Some content of this application is unavailable at the moment.
If this situation persist, please contact us atFeedback&Contact
1. (WO2014200822) MOBILE DEVICE PERSISTENT SECURITY MECHANISM
Note: Text based on automatic Optical Character Recognition processes. Please use the PDF version for legal matters

CLAIMS

What is claimed is:

1. A method of identifying a device reset of a mobile communications device comprising:

causing, by a security program on the mobile communications device, an identifier associated with the mobile communications device to be sent to a server;

using the security program, determining whether there has been a device reset; and if there has been a device reset, causing, by the security program, the identifier and an indication that there has been a device reset to be sent to a server, wherein the security program is not erased during the device reset.

2. The method of claim 1 comprising:

preloading the security program onto the mobile communications device, the security program thereby being stored on the mobile communications device before the mobile communications device is provided to a user.

3. The method of claim 1 wherein the security program receives a response sent by the server to the mobile communications device causing the security program to alert a user that the device has a registered owner.

4. The method of claim 3 wherein the security program receives a response sent by the server to the mobile communications device causing the security program to alert the user that the registered owner has reported the device as stolen or missing.

5. The method of claim 1 wherein the security program receives a response sent by the server to the mobile communications device causing the security program to lock the device.

6. The method of claim 1 wherein the security program receives a response sent by the server to the mobile communications device causing the security program to locate the device.

7. The method of claim 1 wherein the security program receives a response sent by the server to the mobile communications device causing the security program to send a plurality of device contextual information, wherein the contextual information comprises sensor readings, photographs, audio, video, or nearby WiFi base stations or cell towers from the device.

8. The method of claim 1 wherein the identifier comprises an International Mobile Equipment Identity (IMEI) number, a Mobile Equipment Identifier (MEID) number, a WiFi Media Access Control (MAC) Address, a Bluetooth (BT) MAC Address, a central processing unit (CPU) serial number, a System on Chip(SoC) serial number, an Android iSerial, an Android ID, an Integrated Circuit Card Identifier (ICCID), a subscriber identity module (SIM) serial number, or a subscriber ID (MSI).

9. The method of claim 1 wherein the identifier that is sent following the device reset is one that had been stored on the mobile communications device in a location that survived the device reset.

10. A method comprising:

receiving at a server an identifier and an indication that there has been a device reset from a security program that has been preloaded onto a mobile communications device, the security program thereby being stored on the mobile communications device before the mobile communications device is provided to a user; and

checking an ownership registry to determine if the mobile communications device has a registered owner.

11. The method of claim 10 wherein the server sends a response to the security program on the mobile communications device causing the security program to alert the user that the device has a registered owner.

12. The method of claim 10 wherein the server sends a response to the security program on the mobile communications device causing the security program to alert a current user that the registered owner has reported the device as stolen or missing.

13. The method of claim 10 wherein the server sends a response to the security program on the mobile communications device causing the security program to lock the device.

14. The method of claim 10 wherein the server sends a response to the security program on the mobile communications device causing the security program to locate the device.

15. The method of claim 10 wherein the server sends a response to the security program on the mobile communications device causing the security program to send a plurality of device contextual information, wherein the contextual information comprises sensor readings, photographs, audio, video, or nearby WiFi base stations or cell towers from the device.

16. The method of claim 10 wherein the server notifies the registered owner that the security program on the mobile communications device has communicated with the server.

17. The method of claim 16 wherein the server notifies the registered owner the location of the device.

18. The method of claim 16 wherein the server receives a request from the registered owner to send a response to the security program on the mobile communications device causing the security program to lock the device.

19. The method of claim 16 wherein the server receives a request from the registered owner to send a response to the security program on the mobile communications device causing the security program to locate the device.

20. The method of claim 16 wherein the server receives a request from the registered owner to send a response to the security program on the mobile communications device causing the security program to send a plurality of device contextual information, wherein the contextual information comprises sensor readings, photographs, audio, video, or nearby WiFi base stations or cell towers from the device.

21. The method of claim 10 wherein the server sends a notification to a law enforcement agency that a mobile communications device that has been reported as missing or stolen has communicated with the server.

22. The method of claim 21 wherein the server notifies the law enforcement agency of the location of the device.

23. The method of claim 21 wherein the server receives a request from the law enforcement agency to send a response to the security program on the mobile

communications device causing the security program to lock the device.

24. The method of claim 21 wherein the server receives a request from the law enforcement agency to send a response to the security program on the mobile

communications device causing the security program to locate the device.

25. The method of claim 21 wherein the server receives a request from the law enforcement agency to send a response to the security program on the mobile

communications device causing the security program to send a plurality of device contextual information, wherein the contextual information comprises sensor readings, photographs, audio, video, or nearby WiFi base stations or cell towers from the device.

26. The method of claim 10 wherein the server sends a notification to carrier to which the mobile communications device is currently associated that the device has been reported as missing or stolen and has communicated with the server.