Patent application number | Description | Published |
20130237191 | SYSTEMS AND METHODS FOR DEVICE BROADCAST OF LOCATION INFORMATION WHEN BATTERY IS LOW - Location information associated with a computing device may be transmitted from the computing device to a server. The transmitting of the location information may be performed in response to the battery of the computing device being at a low level. The location information may comprise a location of the computing device or information to identify the location of the computing device. As such, when the battery of the computing device approaches a low level, the location of the computing device may be transmitted from the computing device to a server. Thus, if the battery of the computing device is depleted, a user may obtain the last known location of the computing device that was transmitted when the battery was at a low level. The location information may also be used to identify the last known location for and to apply a security policy to the computing device. | 09-12-2013 |
20130263260 | SYSTEM AND METHOD FOR ASSESSING AN APPLICATION TO BE INSTALLED ON A MOBILE COMMUNICATION DEVICE - A system and method checks for harmful behavior of an application to be installed on a mobile communication device. A server computer receives from the mobile communication device data pertaining to the application to be installed and information pertaining to the mobile communication device. The server processes the data and information to determine an assessment for the application to be installed. The assessment is provided to the mobile communication device and the assessment is displayed on the device if the assessment is one of dangerous and potentially dangerous. | 10-03-2013 |
20130304850 | SYSTEMS AND METHODS FOR REMOTELY CONTROLLING A LOST MOBILE COMMUNICATIONS DEVICE - Systems and methods for remotely controlling a lost mobile communications device are disclosed. Authorization credentials may be received and a command request for an action to be performed by a lost mobile communications device may further be received. A command corresponding to the command request may be transmitted to the lost mobile communications device. In response to the transmission of the command, information about the lost mobile communications device may be received and interpreted to determine whether the transmitted command was performed or not performed by the lost mobile communications device. A notification may be provided based on whether or not the command was performed by the lost mobile communications device. | 11-14-2013 |
20130324090 | SYSTEM AND METHOD FOR PROVIDING OFFERS FOR MOBILE DEVICES - Profile information associated with a mobile communications device belonging to a user is stored at a server system. Upon the server system receiving an indication that the mobile communications device needs to be replaced, the profile information is reviewed. Based on the review of the profile, an offer is generated to replace the mobile communications device. | 12-05-2013 |
20140038564 | SYSTEMS AND METHODS FOR LOCKING AND DISABLING A DEVICE IN RESPONSE TO A REQUEST - A computing device may be locked and contact information associated with an owner of the computing device may be displayed. For example, a request to lock the computing device may be received. In response to such a request, at least some of the functionality of the computing device may be disabled. For example, control input or input keys of the computing device may be at least partially disabled. Furthermore, contact information may be shown on the display of the computing device. For example, the phone number, address, email address, or other information of the owner of the computing device may be displayed. | 02-06-2014 |
20140038641 | SYSTEMS AND METHODS FOR DISPLAYING LOCATION INFORMATION OF A DEVICE - Location information associated with a computing device may be periodically transmitted to a server. A user of the computing device may transmit a request to the server when the computing device is no longer able to communicate with the server. For example, the user request may be associated with locating the computing device. In response to the request, the user may be shown the latest received location information of the computing device. The last received location information may be displayed in a web page. | 02-06-2014 |
20140040981 | SYSTEMS AND METHODS FOR APPLYING A SECURITY POLICY TO A DEVICE BASED ON LOCATION - A security policy may be applied to a mobile communications device based on a location of the mobile communications device. For example, a first location of the mobile communications device may be obtained and a first security policy may be applied to the mobile communications device based on the first location. Furthermore, a change in the location of the mobile communications device may be detected. For example, the location of the mobile communications device may change from the first location to a second location. In response to the mobile communications device now being located at the second location, a second security policy may be applied to the mobile communications device. Thus, different security policies may be applied to a mobile communications device as the current location of the mobile communications device changes. | 02-06-2014 |
20140045457 | SYSTEMS AND METHODS FOR APPLYING A SECURITY POLICY TO A DEVICE BASED ON A COMPARISON OF LOCATIONS - Location information associated with a computing device may be received by a server. The server may compare the current location of the computing device with a set of locations associated with the computing device. The comparison may result in a determination that the computing device is in a location that has been identified in the set of locations. In response to such a determination, a particular security policy may be applied to the computing device. For example, the server may transmit a command to the computing device to apply a security policy associated with the location. | 02-13-2014 |
20140045534 | SYSTEMS AND METHODS FOR TRANSMITTING A COMMUNICATION BASED ON A DEVICE LEAVING OR ENTERING AN AREA - Location information associated with a computing device may be received by a server. For example, the location information may indicate the current physical location of the computing device. The server may compare the current location of the computing device with a set of locations associated with the computing device. The comparison may result in a determination that the computing device has entered or left a location area. In response to such a determination, a communication may be transmitted to a user of the computing device. For example, an email may be transmitted to the user. The email may include information describing that the computing device has entered or left the location area. | 02-13-2014 |
20140075365 | METHOD AND SYSTEM FOR VISUALLY MONITORING THE PROGRESS OF A SECURITY OPERATION OF AN ELECTRONIC DEVICE - Security is enhanced for a user of an electronic device by providing a method for visually monitoring the progress of a security operation on an electronic device that provides a plurality of objects including at least one of an application, a document, a file, an image, and a record. When a security operation is launched for at least some of the plurality of objects, an operation window is displayed on the electronic device's display screen. The operation window includes a first operation icon corresponding to a first object on which the security operation is currently being performed. The first operation icon includes a thumbnail icon representing the first object and an operation completion indicator that visually indicates a completion level of the security operation currently being performed on the first object. | 03-13-2014 |
20140095298 | SYSTEM AND METHOD FOR GENERATING EFFECTIVE OFFERS TO REPLACE MOBILE DEVICES - A mobile communications device needs to be replaced. An evaluation is made as to which offers were effective in replacing devices of the same type as the mobile communications device. Based on the evaluation, an offer is generated to replace the mobile communications device with a replacement mobile communications device. | 04-03-2014 |