Patent attributes
Approaches are described for detecting when an electronic device (such as a mobile phone) has been stolen or is otherwise being used by someone other than an authorized user of the device. At least one sensor of the device can obtain data during a current use of the device, and the device can determine from the data a set of available features. The features can be compared to a corresponding model associated with an owner (or other authorized user) of the device to generate a confidence value indicative of whether the current user operating the device is likely the owner of the device. The confidence value can be compared to at least one confidence threshold, for example, and based on the comparison, the current user can be provided access to at least a portion of functionality of the device and/or a security action can be performed when the confidence value does not at least meet at least one confidence threshold.