FIELD: information technology.
SUBSTANCE: at least one identifier of the lost device is loaded into at least one remote client computer; the lost device is searched for in the network neighbourhood of the client based on the loaded identifier of the lost device using at least one client; and parameters of the location of at least one lost device found through the search are determined.
EFFECT: enabling location of a lost electronic device based on data of clients detecting said device in the network neighbourhood, as well as the possibility of finding an electronic device with a connected network adapter.
16 cl, 10 dwg
Title | Year | Author | Number |
---|---|---|---|
CLOUD SERVICE SECURITY BROKER AND PROXY | 2014 |
|
RU2679549C2 |
METHOD, SYSTEM AND APPARATUS FOR EXCHANGING DATA BETWEEN CLIENT DEVICES | 2013 |
|
RU2604423C2 |
APPARATUS AND METHOD FOR CREATING SERVICE ACCOUNTS AND CONFIGURING DEVICES | 2007 |
|
RU2426252C2 |
SYSTEM AND METHOD FOR CHECKING WEB RESOURCES FOR PRESENCE OF MALICIOUS COMPONENTS | 2010 |
|
RU2446459C1 |
SERVICE SHARING | 2010 |
|
RU2504096C2 |
AGGREGATING AND SEARCHING PROFILE DATA FROM DIFFERENT SERVICES | 2008 |
|
RU2463654C2 |
CONNECTION OF DEVICES | 2012 |
|
RU2631137C2 |
STABLE AUTHORISATION CONTEXT BASED ON EXTERNAL IDENTIFICATION | 2008 |
|
RU2390838C2 |
Web-SERVICE FOR DETECTING REMOTE APPLICATIONS | 2004 |
|
RU2359314C2 |
STABLE AUTHORISATION CONTEXT BASED ON EXTERNAL IDENTIFICATION | 2003 |
|
RU2337399C2 |
Authors
Dates
2013-04-27—Published
2011-09-20—Filed