菱電機株式会社|Wireless mobile communication system|
JP2005128652A|2003-10-21|2005-05-19|Tomcat Products Inc|Composite server system|
JP2005142875A|2003-11-07|2005-06-02|Hitachi Kokusai Electric Inc|Mobile telephone set|
JP2006129329A|2004-11-01|2006-05-18|Nec Corp|Cellular phone system and prevention method against unauthorized use of cellular phone|
JP4462545B2|2004-11-08|2010-05-12|ソニー・エリクソン・モバイルコミュニケーションズ株式会社|Mobile phone terminal with contactless IC card function and operation method thereof|
US7890083B2|2004-12-03|2011-02-15|Samsung Electronics Co., Ltd.|Method of tracking stolen mobile device connected to wireless or wired network|
JP2006217306A|2005-02-04|2006-08-17|Nec Access Technica Ltd|Mobile terminal control system, mobile terminal, radio communication member, method of controlling mobile terminal, and program|
JP2006254311A|2005-03-14|2006-09-21|Mitsubishi Electric Corp|Communication terminal and communication terminal control method|
US7353034B2|2005-04-04|2008-04-01|X One, Inc.|Location sharing and tracking using mobile phones or other wireless devices|
US8270933B2|2005-09-26|2012-09-18|Zoomsafer, Inc.|Safety features for portable electronic device|
US7409219B2|2005-09-29|2008-08-05|Nextel Communications Inc.|System and method for recovering a lost or stolen wireless device|
JP2009124188A|2006-01-30|2009-06-04|Nec Corp|Mobile terminal, method for reporting loss of mobile terminal, and loss reporting program|
JP2007233609A|2006-02-28|2007-09-13|Fujitsu Ten Ltd|Authentication device, authentication system, and authentication method|
JP2007235823A|2006-03-03|2007-09-13|Nec Corp|Loss notification system, portable terminal, loss notification method, and program|
JP4668120B2|2006-05-08|2011-04-13|シャープ株式会社|COMMUNICATION DEVICE, COMMUNICATION DEVICE CONTROL PROGRAM, AND RECORDING MEDIUM CONTAINING COMMUNICATION DEVICE CONTROL PROGRAM|
EP2021968B1|2006-05-18|2012-11-14|Research In Motion Limited|Automatic security action invocation for mobile communications device|
US8038722B2|2006-08-02|2011-10-18|Applied Minds, Llc|Method and apparatus for protecting data in a portable electronic device|
US8170530B2|2007-04-11|2012-05-01|International Business Machines Corporation|Managing wireless devices using access control|
JP2008278108A|2007-04-27|2008-11-13|Nec Electronics Corp|Method for locking information terminal|
US8676273B1|2007-08-24|2014-03-18|Iwao Fujisaki|Communication device|
EP2201545A4|2007-09-11|2011-01-19|Telecomm Systems Inc|Wireless device location alerts on battery notification events|
US8554176B2|2007-09-18|2013-10-08|Qualcomm Incorporated|Method and apparatus for creating a remotely activated secure backup service for mobile handsets|
WO2009050538A1|2007-10-18|2009-04-23|Freescale Semiconductor, Inc.|Prolonging internal power supply life in a mobile communication device|
US8396515B2|2007-11-30|2013-03-12|Symbol Technologies, Inc.|Dynamic battery capacity allocation for data retention among mobile computers and electronic devices|
US8588730B2|2008-03-11|2013-11-19|Intel Corporation|Identifying the location of mobile stations|
US8719909B2|2008-04-01|2014-05-06|Yougetitback Limited|System for monitoring the unauthorized use of a device|
US8932368B2|2008-04-01|2015-01-13|Yougetitback Limited|Method for monitoring the unauthorized use of a device|
US9031536B2|2008-04-02|2015-05-12|Yougetitback Limited|Method for mitigating the unauthorized use of a device|
KR20090123339A|2008-05-27|2009-12-02|엘지전자 주식회사|Portable terminal and method for remote controling thereof|
US8160568B2|2008-05-27|2012-04-17|Lg Electronics Inc.|Mobile terminal and method for remote-controlling thereof|
CN201233598Y|2008-07-25|2009-05-06|深圳市创智成科技有限公司|Notebook computer and mobile communication anti-theft apparatus thereof|
US8600405B2|2008-08-12|2013-12-03|Apogee Technology Consultants, Llc|Location-based recovery device and risk management system for portable computing devices and data|
US8427305B2|2008-08-12|2013-04-23|John J. Madsen|Global positioning satellite [GPS] based recovery device and risk management system for portable computing devices and data|
US8102316B1|2008-08-14|2012-01-24|Barry Brucker|System and method for tracking lost subjects|
US8528059B1|2008-10-06|2013-09-03|Goldman, Sachs & Co.|Apparatuses, methods and systems for a secure resource access and placement platform|
US8627075B2|2008-12-26|2014-01-07|Panasonic Corporation|Communication device that receives external device information from an external device using near field communication|
US8317878B2|2008-12-30|2012-11-27|Intel Corporation|Enabling a service to return lost laptops|
US20120188064A1|2009-02-17|2012-07-26|Lookout. Inc., a California Corporation|System and method for remotely initiating playing of sound on a mobile device|
US8467768B2|2009-02-17|2013-06-18|Lookout, Inc.|System and method for remotely securing or recovering a mobile device|
US8855601B2|2009-02-17|2014-10-07|Lookout, Inc.|System and method for remotely-initiated audio communication|
US8538815B2|2009-02-17|2013-09-17|Lookout, Inc.|System and method for mobile device replacement|
US20100229220A1|2009-03-03|2010-09-09|Grasstell Networks Llc|System and method for theft and data recovery from lost portable devices|
US20100265131A1|2009-04-16|2010-10-21|Charles Fabius|Portable device tracking system|
WO2010121663A1|2009-04-24|2010-10-28|Telefonaktiebolaget Lm Ericsson |Mobile device security|
US20100273452A1|2009-04-26|2010-10-28|Qualcomm Incorporated|Apparatus and Methods For Locating Tracking and/or Recovering a Wireless Communication Device|
US8670748B2|2009-05-01|2014-03-11|Apple Inc.|Remotely locating and commanding a mobile device|
US8919579B2|2009-05-08|2014-12-30|American Greetings Corporation|Ultra narrow flexible retail display for greeting card and non-greeting card merchandise|
US8930438B2|2009-06-17|2015-01-06|Apple Inc.|Push-based location update|
US8974544B2|2009-12-16|2015-03-10|Verizon Patent And Licensing Inc.|Method and system for providing remote configuration of missing mobile devices|
US8904206B2|2010-01-26|2014-12-02|Motorola Mobility Llc|Mobile computing device and method for maintaining application continuity|
JP2011182375A|2010-03-02|2011-09-15|Eibitto:Kk|Tracking and future position prediction of lost personal computer and compact electronic apparatus|
US8542833B2|2010-06-12|2013-09-24|Bao Tran|Systems and methods to secure laptops or portable computing devices|
US8768294B2|2010-06-25|2014-07-01|EmergenSee, LLC|Notification and tracking system for mobile devices|
US8712432B2|2010-07-01|2014-04-29|Absolute Software Corporation|Method and system for tracking mobile electronic devices while conserving cellular network resources|
US8647768B2|2010-09-15|2014-02-11|Samsung Sdi Co., Ltd.|Positive active material composition and positive electrode for electrochemical device, and electrochemical device including the same|
JP5238004B2|2010-09-21|2013-07-17|東芝Itサービス株式会社|Mobile information terminal loss countermeasure system|
US8738321B2|2010-09-30|2014-05-27|Fitbit, Inc.|Methods and systems for classification of geographic locations for tracked activity|
US8174931B2|2010-10-08|2012-05-08|HJ Laboratories, LLC|Apparatus and method for providing indoor location, position, or tracking of a mobile computer using building information|
DE102010052727B4|2010-11-26|2019-01-31|Osram Opto Semiconductors Gmbh|Method for producing an optoelectronic semiconductor chip and such a semiconductor chip|
KR101825653B1|2011-01-03|2018-02-05|삼성전자 주식회사|Method and apparatus for performing lost mode of communication terminal|
US8548499B2|2011-01-12|2013-10-01|Ortiz And Associates Consulting, Llc|Determining the last location of lost and stolen portable electronic devices when wireless communications access to the lost or stolen devices is lost or intermittent|
US8898793B2|2011-01-14|2014-11-25|Nokia Corporation|Method and apparatus for adjusting context-based factors for selecting a security policy|
US20120226751A1|2011-03-01|2012-09-06|Melissa Schwaderer|Geographically Based Location, Alert, and Retrieval System for Lost Animals|
US9392573B2|2011-04-26|2016-07-12|Xirrius, Inc.|Method for determining a geospatial location of a client in signal communication with a wireless array|
US8713649B2|2011-06-03|2014-04-29|Oracle International Corporation|System and method for providing restrictions on the location of peer subnet manager instances in an infiniband network|
US20130090110A1|2011-10-11|2013-04-11|Thomas Cloonan|Managing battery power usage of a lost mobile device to extend search time for the lost mobile device|
US9002395B2|2011-11-21|2015-04-07|Richard Krukar|Message subscription, generation, and delivery with dynamic zones|
CN104145490B|2012-02-23|2018-04-24|英特尔公司|The cooperation discovery at the same level of another equipment in limit signal region and signal transmission|
US9104896B2|2012-06-04|2015-08-11|Apple Inc.|System and method for remotely initiating lost mode on a computing device|US8977294B2|2007-10-10|2015-03-10|Apple Inc.|Securely locating a device|
US8174931B2|2010-10-08|2012-05-08|HJ Laboratories, LLC|Apparatus and method for providing indoor location, position, or tracking of a mobile computer using building information|
US9104896B2|2012-06-04|2015-08-11|Apple Inc.|System and method for remotely initiating lost mode on a computing device|
US10075848B2|2012-08-25|2018-09-11|T-Mobile Usa, Inc.|SIM level mobile security|
US20140108804A1|2012-10-11|2014-04-17|Sling Media Inc.|System and method for verifying the authenticity of an electronic device|
US20150089674A1|2013-09-24|2015-03-26|Absolute Software Corporation|Device lock and automatic publication in lost and found database|
US20150099490A1|2013-10-08|2015-04-09|Cox Communications, Inc.|Systems and Methods of Onscreen Notification|
US9191775B2|2013-12-19|2015-11-17|International Business Machines Corporation|Electronically binding to a lost mobile device|
US9668140B2|2013-12-30|2017-05-30|Cellco Partnership|Devaluation of lost and stolen devices|
US9870490B2|2014-02-25|2018-01-16|Samsung Electronics Co., Ltd.|Apparatus and method for an antitheft secure operating system module|
US9692879B1|2014-05-20|2017-06-27|Invincea, Inc.|Methods and devices for secure authentication to a compute device|
CN105578401A|2014-10-09|2016-05-11|阿里巴巴集团控股有限公司|Locating information collection method, locating information collection device and mobile terminal|
CN104268818B|2014-10-20|2018-04-03|中南大学|The System and method for that a kind of emergent tracking of mobile target and earthquake calamity scope determine|
US9900733B2|2014-10-30|2018-02-20|At&T Intellectual Property I, L.P.|Search and recovery of mobile devices|
US10769315B2|2014-12-01|2020-09-08|T-Mobile Usa, Inc.|Anti-theft recovery tool|
CN104751086A|2015-03-04|2015-07-01|深圳市金立通信设备有限公司|Terminal anti-theft method|
CN104751087A|2015-03-04|2015-07-01|深圳市金立通信设备有限公司|Terminal|
US9558372B2|2015-03-13|2017-01-31|Microsoft Technology Licensing, Llc|Disablement of lost or stolen device|
US10038971B2|2015-03-24|2018-07-31|International Business Machines Corporation|Secure mobile device recovery|
US9565169B2|2015-03-30|2017-02-07|Microsoft Technology Licensing, Llc|Device theft protection associating a device identifier and a user identifier|
US9609119B2|2015-05-23|2017-03-28|Microsoft Technology Licensing, Llc|Disablement of lost or stolen device|
US9686686B1|2015-08-05|2017-06-20|Symantec Corporation|Locating a lost device using crowd GPS|
US10111032B2|2015-11-11|2018-10-23|Tile, Inc.|Location history access for lost tracking device|
CN105873209A|2015-12-15|2016-08-17|乐视移动智能信息技术(北京)有限公司|Method and apparatus for positioning mobile terminal in lost locked state|
US10123170B2|2016-05-11|2018-11-06|Verizon Patent And Licensing Inc.|Energy storage management in solar-powered tracking devices|
WO2018084023A1|2016-11-01|2018-05-11|Uxent株式会社|Information management system and information management method|
US11103012B2|2016-11-17|2021-08-31|Rai Strategic Holdings, Inc.|Satellite navigation for an aerosol delivery device|
CA2997609A1|2017-03-07|2018-09-07|Sennco Solutions, Inc.|Integrated, persistent security monitoring of electronic merchandise|
SG10201702742QA|2017-04-03|2018-11-29|Mastercard International Inc|A tracking system|
US10187868B2|2017-04-10|2019-01-22|Verizon Patent And Licensing Inc.|Systems and methods for finding a user device based on sensor readings of the user device|
US10476875B2|2017-04-21|2019-11-12|T-Mobile Usa, Inc.|Secure updating of telecommunication terminal configuration|
US10171649B2|2017-04-21|2019-01-01|T-Mobile Usa, Inc.|Network-based device locking management|
CN107689993A|2017-08-29|2018-02-13|深圳市盛路物联通讯技术有限公司|Method for managing object and Internet of Things server|
US10652249B2|2017-10-31|2020-05-12|Microsoft Technology Licensing, Llc|Remote locking a multi-user device to a set of users|
CN109982268B|2017-12-28|2022-02-08|富泰华工业(深圳)有限公司|Electronic device, lost article retrieval device and lost article retrieval method|
CN108650394A|2018-04-27|2018-10-12|努比亚技术有限公司|Terminal security control method, mobile terminal and computer readable storage medium|
WO2020084717A1|2018-10-22|2020-04-30|力 松永|Computer system|
US10972901B2|2019-01-30|2021-04-06|T-Mobile Usa, Inc.|Remote SIM unlockimplementation using blockchain|
US11106405B2|2019-03-05|2021-08-31|Toshiba Tec Kabushiki Kaisha|Printer and printer search system|
CN112398860A|2020-11-17|2021-02-23|珠海大横琴科技发展有限公司|Safety control method and device|
法律状态:
2015-10-20| B03A| Publication of a patent application or of a certificate of addition of invention [chapter 3.1 patent gazette]|
2018-12-04| B06F| Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]|
2019-11-19| B06U| Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]|
2020-07-28| B09A| Decision: intention to grant [chapter 9.1 patent gazette]|
2020-09-29| B16A| Patent or certificate of addition of invention granted [chapter 16.1 patent gazette]|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 23/05/2013, OBSERVADAS AS CONDICOES LEGAIS. |
优先权:
申请号 | 申请日 | 专利标题
US13/488,438|2012-06-04|
US13/488,438|US9104896B2|2012-06-04|2012-06-04|System and method for remotely initiating lost mode on a computing device|
[返回顶部]