Abstract:
Described is a technique for retroactively securing a mobile device from a remote source. A user may remotely lock the bootloader of the device from a device management portal. Accordingly, a user may essentially “brick” the device rendering the device unusable by another user until an additional security check is passed. The ability to remotely lock the device may be provided in response to a notification of a potentially unauthorized access of the device. The unauthorized access may include a reset or wipe of the device. Accordingly, the technique provides the ability of an authorized user to secure the mobile device even after being maliciously disassociated from the device.
Abstract:
Disclosed is a two-factor method for protecting access to content, device functionality accounts and the like through portable devices. A master device may facilitate a subordinate device's access to the on-line account by situating the master device in close proximity to the unauthorized user's portable device. Once within close proximity of one another, the devices may exchange information that may eventually allow the subordinate device to access an account, an application or the like.
Abstract:
Methods and systems for updating components on a computing device are described herein. A computing device may perform an example method, which may include receiving, at the computing device, a notification of an update corresponding to an existing component on the computing device. Responsive to receiving the notification, the computing device may receive inputs from sensors of the computing device, which may provide information indicative of a given state of use, time of day, and location associated with the computing device. Based on a weighted combination of the inputs, the computing device may determine whether to update the existing component on the computing device and update the existing component. In some instances, the computing device may use information provided by another computing device to determine whether or not to initiate an update process.
Abstract:
Disclosed is a two-factor method for protecting access to content, device functionality accounts and the like through portable devices. A master device may facilitate a subordinate device's access to the on-line account by situating the master device in close proximity to the unauthorized user's portable device. Once within close proximity of one another, the devices may exchange information that may eventually allow the subordinate device to access an account, an application or the like.
Abstract:
Methods and systems for provisioning a computing device are provided. An example method may include receiving, by a computing device, information indicating a uniform resource identifier (URI) and a wireless access point configured to allow the computing device to connect to a wireless network to enable the computing device to access the URI. The method may also include downloading, onto the computing device, a provisioning software application from the URI. The method may also include executing the provisioning software application on the computing device, wherein the provisioning software application is configured to provision the computing device such that the provisioned computing device is configured to operate in a limited function mode. The method may also include locking the provisioned computing device to prevent changes to the limited function mode.
Abstract:
Methods and systems for updating components on a computing device are described herein. A computing device may perform an example method, which may include receiving, at the computing device, a notification of an update corresponding to an existing component on the computing device. Responsive to receiving the notification, the computing device may receive inputs from sensors of the computing device, which may provide information indicative of a given state of use, time of day, and location associated with the computing device. Based on a weighted combination of the inputs, the computing device may determine whether to update the existing component on the computing device and update the existing component. In some instances, the computing device may use information provided by another computing device to determine whether or not to initiate an update process.
Abstract:
Methods and systems for updating components on a computing device are described herein. A computing device may perform an example method, which may include receiving, at the computing device, a notification of an update corresponding to an existing component on the computing device. Responsive to receiving the notification, the computing device may receive inputs from sensors of the computing device, which may provide information indicative of a given state of use, time of day, and location associated with the computing device. Based on a weighted combination of the inputs, the computing device may determine whether to update the existing component on the computing device and update the existing component. In some instances, the computing device may use information provided by another computing device to determine whether or not to initiate an update process.