US20050186954A1 - Systems and methods that provide user and/or network personal data disabling commands for mobile devices - Google Patents

Systems and methods that provide user and/or network personal data disabling commands for mobile devices Download PDF

Info

Publication number
US20050186954A1
US20050186954A1 US10/783,617 US78361704A US2005186954A1 US 20050186954 A1 US20050186954 A1 US 20050186954A1 US 78361704 A US78361704 A US 78361704A US 2005186954 A1 US2005186954 A1 US 2005186954A1
Authority
US
United States
Prior art keywords
mobile device
signal
memory
request
disable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/783,617
Inventor
Tom Kenney
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia Oyj
Original Assignee
Nokia Oyj
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Oyj filed Critical Nokia Oyj
Priority to US10/783,617 priority Critical patent/US20050186954A1/en
Assigned to NOKIA CORPORATION reassignment NOKIA CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KENNEY, TOM
Priority to CNA2005800123829A priority patent/CN1947447A/en
Priority to KR1020087010094A priority patent/KR20080045296A/en
Priority to US10/597,862 priority patent/US8995958B2/en
Priority to PCT/IB2005/000333 priority patent/WO2005084052A1/en
Priority to EP05702471A priority patent/EP1719368A1/en
Priority to KR1020067019332A priority patent/KR20060122966A/en
Publication of US20050186954A1 publication Critical patent/US20050186954A1/en
Priority to US14/642,264 priority patent/US9794787B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • H04M1/724631User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad

Definitions

  • the present invention generally relates to mobile devices, and more particularly to systems and methods that employ various mechanisms that selectively disable mobile device functionality to prohibit unauthorized access to information stored within mobile device memory.
  • mobile devices e.g., cellular phones, personal digital assistants, handheld PCs, etc.
  • the information stored on such devices can relate to personal or business data such as social security numbers, phone numbers, addresses, bank account numbers, credit card numbers, etc.
  • Due to technological advances in memory storage capabilities proportional to memory size, a mobile device is capable of storing large amounts of information.
  • the information contained in an individual's mobile device can be extremely user specific and as a result contain highly sensitive information related to the device owner.
  • an unscrupulous user who finds a lost or misplaced mobile device can misuse the information stored therein.
  • a mobile device can contain information that is user-specific but not readily usable unless such data can be correlated with other information.
  • Such data can be tied to the original user providing an easy means for the unscrupulous user to commit identity theft, which can result in loss of money, ability to obtain credit and other damaging affects to a device owner.
  • Such a misuse of information can be a major inconvenience to the device owner and thus is undesirable.
  • mobile devices have several properties making them more vulnerable to loss. They are compact and can be carried everywhere by the user to provide instant access to the information contained within the device. Since the information in the devices can be highly sensitive, there exists a danger that someone who acquires the lost device will have access to all the information contained within. In the hands of an unscrupulous user, this information can be misused to facilitate identity theft. Such a misrepresentation can allow the unscrupulous user to obtain credit cards and other resources and to employ such resources to the detriment of the mobile device owner.
  • user specific information can be contained on the device to allow personal data to be correlated to other stored information such as social security numbers, bank account numbers, addresses and the like. Correlating such data can help an unscrupulous user create a fictional identity as though they are the original user.
  • financial transactions do not require a high level of security between a debtor and creditor.
  • little more than a person's name, billing address and social security number is required to correlate to a credit card number in order to purchase goods in today's technology rich commerce.
  • the unscrupulous user can assume the device owner's identity and inflict financial hardship or other deleterious consequences to the device owner's personal life.
  • One conventional method currently employed to provide a security means is to password protect access to the mobile device.
  • password protect access to the mobile device requires the password protection to be invoked to prevent access to any of the device's functionality.
  • a password In order to gain such access, a password must be entered to allow the user to utilize the device's functionality.
  • Such protection can be insufficient for a number of reasons such as forgetting to invoke the protection, simply entering an easily decipherable password (e.g., 123) to overcome the protection or simply not invoking such protection because it creates an inconvenience for the user.
  • the mobile device provides a convenient means to allow a device owner to structure their life.
  • a device will most likely be small to provide convenient mobility and thus, easily lost or forgotten. Since the mobile device is subject to a high degree of being lost or misplaced, and such a device may contain highly sensitive information, there exists a need to have a method or system to protect such information from access by an unscrupulous user.
  • the present invention relates to systems and methods utilized to prevent unauthorized access to information stored in a mobile device such as a cellular phone, personal data assistant or handheld computer, for example.
  • a mobile device such as a cellular phone, personal data assistant or handheld computer, for example.
  • Such stored data can contain personal and/or highly sensitive data such as social security numbers, bank account numbers, credit card numbers, phone numbers, addresses and the like.
  • the mobile device can employ a plurality of techniques to disable the functionality of the device and thus, prevent access to the device memory to mitigate any damage (e.g., financial) suffered as a result of identity theft or related criminal acts.
  • the mobile device memory is disabled via a signal transmitted from a network employed to provide wireless communication to the device.
  • the signal can be transmitted after the network operator has been notified.
  • Such signal can be sent one time, on a continuous basis or on a user defined periodic basis, for example.
  • a signal can be sent from the device to the network to provide confirmation that the device memory has been disabled.
  • the signal can be utilized to trigger preexisting security features contained in the mobile device.
  • Such features can include disabling the keypad, blanking out the screen display and/or sounding an audio alarm to indicate a theft has occurred.
  • an audio signal can be triggered to notify the device owner of the location of the device.
  • a feature can be employed when the owner believes the device has been misplaced and wishes to locate such a device.
  • a signal can be activated via the Internet or telephone call to the network operator, for example. The owner can activate the signal immediately after losing/misplacing the device to locate the device itself or locate the device and the person currently in possession of the device.
  • Such an audio signal can be used to signal strangers (e.g. persons who have no knowledge of the theft) and/or law enforcement personnel to apprehend the party currently in possession of the device.
  • the device can employ a tracking device, such as a global positioning system or homing beacon to track and locate the lost/misplaced mobile device.
  • a tracking device such as a global positioning system or homing beacon to track and locate the lost/misplaced mobile device.
  • the mobile device can be tracked located to facilitate recovery of the lost data and to provide criminal ramifications for the possessor of the lost device.
  • sending a pre-determined code via the wireless network can disable the device memory.
  • the memory security can be invoked via the caller ID of the phone as it displays the source (e.g., pre-set phone number) of the incoming call.
  • an alphanumeric message e.g., text message
  • sending a pre-determined code via the wireless network can disable the device memory.
  • device memory access can be disabled after a first attempted use by the current user after the network operator has been notified.
  • the memory disabling feature can be invoked by placing a phone call, sending and email or any other attempt at utilizing the lost/misplaced mobile device.
  • the feature can also be invoked via the use of other features of the device that do not relate to outside communication such as a planning/calendar function, calculator, phone book, address book and the like.
  • a third-party signal outside the wireless network can be utilized to invoke the memory-disabling feature.
  • a third-party signal outside the wireless network can be utilized to invoke the memory-disabling feature.
  • Such an embodiment can be employed when the mobile device is outside the reach of the wireless network, and yet still is open to unauthorized data access by the current user.
  • Such a network can be implemented via a satellite network or some other equivalent that can maintain constant communication with the mobile device regardless of location.
  • data from the mobile device can be uploaded via the network and sent to a desired location for subsequent retrieval by the mobile device owner.
  • This particular embodiment is utilized to go beyond simply preventing others from accessing personal and/or sensitive information.
  • This feature can be employed to retrieve data from the device that is difficult to reconstruct such as for example, individual cell phone numbers (which cannot be looked up via directory), addresses and the like.
  • Such uploaded data can be accessed via the Internet, an operator location or stored in a remote location, for example.
  • the data stored on the mobile device can be erased from the device memory completely.
  • This embodiment can be employed after the data as been uploaded from the device memory if desired.
  • Memory erasure can be invoked utilizing at least one of the aforementioned methods and/or systems.
  • At least a portion of the data the device owner wishes to store can be stored remotely.
  • Such data can be stored remotely based on the importance and/or sensitivity to the owner of the device.
  • the device owner can utilize a user name and/or password to access data stored remotely on the wireless network employed with the mobile device.
  • the data can be retrieved and access can be denied any unauthorized user as soon as the network operator is notified.
  • FIG. 1 illustrates an exemplary disabling component system, in accordance with an aspect of the present invention.
  • FIG. 2 illustrates various exemplary systems utilized in accordance with the present invention.
  • FIG. 3 illustrates an exemplary network command system, in accordance with an aspect of the present invention.
  • FIG. 4 illustrates an exemplary methodology that disables the functionality of a mobile device, in accordance with an aspect of the present invention.
  • FIG. 5 illustrates an exemplary methodology that locates and limits the functionality of a mobile device, in accordance with an aspect of the present invention.
  • FIG. 6 illustrates an exemplary methodology that verifies a device has been disabled, in accordance with an aspect of the present invention.
  • FIG. 7 illustrates an exemplary system that illustrates disparate data storage options, in accordance with an aspect of the present invention.
  • FIG. 8 illustrates an exemplary mobile device wherein the invention can be employed.
  • FIG. 9 illustrates an exemplary network wherein the invention can be employed.
  • FIG. 10 illustrates an exemplary computing environment wherein the invention can be employed.
  • the present invention relates to systems and methods that selectively disable mobile device (e.g., cell phone, PDA, handheld PC, laptop computer, etc.) functionality to prohibit access to portions of information stored therein and/or in connection therewith.
  • Such information can be user specific, for example, highly sensitive and/or personal data such as bank account numbers, social security numbers, credit card numbers, addresses and the like.
  • the present invention can disable access to the device to prevent unauthorized access to data stored in device memory.
  • the present invention can be employed in relation to any number of systems and/or environments to inhibit the functionality as desired by the user.
  • the subject invention can limit the functionality of such a system in a plurality of ways including disabling the display, disabling any peripheral input devices to the target system and disabling specific functionality (e.g., access to the target device memory), for example.
  • FIG. 1 illustrates an exemplary system 100 that can disable and/or limit functionality of a target device employed in conjunction with the subject invention.
  • the system 100 comprises an input component 110 (e.g., mobile device antenna) that receives and conveys a notification signal to a disabling component 120 .
  • the signal can be employed to initiate disabling and/or limiting the functionality of a target system (e.g., mobile device) via a control signal sent to an output component 130 .
  • This control signal can be employed to limit functionality of the target device to prohibit unauthorized access to data stored locally in memory, for example.
  • the signal initially sent to the input component 110 can be generated in a multitude of different manners such as a signal, message or bit.
  • the input component can accept a message from an outside source to trigger the disabling component to begin operation.
  • the target device is a cellular phone
  • a call from a pre-defined number can be placed to and the caller ID can be employed to trigger the disabling component.
  • the memory of the device can be protected by way of a simple phone call.
  • the target device can be a personal digital assistant (PDA) associated with a wireless network service.
  • PDA personal digital assistant
  • An email message can be sent to the device to instantiate the disabling component 120 to prevent access to any data contained in the PDA's memory.
  • the output component 130 can interface to a plurality of devices such as laptop computers, handheld PCs, notebook PCs, PDAs, cellular phones and the like.
  • the input component 110 can receive information from wireless networks, keypad entries, pre-defined user inputs, etc. Such inputs can be originated by the original user of the target device or the wireless network operator, contain any amount of information and be represented in various formats such as an ASCII string, one or more bits or a signal.
  • the disabling component 120 can be a microprocessor, a switch, a relay and so on.
  • the unit can trigger the limitation of the target device by simply disabling some access to I/O of a microprocessor, for example.
  • the disabling component can be executable code employed in the operating software of a target device (e.g., palm software in a PDA, proprietary software in a cell phone, Windows software in a handheld PC, etc.). In this manner, the software can be written to execute the disabling component 120 when a specific input is accepted by the input component 110 .
  • the input component 110 is coupled to the disabling component 120 and can interface with the disabling component 120 in a plurality of ways.
  • the disabling component 120 can reside in a notebook computer which is connected to a wireless network.
  • the input component 110 can be located at the network operator's control center and communicate to the disabling component 120 via the wireless network.
  • the output component 130 can take a plurality of forms as dictated by the location and form of the disabling component 120 .
  • the output component 130 can simply take the form of an output in a microprocessor wherein the disabling component 120 is executable software.
  • the output component 130 can be a signal sent from a cellular network to a phone connected to such a network. Once the disabling signal is sent to the phone (e.g., target device), the functionality of the phone will be limited.
  • FIG. 2 illustrates an exemplary system 200 that shows a plurality of disparate target devices can be employed in conjunction with the present invention wherein communication is facilitated with the target devices via a wireless network command 205 .
  • target devices include a handheld PC 210 , notebook computer 220 , laptop computer 230 , PDA 240 and cell phone 250 .
  • the target devices receive a signal from the wireless network command 205 to disable the memory and/or limit the functionality of the device.
  • the signal sent to the device can carry the disabling command or simply trigger such a disabling command locally at the target device, for example.
  • Such a local command could activate a security feature inherent in the device.
  • a voice lock feature can be activated utilizing the disabling signal sent from the wireless network command 205 .
  • the devices are shown receiving the command via wireless network, such a command can be sent in any desired manner.
  • the device could be connected to a land based network (e.g., LAN, WAN, etc) and such a connection can be made utilizing a physical connection (e.g., Ethernet cable, serial cable, parallel cable, USB cable, etc).
  • a land based network e.g., LAN, WAN, etc
  • a physical connection e.g., Ethernet cable, serial cable, parallel cable, USB cable, etc.
  • FIG. 3 illustrates an exemplary system 300 that conveys a signal from a network command component 310 via a cell tower 320 to a cellular phone 330 .
  • the cellular phone 330 is coupled to a disabling component 340 , which can limit the functionality of such a mobile device and thus, prevent an unauthorized user from accessing the memory of the device or perform unauthorized actions.
  • the signal sent from the network command component 310 can be in the form of a caller ID which is pre-set to disable the phone as soon as the call is made and received.
  • the command can be part of the signaling protocol (e.g., IS2000, CDMA, GSM, WCDMA, etc.) employed by the mobile device to facilitate wireless communication.
  • the signaling protocol e.g., IS2000, CDMA, GSM, WCDMA, etc.
  • the disabling component 340 is associated with four disabling systems that limit the functionality of the cellular phone 330 .
  • the methods shown represent both intrusive and non-intrusive alternatives in accordance with the subject invention.
  • an intrusive method is one that renders the device memory permanently inaccessible such as by deletion of such memory, for example.
  • a non-intrusive technique does not permanently disable device functionality and is typically associated with a device's own security features (e.g., keypad lock, voice lock, etc).
  • the disabling systems shown are disable keypad 350 , blank screen 360 , sound audio alarm 370 and erase memory 380 .
  • the disable keypad command 350 is non-intrusive and prevents the unauthorized user from inputting commands to the mobile device 330 and thus, accessing data stored in the device. Utilizing the blank screen command 360 is similarly non-intrusive and limits functionality of the phone by inhibiting the display of command options available to the user.
  • An alternative command is to sound an audio alarm 370 to deter an unauthorized user from accessing data and/or allowing the original device owner to easily determine the location of the device 330 .
  • An invasive alternative to the above-described commands is to erase memory 380 of the device 330 , which prohibits data access by substantially all users. It is to be appreciated that the above-described embodiment can be employed in relation to substantially any mobile device as noted above.
  • FIGS. 4-6 illustrate document annotation methodologies 400 , 500 and 600 in accordance with the present invention.
  • the methodologies are depicted and described as a series of acts. It is to be understood and appreciated that the present invention is not limited by the acts illustrated and/or by the order of acts, for example acts can occur in various orders and/or concurrently, and with other acts not presented and described herein. Furthermore, not all illustrated acts may be required to implement the methodologies in accordance with the present invention. In addition, those skilled in the art will understand and appreciate that the methodologies could alternatively be represented as a series of interrelated states via a state diagram or events.
  • a methodology 400 that facilitates disabling the functionality of a mobile device upon the reception of a disabling signal from an outside source.
  • a disabling signal is received from an outside source.
  • the signal can be sent via a network command control.
  • Such a signal can be sent, for example, on a periodic basis or based on an event such as when the mobile device is lost or stolen.
  • This signal can be broadcast throughout the wireless network employed by the mobile device.
  • a third party carrier can broadcast the disable signal to insure communication with the device regardless of location.
  • data is extracted from the signal in order to determine if the signal contains information that relates to disabling and/or limiting the functionality of the device. For example, if the mobile device is a cellular phone and call is made to such a phone, the caller ID of the caller can be utilized to trigger the memory disabling component as mentioned above.
  • the signal can be sent to the mobile device by way of the signaling protocol of the wireless network on which the device communicates (e.g., IS2000, CDMA, GSM, WCDMA, etc).
  • the functionality of the device is disabled based on the information received from the signal sent to the device. For example, if the signal relates to locking the keypad, the device keypad will lock upon reception of the signal.
  • the data stored in the device memory can be transferred to another location via the wireless network.
  • the disabling signal once the disabling signal is received, it can contain a command to first upload desired data to a data store located on the network. Such a data store can be accessed from a plurality of disparate locations that communicate on the wireless network such as desktop computers, laptop computers, PDAs and the like.
  • the original owner of the device can notify the network to disable the mobile device.
  • the original owner can notify the network in a multitude of ways including a wireless network, the Internet or via computer, PDA or cell phone, for example. Further, a plurality of choices can be made available to the original device owner to select the type and duration of the functional limitation of the device. For example, the owner may wish to disable the screen, upload the information to a remote data store and then erase the memory. Thus, a single command can be utilized and upon completion, the network will no longer attempt to communicate with the device.
  • the device is located in order to ensure communication is successful with the device and/or to allow recovery of the device by the original owner.
  • a global positioning system GPS
  • the GPS can function at all times or, alternatively, can function only for a desired duration of time (e.g., until the device is recovered).
  • Choosing the type of method to locate the device can be related to the duration of time that has passed from when the device is lost or stolen to when the owner makes such a discovery.
  • choosing such a method can be related to the location (e.g., airport home, office, etc.) in which the device was lost or stolen.
  • an audio signal can be sounded to indicate the location of the device when the owner has recently lost the device.
  • an audio alarm can be initiated even if the phone is off or the ringer is off.
  • the GPS function can be utilized when a device has been out of the possession of the owner for a substantial period of time. If the GPS locator is utilized, the device owner can track the location of the device via a network operator such as a network operator website. In this manner, the device and the data contained within the device can be recovered.
  • the device owner can notify the network their device has been lost or stolen, and such a device can be disabled upon an attempted use of the device. For example, when the current possessor (e.g., not the owner) of the device attempts to place a phone call, the network can be notified and the disabling signal can be sent to the device.
  • the device functionality can be limited by utilizing invasive or non-invasive techniques as noted above. Some invasive techniques are to erase the data from the memory of the device or to permanently disable the device itself. Some non-invasive techniques are to sound an audio alarm, lock the keypad of the device or to blank the screen of the device. It is to be appreciated that numerous techniques exist and that the disabling signal can be employed in association with substantially any desired technique.
  • an exemplary method 600 that sends a signal and verifies such signal has been received by the device.
  • the network operator receives a request to disable a device that communicates with the network. Such a request can be sent via phone, email, web application, disparate mobile device and the like. Further, the network operator can verify the request at 620 to insure an unscrupulous user (e.g., non-device owner) is not making the disabling request. Such verification can be made utilizing a user name and password or security question that relates to personal information (e.g., mother's maiden name, social security number, father's middle name etc), for example. Thus, by utilizing the subject invention, security measures can be implemented to insure the systems and methods are employed by authorized requestors.
  • a signal is broadcast to disable the device once it has been determined the user is authorized to make such a request.
  • a disabling signal can be broadcast utilizing the wireless network to communicate with the device (e.g., cell phone network).
  • a third party signal e.g., satellite communication
  • the signal can be sent one time, on a periodic basis or continuously until communication is successful, for example.
  • the network operator can verify the device has been disabled. Such verification provides a robust, closed loop control to insure the broadcast signal successfully communicates with the device and that the device has been disabled. Such verification can be made via a signal sent back from the device (e.g., handshake, ACK/NACK or ping). The original device owner can subsequently be contacted via phone, email, etc. to provide them with such information. Further, the device owner can decide to take further action (e.g., delete the memory) if they have located the information elsewhere and no longer wish to maintain the data in the device memory. Thus, the level of disability to the device can be modified and/or changed as desired by the user.
  • FIG. 7 illustrates an exemplary system 700 that stores and/or transmits data from a mobile device to a data store located locally and/or remotely in relation to the device.
  • Local memory 710 can be employed to store data entered into the mobile device 720 and/or transmitted to the mobile device via wireless communication.
  • information can be transmitted utilizing a cell tower 730 to communicate with the remote data store 740 .
  • data located in the remote data store 740 can be accessed utilizing a personal computer 750 , handheld computer 760 , laptop computer 770 , or any other device which communicates across the network, for example.
  • Such local and remote data stores can be utilized concurrently (e.g., data is stored in both locations simultaneously), or independent of one another wherein the data is stored locally and/or remotely.
  • the device owner can manage his/her data in a number of ways. For example, data can be ranked in order of importance to the user. In one aspect of the present invention, the location the data is stored is dependent upon the importance ranking (unimportant, important, etc.) associated with the data. For example, data that is ranked as important can be stored remotely to insure easy and convenient recovery of such data. To further insure the data is secure, the remote storage can have a redundant data store, for example. Contrarily, data that is ranked as unimportant can be stored locally so that if data recovery is not possible, it is of no substantial loss to the device owner.
  • FIG. 8 illustrates an exemplary mobile (e.g., portable and wireless) telephone 800 that can employ the novel aspects of the present invention.
  • the mobile telephone 800 comprises an antenna 810 that communicates (e.g., transmit and receive) radio frequency signals with one or more base stations.
  • the antenna 810 can be coupled to duplexer circuitry (e.g., as described herein) within the mobile telephone 800 .
  • the mobile telephone 800 can include a separate signal-receiving component (not shown) that can also be coupled to the duplexer.
  • the mobile telephone 800 further comprises a microphone 820 that receives audio signals and conveys the signals to at least one on-board processor for audio signal processing, and an audio speaker 830 for outputting audio signals to a user, including processed voice signals of a caller and recipient music, alarms, and notification tones or beeps.
  • the mobile telephone 800 can include a power source such as a rechargeable battery (e.g., Alkaline, NiCAD, NiMH and Li-ion), which can provide power to substantially all onboard systems when the user is mobile.
  • a rechargeable battery e.g., Alkaline, NiCAD, NiMH and Li-ion
  • the mobile telephone 800 can further include a plurality of multi-function buttons including a keypad 840 , menu navigating buttons 850 and on-screen touch sensitive locations (not shown) to allow a user to provide information for dialing numbers, selecting options, navigating the Internet, enabling/disabling power, and navigating a software menu system including features in accordance with telephone configurations.
  • a display 860 can be provided for displaying information to the user such as a dialed telephone number, caller telephone number (e.g., caller ID), notification information, web pages, electronic mail, and files such as documents, spreadsheets and videos.
  • the display 860 can be a color or monochrome display (e.g., liquid crystal, CRT, LCD, LED and/or flat panel), and employed concurrently with audio information such as beeps, notifications and voice.
  • a color or monochrome display e.g., liquid crystal, CRT, LCD, LED and/or flat panel
  • audio information such as beeps, notifications and voice.
  • the mobile telephone 800 is suitable for Internet communications, web page and electronic mail (e-mail) information can also be presented separately or in combination with the audio signals.
  • the menu navigating buttons 850 can further enable the user to interact with the display information.
  • the keypad 840 can provide keys that facilitate alphanumeric input, and are multifunctional such that the user can respond by inputting alphanumeric and special characters via the keypad 840 in accordance with e-mail or other forms of messaging communications.
  • the keypad keys also allow the user to control at least other telephone features such as audio volume and display brightness.
  • An interface can be utilized for uploading and downloading information to memory, for example, the reacquisition time data to the telephone table memory, and other information of the telephone second memory (e.g., website information and content, caller history information, address book and telephone numbers, and music residing in the second memory).
  • a power button 870 allows the user to turn the mobile telephone 800 power on or off.
  • the mobile telephone 800 can further include memory for storing information.
  • the memory can include non-volatile memory and volatile memory, and can be permanent and/or removable.
  • the mobile telephone 800 can further include a high-speed data interface 880 such as USB (Universal Serial Bus) and IEEE 1394 for communicating data with a computer.
  • Such interfaces can be used for uploading and downloading information, for example website information and content, caller history information, address book and telephone numbers, and music residing in the second memory.
  • the mobile telephone 900 can communicate with various input/output (I/O) devices such as a keyboard, a keypad, and a mouse.
  • I/O input/output
  • FIGS. 15 and 16 are intended to provide a brief, general description of a suitable computing environment in which the various aspects of the present invention can be implemented. While the invention has been described above in the general context of computer-executable instructions of a computer program that runs on a computer and/or computers, those skilled in the art will recognize that the invention also can be implemented in combination with other program modules. Generally, program modules include routines, programs, components, data structures, etc. that perform particular tasks and/or implement particular abstract data types.
  • inventive methods may be practiced with other computer system configurations, including single-processor or multiprocessor computer systems, mini-computing devices, mainframe computers, as well as personal computers, hand-held computing devices, microprocessor-based or programmable consumer electronics, and the like.
  • the illustrated aspects of the invention may also be practiced in distributed computing environments where task are performed by remote processing devices that are linked through a communications network. However, some, if not all aspects of the invention can be practiced on stand-alone computers.
  • program modules may be located in both local and remote memory storage devices.
  • FIG. 9 illustrates an exemplary computing environment 900 in which the present invention can be employed.
  • the system 900 includes one or more client(s) 910 .
  • the client(s) 910 can be hardware and/or software (e.g., threads, processes, computing devices).
  • the system 900 additionally includes one or more server(s) 930 .
  • the server(s) 930 can be hardware and/or software (e.g., threads, processes, computing devices).
  • the system 900 further includes a communication framework 950 that can be employed to facilitate communications between the client(s) 910 and the server(s) 930 .
  • the client(s) 910 can interface with one or more client data store(s) 960 , which can be employed to store information local to the client(s) 910 .
  • the server(s) 900 can interface with one or more server data store(s) 940 , which can be employed to store information local to the servers 930 .
  • an exemplary environment 1010 for implementing various aspects of the invention includes a computer 1012 .
  • the computer 1012 includes a processing unit 1014 , a system memory 1016 , and a system bus 1018 .
  • the system bus 1018 couples system components including, but not limited to, the system memory 1016 to the processing unit 1014 .
  • the processing unit 1014 can be any of various available processors. Dual microprocessors and other multiprocessor architectures also can be employed as the processing unit 1014 .
  • the system bus 1018 can be any of several types of bus structure(s) including the memory bus or memory controller, a peripheral bus or external bus, and/or a local bus using any variety of available bus architectures including, but not limited to, 8-bit bus, Industrial Standard Architecture (ISA), Micro-Channel Architecture (MSA), Extended ISA (EISA), Intelligent Drive Electronics (IDE), VESA Local Bus (VLB), Peripheral Component Interconnect (PCI), Universal Serial Bus (USB), Advanced Graphics Port (AGP), Personal Computer Memory Card International Association bus (PCMCIA), and Small Computer Systems Interface (SCSI).
  • ISA Industrial Standard Architecture
  • MSA Micro-Channel Architecture
  • EISA Extended ISA
  • IDE Intelligent Drive Electronics
  • VLB VESA Local Bus
  • PCI Peripheral Component Interconnect
  • USB Universal Serial Bus
  • AGP Advanced Graphics Port
  • PCMCIA Personal Computer Memory Card International Association bus
  • SCSI Small Computer Systems Interface
  • the system memory 1016 includes volatile memory 1020 and nonvolatile memory 1022 .
  • the basic input/output system (BIOS) containing the basic routines to transfer information between elements within the computer 1012 , such as during start-up, is stored in nonvolatile memory 1022 .
  • nonvolatile memory 1022 can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory.
  • Volatile memory 1020 includes random access memory (RAM), which acts as external cache memory.
  • RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).
  • SRAM synchronous RAM
  • DRAM dynamic RAM
  • SDRAM synchronous DRAM
  • DDR SDRAM double data rate SDRAM
  • ESDRAM enhanced SDRAM
  • SLDRAM Synchlink DRAM
  • DRRAM direct Rambus RAM
  • Disk storage 1024 includes, but is not limited to, devices like a magnetic disk drive, floppy disk drive, tape drive, Jaz drive, Zip drive, LS-100 drive, flash memory card, or memory stick.
  • disk storage 1024 can include storage media separately or in combination with other storage media including, but not limited to, an optical disk drive such as a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive (DVD-ROM).
  • an optical disk drive such as a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive (DVD-ROM).
  • a removable or non-removable interface is typically used such as interface 1026 .
  • FIG. 10 describes software that acts as an intermediary between users and the basic computer resources described in suitable operating environment 1010 .
  • Such software includes an operating system 1028 .
  • Operating system 1028 which can be stored on disk storage 1024 , acts to control and allocate resources of the computer system 1012 .
  • System applications 1030 take advantage of the management of resources by operating system 1028 through program modules 1032 and program data 1034 stored either in system memory 1016 or on disk storage 1024 . It is to be appreciated that the present invention can be implemented with various operating systems or combinations of operating systems.
  • Input devices 1036 include, but are not limited to, a pointing device such as a mouse, trackball, stylus, touch pad, keyboard, microphone, joystick, game pad, satellite dish, scanner, TV tuner card, digital camera, digital video camera, web camera, and the like. These and other input devices connect to the processing unit 1014 through the system bus 1018 via interface port(s) 1038 .
  • Interface port(s) 1038 include, for example, a serial port, a parallel port, a game port, and a universal serial bus (USB).
  • Output device(s) 1040 use some of the same type of ports as input device(s) 1036 .
  • a USB port may be used to provide input to computer 1012 , and to output information from computer 1012 to an output device 1040 .
  • Output adapter 1042 is provided to illustrate that there are some output devices 1040 like monitors, speakers, and printers, among other output devices 1040 , which require special adapters.
  • the output adapters 1042 include, by way of illustration and not limitation, video and sound cards that provide a means of connection between the output device 1040 and the system bus 1018 . It should be noted that other devices and/or systems of devices provide both input and output capabilities such as remote computer(s) 1044 .
  • Computer 1012 can operate in a networked environment using logical connections to one or more remote computers, such as remote computer(s) 1044 .
  • the remote computer(s) 1044 can be a personal computer, a server, a router, a network PC, a workstation, a microprocessor based appliance, a peer device or other common network node and the like, and typically includes many or all of the elements described relative to computer 1012 .
  • only a memory storage device 1046 is illustrated with remote computer(s) 1044 .
  • Remote computer(s) 1044 is logically connected to computer 1012 through a network interface 1048 and then physically connected via communication connection 1050 .
  • Network interface 1048 encompasses communication networks such as local-area networks (LAN) and wide-area networks (WAN).
  • LAN technologies include Fiber Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI), Ethernet/IEEE 802.3, Token Ring/IEEE 802.5 and the like.
  • WAN technologies include, but are not limited to, point-to-point links, circuit switching networks like Integrated Services Digital Networks (ISDN) and variations thereon, packet switching networks, and Digital Subscriber Lines (DSL).
  • ISDN Integrated Services Digital Networks
  • DSL Digital Subscriber Lines
  • Communication connection(s) 1050 refers to the hardware/software employed to connect the network interface 1048 to the bus 1018 . While communication connection 1050 is shown for illustrative clarity inside computer 1012 , it can also be external to computer 1012 .
  • the hardware/software necessary for connection to the network interface 1048 includes, for exemplary purposes only, internal and external technologies such as, modems including regular telephone grade modems, cable modems and DSL modems, ISDN adapters, and Ethernet cards.

Abstract

The present invention relates to systems and methods that employ various mechanisms to selectively disable mobile device functionality. In general, mobile devices can be utilized to store personal and/or highly sensitive information such as bank account numbers, social security numbers, credit card numbers and the like. If the mobile device is lost or stolen, data stored within the device can be accessed by an unauthorized user; and, thus, any personal and/or highly sensitive information can be obtained. In order to mitigate unauthorized access, the subject invention provides a disabling component that communicates with the lost or stolen device to render data stored thereon inaccessible. Further, the data can be stored in local or remote locations to backup stored information, thereby creating a more robust and reliable method of storing information important to the device owner. These features provide enhancements over conventional mobile device security techniques.

Description

    TECHNICAL FIELD
  • The present invention generally relates to mobile devices, and more particularly to systems and methods that employ various mechanisms that selectively disable mobile device functionality to prohibit unauthorized access to information stored within mobile device memory.
  • BACKGROUND OF THE INVENTION
  • In today's world, the use of mobile devices (e.g., cellular phones, personal digital assistants, handheld PCs, etc.) has become a standard form of maintaining communication with others as well as a means to store data important to the user. The information stored on such devices can relate to personal or business data such as social security numbers, phone numbers, addresses, bank account numbers, credit card numbers, etc. Due to technological advances in memory storage capabilities proportional to memory size, a mobile device is capable of storing large amounts of information.
  • Thus, the information contained in an individual's mobile device can be extremely user specific and as a result contain highly sensitive information related to the device owner. As a consequence, an unscrupulous user who finds a lost or misplaced mobile device can misuse the information stored therein. For example, a mobile device can contain information that is user-specific but not readily usable unless such data can be correlated with other information. Such data can be tied to the original user providing an easy means for the unscrupulous user to commit identity theft, which can result in loss of money, ability to obtain credit and other damaging affects to a device owner. Such a misuse of information can be a major inconvenience to the device owner and thus is undesirable.
  • By the nature of their design, mobile devices have several properties making them more vulnerable to loss. They are compact and can be carried everywhere by the user to provide instant access to the information contained within the device. Since the information in the devices can be highly sensitive, there exists a danger that someone who acquires the lost device will have access to all the information contained within. In the hands of an unscrupulous user, this information can be misused to facilitate identity theft. Such a misrepresentation can allow the unscrupulous user to obtain credit cards and other resources and to employ such resources to the detriment of the mobile device owner.
  • Additionally, user specific information can be contained on the device to allow personal data to be correlated to other stored information such as social security numbers, bank account numbers, addresses and the like. Correlating such data can help an unscrupulous user create a fictional identity as though they are the original user. In view of the technology available today, financial transactions do not require a high level of security between a debtor and creditor. In fact, little more than a person's name, billing address and social security number is required to correlate to a credit card number in order to purchase goods in today's technology rich commerce. Thus, by simply accessing some personal data related to the device owner, the unscrupulous user can assume the device owner's identity and inflict financial hardship or other deleterious consequences to the device owner's personal life.
  • One conventional method currently employed to provide a security means is to password protect access to the mobile device. Such a measure requires the password protection to be invoked to prevent access to any of the device's functionality. In order to gain such access, a password must be entered to allow the user to utilize the device's functionality. However, such protection can be insufficient for a number of reasons such as forgetting to invoke the protection, simply entering an easily decipherable password (e.g., 123) to overcome the protection or simply not invoking such protection because it creates an inconvenience for the user.
  • As noted above, the mobile device provides a convenient means to allow a device owner to structure their life. However, such a device will most likely be small to provide convenient mobility and thus, easily lost or forgotten. Since the mobile device is subject to a high degree of being lost or misplaced, and such a device may contain highly sensitive information, there exists a need to have a method or system to protect such information from access by an unscrupulous user. In addition, it is desirable to have such a protection mechanism be easily invoked to provide a fast and convenient means to protect sensitive data.
  • SUMMARY OF THE INVENTION
  • The following presents a simplified summary of the invention in order to provide a basic understanding of some aspects of the invention. This summary is not an extensive overview of the invention. It is not intended to identify key/critical elements of the invention or to delineate the scope of the invention. Its sole purpose is to present some concepts of the invention in a simplified form as a prelude to the more detailed description that is presented later.
  • The present invention relates to systems and methods utilized to prevent unauthorized access to information stored in a mobile device such as a cellular phone, personal data assistant or handheld computer, for example. Such stored data can contain personal and/or highly sensitive data such as social security numbers, bank account numbers, credit card numbers, phone numbers, addresses and the like. The mobile device can employ a plurality of techniques to disable the functionality of the device and thus, prevent access to the device memory to mitigate any damage (e.g., financial) suffered as a result of identity theft or related criminal acts.
  • In one aspect of the present invention, the mobile device memory is disabled via a signal transmitted from a network employed to provide wireless communication to the device. The signal can be transmitted after the network operator has been notified. Such signal can be sent one time, on a continuous basis or on a user defined periodic basis, for example. In addition, a signal can be sent from the device to the network to provide confirmation that the device memory has been disabled.
  • In another aspect of the current invention, the signal can be utilized to trigger preexisting security features contained in the mobile device. Such features can include disabling the keypad, blanking out the screen display and/or sounding an audio alarm to indicate a theft has occurred.
  • In yet another aspect of the current invention, an audio signal can be triggered to notify the device owner of the location of the device. Such a feature can be employed when the owner believes the device has been misplaced and wishes to locate such a device. Such a signal can be activated via the Internet or telephone call to the network operator, for example. The owner can activate the signal immediately after losing/misplacing the device to locate the device itself or locate the device and the person currently in possession of the device. Such an audio signal can be used to signal strangers (e.g. persons who have no knowledge of the theft) and/or law enforcement personnel to apprehend the party currently in possession of the device.
  • In yet another aspect of the current invention, the device can employ a tracking device, such as a global positioning system or homing beacon to track and locate the lost/misplaced mobile device. In this embodiment, the mobile device can be tracked located to facilitate recovery of the lost data and to provide criminal ramifications for the possessor of the lost device.
  • In still yet another aspect of the current invention, sending a pre-determined code via the wireless network can disable the device memory. For example, if the mobile device is a cellular phone, the memory security can be invoked via the caller ID of the phone as it displays the source (e.g., pre-set phone number) of the incoming call. Alternatively or additionally, an alphanumeric message (e.g., text message) can be sent to the device via the wireless network to invoke the memory disabling security feature.
  • In yet another aspect of the current invention, device memory access can be disabled after a first attempted use by the current user after the network operator has been notified. The memory disabling feature can be invoked by placing a phone call, sending and email or any other attempt at utilizing the lost/misplaced mobile device. The feature can also be invoked via the use of other features of the device that do not relate to outside communication such as a planning/calendar function, calculator, phone book, address book and the like.
  • In another aspect of the present invention, a third-party signal outside the wireless network can be utilized to invoke the memory-disabling feature. Such an embodiment can be employed when the mobile device is outside the reach of the wireless network, and yet still is open to unauthorized data access by the current user. Such a network can be implemented via a satellite network or some other equivalent that can maintain constant communication with the mobile device regardless of location.
  • In another aspect of the current invention, data from the mobile device can be uploaded via the network and sent to a desired location for subsequent retrieval by the mobile device owner. This particular embodiment is utilized to go beyond simply preventing others from accessing personal and/or sensitive information. This feature can be employed to retrieve data from the device that is difficult to reconstruct such as for example, individual cell phone numbers (which cannot be looked up via directory), addresses and the like. Such uploaded data can be accessed via the Internet, an operator location or stored in a remote location, for example.
  • In yet another aspect of the present invention, the data stored on the mobile device can be erased from the device memory completely. This embodiment can be employed after the data as been uploaded from the device memory if desired. Memory erasure can be invoked utilizing at least one of the aforementioned methods and/or systems.
  • In still yet another aspect of the current invention, at least a portion of the data the device owner wishes to store can be stored remotely. Such data can be stored remotely based on the importance and/or sensitivity to the owner of the device. In this embodiment, the device owner can utilize a user name and/or password to access data stored remotely on the wireless network employed with the mobile device. Thus, the data can be retrieved and access can be denied any unauthorized user as soon as the network operator is notified.
  • To the accomplishment of the foregoing and related ends, certain illustrative aspects of the invention are described herein in connection with the following description and the annexed drawings. These aspects are indicative, however, of but a few of the various ways in which the principles of the invention may be employed, and the present invention is intended to include all such aspects and their equivalents. Other advantages and novel features of the invention may become apparent from the following detailed description of the invention when considered in conjunction with the drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates an exemplary disabling component system, in accordance with an aspect of the present invention.
  • FIG. 2 illustrates various exemplary systems utilized in accordance with the present invention.
  • FIG. 3 illustrates an exemplary network command system, in accordance with an aspect of the present invention.
  • FIG. 4 illustrates an exemplary methodology that disables the functionality of a mobile device, in accordance with an aspect of the present invention.
  • FIG. 5 illustrates an exemplary methodology that locates and limits the functionality of a mobile device, in accordance with an aspect of the present invention.
  • FIG. 6 illustrates an exemplary methodology that verifies a device has been disabled, in accordance with an aspect of the present invention.
  • FIG. 7 illustrates an exemplary system that illustrates disparate data storage options, in accordance with an aspect of the present invention.
  • FIG. 8 illustrates an exemplary mobile device wherein the invention can be employed.
  • FIG. 9 illustrates an exemplary network wherein the invention can be employed.
  • FIG. 10 illustrates an exemplary computing environment wherein the invention can be employed.
  • DETAILED DESCRIPTION OF THE INVENTION
  • The present invention relates to systems and methods that selectively disable mobile device (e.g., cell phone, PDA, handheld PC, laptop computer, etc.) functionality to prohibit access to portions of information stored therein and/or in connection therewith. Such information can be user specific, for example, highly sensitive and/or personal data such as bank account numbers, social security numbers, credit card numbers, addresses and the like. Thus, the present invention can disable access to the device to prevent unauthorized access to data stored in device memory. It is to be appreciated that the present invention can be employed in relation to any number of systems and/or environments to inhibit the functionality as desired by the user. In addition, the subject invention can limit the functionality of such a system in a plurality of ways including disabling the display, disabling any peripheral input devices to the target system and disabling specific functionality (e.g., access to the target device memory), for example.
  • The present invention is now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It may be evident, however, that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing the present invention.
  • FIG. 1 illustrates an exemplary system 100 that can disable and/or limit functionality of a target device employed in conjunction with the subject invention. The system 100 comprises an input component 110 (e.g., mobile device antenna) that receives and conveys a notification signal to a disabling component 120. The signal can be employed to initiate disabling and/or limiting the functionality of a target system (e.g., mobile device) via a control signal sent to an output component 130. This control signal can be employed to limit functionality of the target device to prohibit unauthorized access to data stored locally in memory, for example.
  • The signal initially sent to the input component 110 can be generated in a multitude of different manners such as a signal, message or bit. In one embodiment, the input component can accept a message from an outside source to trigger the disabling component to begin operation. For example, if the target device is a cellular phone, a call from a pre-defined number can be placed to and the caller ID can be employed to trigger the disabling component. Thus, if the phone is lost and subsequently found by an unscrupulous user, the memory of the device can be protected by way of a simple phone call.
  • In another example, the target device can be a personal digital assistant (PDA) associated with a wireless network service. An email message can be sent to the device to instantiate the disabling component 120 to prevent access to any data contained in the PDA's memory. As discussed below, the output component 130 can interface to a plurality of devices such as laptop computers, handheld PCs, notebook PCs, PDAs, cellular phones and the like.
  • The input component 110 can receive information from wireless networks, keypad entries, pre-defined user inputs, etc. Such inputs can be originated by the original user of the target device or the wireless network operator, contain any amount of information and be represented in various formats such as an ASCII string, one or more bits or a signal.
  • The disabling component 120 can be a microprocessor, a switch, a relay and so on. In other words, the unit can trigger the limitation of the target device by simply disabling some access to I/O of a microprocessor, for example. Further, the disabling component can be executable code employed in the operating software of a target device (e.g., palm software in a PDA, proprietary software in a cell phone, Windows software in a handheld PC, etc.). In this manner, the software can be written to execute the disabling component 120 when a specific input is accepted by the input component 110.
  • It is to be appreciated that the input component 110 is coupled to the disabling component 120 and can interface with the disabling component 120 in a plurality of ways. For example, the disabling component 120 can reside in a notebook computer which is connected to a wireless network. In this example, the input component 110 can be located at the network operator's control center and communicate to the disabling component 120 via the wireless network.
  • The output component 130 can take a plurality of forms as dictated by the location and form of the disabling component 120. For example, the output component 130 can simply take the form of an output in a microprocessor wherein the disabling component 120 is executable software. In another example, the output component 130 can be a signal sent from a cellular network to a phone connected to such a network. Once the disabling signal is sent to the phone (e.g., target device), the functionality of the phone will be limited.
  • FIG. 2 illustrates an exemplary system 200 that shows a plurality of disparate target devices can be employed in conjunction with the present invention wherein communication is facilitated with the target devices via a wireless network command 205. Such target devices include a handheld PC 210, notebook computer 220, laptop computer 230, PDA 240 and cell phone 250.
  • The target devices receive a signal from the wireless network command 205 to disable the memory and/or limit the functionality of the device. The signal sent to the device can carry the disabling command or simply trigger such a disabling command locally at the target device, for example. Such a local command could activate a security feature inherent in the device. For example, a voice lock feature can be activated utilizing the disabling signal sent from the wireless network command 205.
  • It is to be appreciated that although the devices are shown receiving the command via wireless network, such a command can be sent in any desired manner. For example, the device could be connected to a land based network (e.g., LAN, WAN, etc) and such a connection can be made utilizing a physical connection (e.g., Ethernet cable, serial cable, parallel cable, USB cable, etc).
  • FIG. 3 illustrates an exemplary system 300 that conveys a signal from a network command component 310 via a cell tower 320 to a cellular phone 330. The cellular phone 330 is coupled to a disabling component 340, which can limit the functionality of such a mobile device and thus, prevent an unauthorized user from accessing the memory of the device or perform unauthorized actions. The signal sent from the network command component 310 can be in the form of a caller ID which is pre-set to disable the phone as soon as the call is made and received. In another aspect of the present invention, the command can be part of the signaling protocol (e.g., IS2000, CDMA, GSM, WCDMA, etc.) employed by the mobile device to facilitate wireless communication.
  • Several aspects of current invention are shown that selectively limit the functionality of the cell phone. Each method shown can be selected by the user or alternatively, a desired default setting can be chosen by the user. It is to be appreciated the disabling examples given are in no way exhaustive and that a broad range of methods can be employed, including intelligence based techniques.
  • In this particular embodiment, the disabling component 340 is associated with four disabling systems that limit the functionality of the cellular phone 330. The methods shown represent both intrusive and non-intrusive alternatives in accordance with the subject invention. In accordance with the subject invention, an intrusive method is one that renders the device memory permanently inaccessible such as by deletion of such memory, for example. A non-intrusive technique does not permanently disable device functionality and is typically associated with a device's own security features (e.g., keypad lock, voice lock, etc).
  • The disabling systems shown are disable keypad 350, blank screen 360, sound audio alarm 370 and erase memory 380. The disable keypad command 350 is non-intrusive and prevents the unauthorized user from inputting commands to the mobile device 330 and thus, accessing data stored in the device. Utilizing the blank screen command 360 is similarly non-intrusive and limits functionality of the phone by inhibiting the display of command options available to the user. An alternative command is to sound an audio alarm 370 to deter an unauthorized user from accessing data and/or allowing the original device owner to easily determine the location of the device 330. An invasive alternative to the above-described commands is to erase memory 380 of the device 330, which prohibits data access by substantially all users. It is to be appreciated that the above-described embodiment can be employed in relation to substantially any mobile device as noted above.
  • FIGS. 4-6 illustrate document annotation methodologies 400, 500 and 600 in accordance with the present invention. For simplicity of explanation, the methodologies are depicted and described as a series of acts. It is to be understood and appreciated that the present invention is not limited by the acts illustrated and/or by the order of acts, for example acts can occur in various orders and/or concurrently, and with other acts not presented and described herein. Furthermore, not all illustrated acts may be required to implement the methodologies in accordance with the present invention. In addition, those skilled in the art will understand and appreciate that the methodologies could alternatively be represented as a series of interrelated states via a state diagram or events.
  • Referring initially to FIG. 4, a methodology 400 that facilitates disabling the functionality of a mobile device upon the reception of a disabling signal from an outside source. At reference numeral 410, a disabling signal is received from an outside source. In one aspect of the present invention, the signal can be sent via a network command control. Such a signal can be sent, for example, on a periodic basis or based on an event such as when the mobile device is lost or stolen. This signal can be broadcast throughout the wireless network employed by the mobile device. Alternatively, if the mobile device is outside the coverage area of the wireless network it typically employs, a third party carrier can broadcast the disable signal to insure communication with the device regardless of location.
  • At 420, data is extracted from the signal in order to determine if the signal contains information that relates to disabling and/or limiting the functionality of the device. For example, if the mobile device is a cellular phone and call is made to such a phone, the caller ID of the caller can be utilized to trigger the memory disabling component as mentioned above. In another example, the signal can be sent to the mobile device by way of the signaling protocol of the wireless network on which the device communicates (e.g., IS2000, CDMA, GSM, WCDMA, etc).
  • At 430, the functionality of the device is disabled based on the information received from the signal sent to the device. For example, if the signal relates to locking the keypad, the device keypad will lock upon reception of the signal. Alternatively or additionally, the data stored in the device memory can be transferred to another location via the wireless network. In this aspect of the current invention, once the disabling signal is received, it can contain a command to first upload desired data to a data store located on the network. Such a data store can be accessed from a plurality of disparate locations that communicate on the wireless network such as desktop computers, laptop computers, PDAs and the like.
  • Turning now to FIG. 5, a methodology 500 wherein the original device owner can access a lost or stolen device and subsequently limit the functionality of the device. Initially, at reference numeral 510, the original owner of the device can notify the network to disable the mobile device. The original owner can notify the network in a multitude of ways including a wireless network, the Internet or via computer, PDA or cell phone, for example. Further, a plurality of choices can be made available to the original device owner to select the type and duration of the functional limitation of the device. For example, the owner may wish to disable the screen, upload the information to a remote data store and then erase the memory. Thus, a single command can be utilized and upon completion, the network will no longer attempt to communicate with the device.
  • At 520, the device is located in order to ensure communication is successful with the device and/or to allow recovery of the device by the original owner. In one aspect of the present invention, a global positioning system (GPS) can be employed to provide the coordinates of the device. The GPS can function at all times or, alternatively, can function only for a desired duration of time (e.g., until the device is recovered). Choosing the type of method to locate the device can be related to the duration of time that has passed from when the device is lost or stolen to when the owner makes such a discovery. Also, choosing such a method can be related to the location (e.g., airport home, office, etc.) in which the device was lost or stolen. For example, an audio signal can be sounded to indicate the location of the device when the owner has recently lost the device. As another example, if the device has been misplaced at a residence, an audio alarm can be initiated even if the phone is off or the ringer is off.
  • In yet another aspect of the invention, the GPS function can be utilized when a device has been out of the possession of the owner for a substantial period of time. If the GPS locator is utilized, the device owner can track the location of the device via a network operator such as a network operator website. In this manner, the device and the data contained within the device can be recovered.
  • In another aspect of the invention, the device owner can notify the network their device has been lost or stolen, and such a device can be disabled upon an attempted use of the device. For example, when the current possessor (e.g., not the owner) of the device attempts to place a phone call, the network can be notified and the disabling signal can be sent to the device.
  • At 530, the device functionality can be limited by utilizing invasive or non-invasive techniques as noted above. Some invasive techniques are to erase the data from the memory of the device or to permanently disable the device itself. Some non-invasive techniques are to sound an audio alarm, lock the keypad of the device or to blank the screen of the device. It is to be appreciated that numerous techniques exist and that the disabling signal can be employed in association with substantially any desired technique.
  • Turning now to FIG. 6, an exemplary method 600 that sends a signal and verifies such signal has been received by the device. At 610, the network operator receives a request to disable a device that communicates with the network. Such a request can be sent via phone, email, web application, disparate mobile device and the like. Further, the network operator can verify the request at 620 to insure an unscrupulous user (e.g., non-device owner) is not making the disabling request. Such verification can be made utilizing a user name and password or security question that relates to personal information (e.g., mother's maiden name, social security number, father's middle name etc), for example. Thus, by utilizing the subject invention, security measures can be implemented to insure the systems and methods are employed by authorized requestors.
  • At 630, a signal is broadcast to disable the device once it has been determined the user is authorized to make such a request. Such a disabling signal can be broadcast utilizing the wireless network to communicate with the device (e.g., cell phone network). Alternatively, a third party signal (e.g., satellite communication) can be employed to communicate with the device if the wireless communication is unsuccessful. Also, the signal can be sent one time, on a periodic basis or continuously until communication is successful, for example.
  • At reference numeral 640, the network operator can verify the device has been disabled. Such verification provides a robust, closed loop control to insure the broadcast signal successfully communicates with the device and that the device has been disabled. Such verification can be made via a signal sent back from the device (e.g., handshake, ACK/NACK or ping). The original device owner can subsequently be contacted via phone, email, etc. to provide them with such information. Further, the device owner can decide to take further action (e.g., delete the memory) if they have located the information elsewhere and no longer wish to maintain the data in the device memory. Thus, the level of disability to the device can be modified and/or changed as desired by the user.
  • FIG. 7 illustrates an exemplary system 700 that stores and/or transmits data from a mobile device to a data store located locally and/or remotely in relation to the device. Local memory 710 can be employed to store data entered into the mobile device 720 and/or transmitted to the mobile device via wireless communication. In order to store data remotely, information can be transmitted utilizing a cell tower 730 to communicate with the remote data store 740. In turn, data located in the remote data store 740 can be accessed utilizing a personal computer 750, handheld computer 760, laptop computer 770, or any other device which communicates across the network, for example. Such local and remote data stores can be utilized concurrently (e.g., data is stored in both locations simultaneously), or independent of one another wherein the data is stored locally and/or remotely.
  • The device owner can manage his/her data in a number of ways. For example, data can be ranked in order of importance to the user. In one aspect of the present invention, the location the data is stored is dependent upon the importance ranking (unimportant, important, etc.) associated with the data. For example, data that is ranked as important can be stored remotely to insure easy and convenient recovery of such data. To further insure the data is secure, the remote storage can have a redundant data store, for example. Contrarily, data that is ranked as unimportant can be stored locally so that if data recovery is not possible, it is of no substantial loss to the device owner.
  • FIG. 8 illustrates an exemplary mobile (e.g., portable and wireless) telephone 800 that can employ the novel aspects of the present invention. The mobile telephone 800 comprises an antenna 810 that communicates (e.g., transmit and receive) radio frequency signals with one or more base stations. The antenna 810 can be coupled to duplexer circuitry (e.g., as described herein) within the mobile telephone 800. In addition, the mobile telephone 800 can include a separate signal-receiving component (not shown) that can also be coupled to the duplexer.
  • The mobile telephone 800 further comprises a microphone 820 that receives audio signals and conveys the signals to at least one on-board processor for audio signal processing, and an audio speaker 830 for outputting audio signals to a user, including processed voice signals of a caller and recipient music, alarms, and notification tones or beeps. Additionally, the mobile telephone 800 can include a power source such as a rechargeable battery (e.g., Alkaline, NiCAD, NiMH and Li-ion), which can provide power to substantially all onboard systems when the user is mobile.
  • The mobile telephone 800 can further include a plurality of multi-function buttons including a keypad 840, menu navigating buttons 850 and on-screen touch sensitive locations (not shown) to allow a user to provide information for dialing numbers, selecting options, navigating the Internet, enabling/disabling power, and navigating a software menu system including features in accordance with telephone configurations. A display 860 can be provided for displaying information to the user such as a dialed telephone number, caller telephone number (e.g., caller ID), notification information, web pages, electronic mail, and files such as documents, spreadsheets and videos. The display 860 can be a color or monochrome display (e.g., liquid crystal, CRT, LCD, LED and/or flat panel), and employed concurrently with audio information such as beeps, notifications and voice. Where the mobile telephone 800 is suitable for Internet communications, web page and electronic mail (e-mail) information can also be presented separately or in combination with the audio signals.
  • The menu navigating buttons 850 can further enable the user to interact with the display information. In support of such capabilities, the keypad 840 can provide keys that facilitate alphanumeric input, and are multifunctional such that the user can respond by inputting alphanumeric and special characters via the keypad 840 in accordance with e-mail or other forms of messaging communications. The keypad keys also allow the user to control at least other telephone features such as audio volume and display brightness.
  • An interface can be utilized for uploading and downloading information to memory, for example, the reacquisition time data to the telephone table memory, and other information of the telephone second memory (e.g., website information and content, caller history information, address book and telephone numbers, and music residing in the second memory). A power button 870 allows the user to turn the mobile telephone 800 power on or off.
  • The mobile telephone 800 can further include memory for storing information. The memory can include non-volatile memory and volatile memory, and can be permanent and/or removable. The mobile telephone 800 can further include a high-speed data interface 880 such as USB (Universal Serial Bus) and IEEE 1394 for communicating data with a computer. Such interfaces can be used for uploading and downloading information, for example website information and content, caller history information, address book and telephone numbers, and music residing in the second memory. In addition, the mobile telephone 900 can communicate with various input/output (I/O) devices such as a keyboard, a keypad, and a mouse.
  • In order to provide a context for the various aspects of the invention, FIGS. 15 and 16 as well as the following discussion are intended to provide a brief, general description of a suitable computing environment in which the various aspects of the present invention can be implemented. While the invention has been described above in the general context of computer-executable instructions of a computer program that runs on a computer and/or computers, those skilled in the art will recognize that the invention also can be implemented in combination with other program modules. Generally, program modules include routines, programs, components, data structures, etc. that perform particular tasks and/or implement particular abstract data types.
  • Moreover, those skilled in the art will appreciate that the inventive methods may be practiced with other computer system configurations, including single-processor or multiprocessor computer systems, mini-computing devices, mainframe computers, as well as personal computers, hand-held computing devices, microprocessor-based or programmable consumer electronics, and the like. The illustrated aspects of the invention may also be practiced in distributed computing environments where task are performed by remote processing devices that are linked through a communications network. However, some, if not all aspects of the invention can be practiced on stand-alone computers. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
  • FIG. 9 illustrates an exemplary computing environment 900 in which the present invention can be employed. The system 900 includes one or more client(s) 910. The client(s) 910 can be hardware and/or software (e.g., threads, processes, computing devices). The system 900 additionally includes one or more server(s) 930. Likewise, the server(s) 930 can be hardware and/or software (e.g., threads, processes, computing devices).
  • One possible communication between a client 910 and a server 930 can be in the form of a data packet transmitted between two or more computer processes. The system 900 further includes a communication framework 950 that can be employed to facilitate communications between the client(s) 910 and the server(s) 930. The client(s) 910 can interface with one or more client data store(s) 960, which can be employed to store information local to the client(s) 910. Similarly, the server(s) 900 can interface with one or more server data store(s) 940, which can be employed to store information local to the servers 930.
  • With reference to FIG. 10, an exemplary environment 1010 for implementing various aspects of the invention includes a computer 1012. The computer 1012 includes a processing unit 1014, a system memory 1016, and a system bus 1018. The system bus 1018 couples system components including, but not limited to, the system memory 1016 to the processing unit 1014. The processing unit 1014 can be any of various available processors. Dual microprocessors and other multiprocessor architectures also can be employed as the processing unit 1014.
  • The system bus 1018 can be any of several types of bus structure(s) including the memory bus or memory controller, a peripheral bus or external bus, and/or a local bus using any variety of available bus architectures including, but not limited to, 8-bit bus, Industrial Standard Architecture (ISA), Micro-Channel Architecture (MSA), Extended ISA (EISA), Intelligent Drive Electronics (IDE), VESA Local Bus (VLB), Peripheral Component Interconnect (PCI), Universal Serial Bus (USB), Advanced Graphics Port (AGP), Personal Computer Memory Card International Association bus (PCMCIA), and Small Computer Systems Interface (SCSI).
  • The system memory 1016 includes volatile memory 1020 and nonvolatile memory 1022. The basic input/output system (BIOS), containing the basic routines to transfer information between elements within the computer 1012, such as during start-up, is stored in nonvolatile memory 1022. By way of illustration, and not limitation, nonvolatile memory 1022 can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory. Volatile memory 1020 includes random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).
  • Computer 1012 also includes removable/non-removable, volatile/non-volatile computer storage media. FIG. 10 illustrates, for example a disk storage 1024. Disk storage 1024 includes, but is not limited to, devices like a magnetic disk drive, floppy disk drive, tape drive, Jaz drive, Zip drive, LS-100 drive, flash memory card, or memory stick. In addition, disk storage 1024 can include storage media separately or in combination with other storage media including, but not limited to, an optical disk drive such as a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive (DVD-ROM). To facilitate connection of the disk storage devices 1024 to the system bus 1018, a removable or non-removable interface is typically used such as interface 1026.
  • It is to be appreciated that FIG. 10 describes software that acts as an intermediary between users and the basic computer resources described in suitable operating environment 1010. Such software includes an operating system 1028. Operating system 1028, which can be stored on disk storage 1024, acts to control and allocate resources of the computer system 1012. System applications 1030 take advantage of the management of resources by operating system 1028 through program modules 1032 and program data 1034 stored either in system memory 1016 or on disk storage 1024. It is to be appreciated that the present invention can be implemented with various operating systems or combinations of operating systems.
  • A user enters commands or information into the computer 1012 through input device(s) 1036. Input devices 1036 include, but are not limited to, a pointing device such as a mouse, trackball, stylus, touch pad, keyboard, microphone, joystick, game pad, satellite dish, scanner, TV tuner card, digital camera, digital video camera, web camera, and the like. These and other input devices connect to the processing unit 1014 through the system bus 1018 via interface port(s) 1038. Interface port(s) 1038 include, for example, a serial port, a parallel port, a game port, and a universal serial bus (USB). Output device(s) 1040 use some of the same type of ports as input device(s) 1036. Thus, for example, a USB port may be used to provide input to computer 1012, and to output information from computer 1012 to an output device 1040. Output adapter 1042 is provided to illustrate that there are some output devices 1040 like monitors, speakers, and printers, among other output devices 1040, which require special adapters. The output adapters 1042 include, by way of illustration and not limitation, video and sound cards that provide a means of connection between the output device 1040 and the system bus 1018. It should be noted that other devices and/or systems of devices provide both input and output capabilities such as remote computer(s) 1044.
  • Computer 1012 can operate in a networked environment using logical connections to one or more remote computers, such as remote computer(s) 1044. The remote computer(s) 1044 can be a personal computer, a server, a router, a network PC, a workstation, a microprocessor based appliance, a peer device or other common network node and the like, and typically includes many or all of the elements described relative to computer 1012. For purposes of brevity, only a memory storage device 1046 is illustrated with remote computer(s) 1044. Remote computer(s) 1044 is logically connected to computer 1012 through a network interface 1048 and then physically connected via communication connection 1050. Network interface 1048 encompasses communication networks such as local-area networks (LAN) and wide-area networks (WAN). LAN technologies include Fiber Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI), Ethernet/IEEE 802.3, Token Ring/IEEE 802.5 and the like. WAN technologies include, but are not limited to, point-to-point links, circuit switching networks like Integrated Services Digital Networks (ISDN) and variations thereon, packet switching networks, and Digital Subscriber Lines (DSL).
  • Communication connection(s) 1050 refers to the hardware/software employed to connect the network interface 1048 to the bus 1018. While communication connection 1050 is shown for illustrative clarity inside computer 1012, it can also be external to computer 1012. The hardware/software necessary for connection to the network interface 1048 includes, for exemplary purposes only, internal and external technologies such as, modems including regular telephone grade modems, cable modems and DSL modems, ISDN adapters, and Ethernet cards.
  • What has been described above includes examples of the present invention. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the present invention, but one of ordinary skill in the art may recognize that many further combinations and permutations of the present invention are possible. Accordingly, the present invention is intended to embrace all such alterations, modifications, and variations that fall within the spirit and scope of the appended claims.

Claims (27)

1. A system that limits mobile device functionality via a wireless network, comprising:
an input component that receives a remotely originated request to disable the mobile device; and
a disabling component that limits access to memory within the mobile device based on the request.
2. The system of claim 1, the request activates a pre-programmed security feature stored within the mobile device.
3. The system of claim 2, the security feature erases data stored in the mobile device's memory.
4. The system of claim 1, the request is transmitted via a phone call and verified based on a caller identification.
5. The system of claim 1, the request to disable the mobile device is made by placing a wireless phone call that invokes the request.
6. The system of claim 1, the wireless network protocol is one of an IS2000, a CDMA, a TCDMA, a WCDMA, a TDMA, a FDMA, a GSM, a PCS, a Bluetooth, a Wi-Fi, a Cellular and a GPS protocol.
7. The system of claim 1, the request is broadcast to the mobile device via one of a one-time transmission, a periodic transmission and a continuous transmission.
8. The system of claim 1, the disabling component transmits a return signal to verify access to the mobile device memory has been limited.
9. The system of claim 1, the disabling component further limits mobile device access via at least one of a keypad lock, a voice lock, a screen blank-out and a deletion of the device memory.
10. The system of claim 1 further comprises a tracking component that utilizes the request to facilitate locating the mobile device.
11. The system of claim 10, the tracking component employs one or more of a global positioning system, a homing beacon and an audio alarm.
12. The system of claim 1, the request further invokes remote storage of the data stored within the mobile device's memory.
13. The system of claim 1, a signal outside of the wireless network is utilized to send the request to disable the device.
14. The system of claim 1 is employed in one of a laptop computer, a handheld computer, a notebook computer, a personal digital assistant, a mobile phone and a desktop computer.
15. A method that limits access to a mobile device utilizing a wireless network, comprising:
receiving a request to disable the mobile device;
broadcasting a disable signal to the mobile device; and
disabling access to at least the mobile device memory.
16. The method of claim 15 further comprises authenticating the request with a mobile device owner.
17. The method of claim 15 further comprises locating the mobile device after the disable signal has been sent.
18. The method of claim 15 further comprises broadcasting the signal via at least one of an IS2000, a CDMA, a TCDMA, a WCDMA, a TDMA, a FDMA, a GSM, a PCS, a Bluetooth, a Wi-Fi, a Cellular, and a GPS protocol.
19. The method of claim 15, access is disabled via at least one of the mobile device's internal security features.
20. The method of claim 15, disabling access to the device comprises one or more of blanking a screen, locking a keypad, locking a microphone and deleting mobile device memory.
21. The method of claim 15, the request to disable access to the device is transmitted upon an unauthorized use.
22. The method of claim 15 is employed in connection with at least one of a laptop computer, a handheld computer, a notebook computer, a personal digital assistant, a mobile phone and a desktop computer.
23. The method of claim 15, the disable signal is sent via a third-party network.
24. A method that disables functionality of a mobile device via a wireless network, comprising:
receiving a disable signal from a remote location;
extracting information from the disable signal; and
disabling memory access of mobile device based on the extracted information.
25. The method of claim 24 further comprises broadcasting a return signal that indicates the functionality of the device has been disabled.
26. The method of claim 24, the signal is embedded in the wireless network's signaling protocol.
27. A system that facilitates limiting device functionality, comprising:
means for receiving a signal to disable device functionality;
means for limiting device functionality based on the signal; and
means for transmitting a return signal indicating successful disabling of device functionality.
US10/783,617 2004-02-20 2004-02-20 Systems and methods that provide user and/or network personal data disabling commands for mobile devices Abandoned US20050186954A1 (en)

Priority Applications (8)

Application Number Priority Date Filing Date Title
US10/783,617 US20050186954A1 (en) 2004-02-20 2004-02-20 Systems and methods that provide user and/or network personal data disabling commands for mobile devices
CNA2005800123829A CN1947447A (en) 2004-02-20 2005-02-09 System and method for limiting mobile device functionality
KR1020087010094A KR20080045296A (en) 2004-02-20 2005-02-09 System and method for limiting mobile device functionality
US10/597,862 US8995958B2 (en) 2004-02-20 2005-02-09 System and method for limiting mobile device functionality
PCT/IB2005/000333 WO2005084052A1 (en) 2004-02-20 2005-02-09 System and method for limiting mobile device functionality
EP05702471A EP1719368A1 (en) 2004-02-20 2005-02-09 System and method for limiting mobile device functionality
KR1020067019332A KR20060122966A (en) 2004-02-20 2005-02-09 System and method for limiting mobile device functionality
US14/642,264 US9794787B2 (en) 2004-02-20 2015-03-09 System and method for limiting mobile device functionality

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/783,617 US20050186954A1 (en) 2004-02-20 2004-02-20 Systems and methods that provide user and/or network personal data disabling commands for mobile devices

Related Child Applications (3)

Application Number Title Priority Date Filing Date
PCT/IB2005/000333 Continuation WO2005084052A1 (en) 2004-02-20 2005-02-09 System and method for limiting mobile device functionality
US10/597,862 Continuation US8995958B2 (en) 2004-02-20 2005-02-09 System and method for limiting mobile device functionality
US11/597,862 Continuation US7562578B2 (en) 2004-10-20 2005-10-19 Method and apparatus for detecting surface defects in rolling mill rollers

Publications (1)

Publication Number Publication Date
US20050186954A1 true US20050186954A1 (en) 2005-08-25

Family

ID=34861288

Family Applications (3)

Application Number Title Priority Date Filing Date
US10/783,617 Abandoned US20050186954A1 (en) 2004-02-20 2004-02-20 Systems and methods that provide user and/or network personal data disabling commands for mobile devices
US10/597,862 Active 2028-02-03 US8995958B2 (en) 2004-02-20 2005-02-09 System and method for limiting mobile device functionality
US14/642,264 Expired - Lifetime US9794787B2 (en) 2004-02-20 2015-03-09 System and method for limiting mobile device functionality

Family Applications After (2)

Application Number Title Priority Date Filing Date
US10/597,862 Active 2028-02-03 US8995958B2 (en) 2004-02-20 2005-02-09 System and method for limiting mobile device functionality
US14/642,264 Expired - Lifetime US9794787B2 (en) 2004-02-20 2015-03-09 System and method for limiting mobile device functionality

Country Status (5)

Country Link
US (3) US20050186954A1 (en)
EP (1) EP1719368A1 (en)
KR (2) KR20080045296A (en)
CN (1) CN1947447A (en)
WO (1) WO2005084052A1 (en)

Cited By (129)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060007500A1 (en) * 2004-06-28 2006-01-12 Yasushi Abe Image forming apparatus, operation panel control method, and computer product
US20060075414A1 (en) * 2004-10-06 2006-04-06 Robert Rapp Packaging methodology for adding functionality to a data storage device (disk drive, tape drive, other storage device, or storage subsystem) while maintaining the same form factor, standard size, or allocated size; or by increasing the overall package size to a larger form factor, standard size, or allocated size
US20060085310A1 (en) * 2004-10-14 2006-04-20 Cfph Llc System and method for facilitating a wireless financial transaction
US20060161628A1 (en) * 2005-01-14 2006-07-20 Research In Motion Limited System and method of remotely locating a lost mobile communication device
US20060211433A1 (en) * 2005-03-17 2006-09-21 Fujitsu Limited Portable electronic apparatus and non-carry processing program storage medium
US20060242432A1 (en) * 2005-04-25 2006-10-26 Burks Ellisa P E.magnum
US20070038680A1 (en) * 2005-08-10 2007-02-15 Qwest Communications International Inc. Management of mobile-device data
US20070117595A1 (en) * 2005-11-22 2007-05-24 Stephen Sherman Devices, methods and computer program products for providing a preferred operational mode to a wireless terminal
US20070130434A1 (en) * 2005-12-05 2007-06-07 International Business Machines Corporation Methods and apparatuses for protecting data on mass storage devices
DE102006041556A1 (en) * 2006-09-05 2008-03-20 Nokia Siemens Networks Gmbh & Co.Kg Data protection method in communication system, involves shifting protection device in terminal device into secured condition for prevention of unauthorized access and data stored on terminal device is transferred to back up device
US20080154997A1 (en) * 2006-12-20 2008-06-26 Texas Instruments Incorporated Systems and methods for function control in a calculation device
WO2008086611A1 (en) * 2007-01-19 2008-07-24 Research In Motion Limited Selectively wiping a remote device
US20080224862A1 (en) * 2007-03-14 2008-09-18 Seth Cirker Selectively enabled threat based information system
US20080238614A1 (en) * 2007-03-30 2008-10-02 International Business Machines Corporation Method and system for securing and recovering a wireless communication device
US20080293397A1 (en) * 2005-05-16 2008-11-27 Sony Ericsson Mobile Communications Ab Method for Disabling a Mobile Device
US20090031250A1 (en) * 2007-07-27 2009-01-29 Jesse Boudreau Administration of wireless devices in a wireless communication system
US20090098857A1 (en) * 2007-10-10 2009-04-16 Dallas De Atley Securely Locating a Device
US20090149192A1 (en) * 2007-12-05 2009-06-11 Sandra Vargas Device Locate Service
US20090160673A1 (en) * 2007-03-14 2009-06-25 Seth Cirker Mobile wireless device with location-dependent capability
US20090203356A1 (en) * 2006-10-13 2009-08-13 Huawei Technologies Co., Ltd. Method, system and apparatus for locking information
WO2009127991A1 (en) * 2008-04-16 2009-10-22 Nxp B.V. Method and system to improve the security of a credit card
GB2461146A (en) * 2008-06-25 2009-12-30 Lenovo Sending a log of accessed data prior to executing disable command in lost computer
US7778664B1 (en) 2001-10-18 2010-08-17 Iwao Fujisaki Communication device
US20100210240A1 (en) * 2009-02-17 2010-08-19 Flexilis, Inc. System and method for remotely securing or recovering a mobile device
WO2010127455A1 (en) * 2009-05-05 2010-11-11 Absolute Software Corporation Discriminating data protection system
US7853295B1 (en) 2001-10-18 2010-12-14 Iwao Fujisaki Communication device
US7856248B1 (en) 2003-09-26 2010-12-21 Iwao Fujisaki Communication device
US7860778B2 (en) 2004-11-08 2010-12-28 Cfph, Llc System and method for implementing push technology in a wireless financial transaction
US20100330958A1 (en) * 2007-08-01 2010-12-30 Nxp B.V. Mobile communication device and method for disabling applications
US7865216B1 (en) 2001-10-18 2011-01-04 Iwao Fujisaki Communication device
US7890089B1 (en) 2007-05-03 2011-02-15 Iwao Fujisaki Communication device
US20110047033A1 (en) * 2009-02-17 2011-02-24 Lookout, Inc. System and method for mobile device replacement
US7917167B1 (en) 2003-11-22 2011-03-29 Iwao Fujisaki Communication device
US20110143757A1 (en) * 2009-12-15 2011-06-16 Electronics And Telecommunications Research Institute Apparatus and method for providing group service in wireless communication system
US20110145927A1 (en) * 2009-12-16 2011-06-16 Verizon Patent And Licensing Inc. Method and system for providing remote configuration of missing mobile devices
US20110145920A1 (en) * 2008-10-21 2011-06-16 Lookout, Inc System and method for adverse mobile application identification
US20110151895A1 (en) * 2009-12-21 2011-06-23 I-Contain Limited Mobile monitoring device and monitoring system for electronic equipment
US8041348B1 (en) 2004-03-23 2011-10-18 Iwao Fujisaki Communication device
US20120013929A1 (en) * 2010-07-13 2012-01-19 Toshiba Tec Kabushiki Kaisha Image forming apparatus
US8108144B2 (en) 2007-06-28 2012-01-31 Apple Inc. Location based tracking
US8175802B2 (en) 2007-06-28 2012-05-08 Apple Inc. Adaptive route guidance based on preferences
US8180379B2 (en) 2007-06-28 2012-05-15 Apple Inc. Synchronizing mobile and vehicle devices
WO2012076485A1 (en) * 2010-12-06 2012-06-14 Gemalto Sa System for managing multiple subscriptions in a uicc
US8204684B2 (en) 2007-06-28 2012-06-19 Apple Inc. Adaptive mobile device navigation
US8229512B1 (en) 2003-02-08 2012-07-24 Iwao Fujisaki Communication device
US8241128B1 (en) 2003-04-03 2012-08-14 Iwao Fujisaki Communication device
US8260320B2 (en) 2008-11-13 2012-09-04 Apple Inc. Location specific content
US8275352B2 (en) 2007-06-28 2012-09-25 Apple Inc. Location-based emergency information
US8290513B2 (en) 2007-06-28 2012-10-16 Apple Inc. Location-based services
US8306522B1 (en) * 2008-12-23 2012-11-06 Sprint Communications Company L.P. Dynamic interface for mobile devices
US8311526B2 (en) 2007-06-28 2012-11-13 Apple Inc. Location-based categorical information services
US8332402B2 (en) 2007-06-28 2012-12-11 Apple Inc. Location based media items
US8340726B1 (en) 2008-06-30 2012-12-25 Iwao Fujisaki Communication device
US8355862B2 (en) 2008-01-06 2013-01-15 Apple Inc. Graphical user interface for presenting location information
US8359643B2 (en) 2008-09-18 2013-01-22 Apple Inc. Group formation using anonymous broadcast information
US8385964B2 (en) 2005-04-04 2013-02-26 Xone, Inc. Methods and apparatuses for geospatial-based sharing of information by multiple devices
EP2575384A1 (en) * 2011-09-30 2013-04-03 Research In Motion Limited System and method for remote wipe through voice mail
US20130091564A1 (en) * 2008-04-02 2013-04-11 William Fitzgerald Systems and methods for mitigating the unauthorized use of a device
US8433364B1 (en) 2005-04-08 2013-04-30 Iwao Fujisaki Communication device
US8452307B1 (en) 2008-07-02 2013-05-28 Iwao Fujisaki Communication device
US8472935B1 (en) 2007-10-29 2013-06-25 Iwao Fujisaki Communication device
US8505095B2 (en) 2008-10-21 2013-08-06 Lookout, Inc. System and method for monitoring and analyzing multiple interfaces and multiple protocols
US8510843B2 (en) 2008-10-21 2013-08-13 Lookout, Inc. Security status and information display system
US8533844B2 (en) 2008-10-21 2013-09-10 Lookout, Inc. System and method for security data collection and analysis
US8543157B1 (en) 2008-05-09 2013-09-24 Iwao Fujisaki Communication device which notifies its pin-point location or geographic area in accordance with user selection
US8544095B2 (en) 2008-10-21 2013-09-24 Lookout, Inc. System and method for server-coupled application re-analysis
US8561144B2 (en) 2008-10-21 2013-10-15 Lookout, Inc. Enforcing security based on a security state assessment of a mobile device
US8639214B1 (en) 2007-10-26 2014-01-28 Iwao Fujisaki Communication device
US8644843B2 (en) 2008-05-16 2014-02-04 Apple Inc. Location determination
US20140040126A1 (en) * 2012-07-31 2014-02-06 Google Inc. Managing devices associated with a digital wallet account
US8655307B1 (en) 2012-10-26 2014-02-18 Lookout, Inc. System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security
US8660530B2 (en) 2009-05-01 2014-02-25 Apple Inc. Remotely receiving and communicating commands to a mobile device for execution by the mobile device
US8666367B2 (en) 2009-05-01 2014-03-04 Apple Inc. Remotely locating and commanding a mobile device
US8670748B2 (en) 2009-05-01 2014-03-11 Apple Inc. Remotely locating and commanding a mobile device
US8676273B1 (en) 2007-08-24 2014-03-18 Iwao Fujisaki Communication device
US8683593B2 (en) 2008-10-21 2014-03-25 Lookout, Inc. Server-assisted analysis of data for a mobile device
US8738765B2 (en) 2011-06-14 2014-05-27 Lookout, Inc. Mobile device DNS optimization
EP2735969A1 (en) * 2012-11-27 2014-05-28 Oberthur Technologies Electronic assembly including a deactivation module
US8756669B2 (en) * 2012-06-20 2014-06-17 Futurewei Technologies, Inc. Security mode for mobile communications devices
US8762056B2 (en) 2007-06-28 2014-06-24 Apple Inc. Route reference
US8774825B2 (en) 2007-06-28 2014-07-08 Apple Inc. Integration of map services with user applications in a mobile device
US8788881B2 (en) 2011-08-17 2014-07-22 Lookout, Inc. System and method for mobile device push communications
US8825090B1 (en) 2007-05-03 2014-09-02 Iwao Fujisaki Communication device
US8855599B2 (en) 2012-12-31 2014-10-07 Lookout, Inc. Method and apparatus for auxiliary communications with mobile communications device
US8855601B2 (en) 2009-02-17 2014-10-07 Lookout, Inc. System and method for remotely-initiated audio communication
US8888385B2 (en) 2007-09-21 2014-11-18 Seth Cirker Privacy ensuring covert camera
US8965992B2 (en) 2007-07-27 2015-02-24 Blackberry Limited Apparatus and methods for coordination of wireless systems
US9042876B2 (en) 2009-02-17 2015-05-26 Lookout, Inc. System and method for uploading location information based on device movement
US9043919B2 (en) 2008-10-21 2015-05-26 Lookout, Inc. Crawling multiple markets and correlating
US9066199B2 (en) 2007-06-28 2015-06-23 Apple Inc. Location-aware mobile device
US9109904B2 (en) 2007-06-28 2015-08-18 Apple Inc. Integration of map services and user applications in a mobile device
US9137280B2 (en) 2007-07-27 2015-09-15 Blackberry Limited Wireless communication systems
US9139089B1 (en) 2007-12-27 2015-09-22 Iwao Fujisaki Inter-vehicle middle point maintaining implementer
US9143910B2 (en) 2011-09-30 2015-09-22 Blackberry Limited Method and system for remote wipe through voice mail
US9208215B2 (en) 2012-12-27 2015-12-08 Lookout, Inc. User classification based on data gathered from a computing device
US9215074B2 (en) 2012-06-05 2015-12-15 Lookout, Inc. Expressing intent to control behavior of application components
US9235704B2 (en) 2008-10-21 2016-01-12 Lookout, Inc. System and method for a scanning API
US9250092B2 (en) 2008-05-12 2016-02-02 Apple Inc. Map service with network-based query for search
US9270682B2 (en) 2007-07-27 2016-02-23 Blackberry Limited Administration of policies for wireless devices in a wireless communication system
US9307412B2 (en) 2013-04-24 2016-04-05 Lookout, Inc. Method and system for evaluating security for an interactive service operation by a mobile device
US9367680B2 (en) 2008-10-21 2016-06-14 Lookout, Inc. System and method for mobile communication device application advisement
US9374369B2 (en) 2012-12-28 2016-06-21 Lookout, Inc. Multi-factor authentication and comprehensive login system for client-server networks
US9408066B2 (en) 2010-12-06 2016-08-02 Gemalto Inc. Method for transferring securely the subscription information and user data from a first terminal to a second terminal
US9424409B2 (en) 2013-01-10 2016-08-23 Lookout, Inc. Method and system for protecting privacy and enhancing security on an electronic device
US20160246962A1 (en) * 2007-08-29 2016-08-25 Mcafee, Inc. System, Method, and Computer Program Product for Isolating a Device Associated with At Least Potential Data Leakage Activity, Based on User Input
US20160274920A1 (en) * 2015-03-19 2016-09-22 Sony Corporation Method and device for integrated usability control
US9479571B2 (en) 2012-09-18 2016-10-25 Google Inc. Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
US9544759B2 (en) 2011-11-01 2017-01-10 Google Inc. Systems, methods, and computer program products for managing states
US9589129B2 (en) 2012-06-05 2017-03-07 Lookout, Inc. Determining source of side-loaded software
US9641565B2 (en) 2007-07-27 2017-05-02 Blackberry Limited Apparatus and methods for operation of a wireless server
US9642008B2 (en) 2013-10-25 2017-05-02 Lookout, Inc. System and method for creating and assigning a policy for a mobile communications device based on personal data
US9652628B2 (en) 2011-11-01 2017-05-16 Google Inc. Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
US9681471B1 (en) 2016-08-31 2017-06-13 Bank Of America Corporation Pairing of devices for activation/deactivation of a paired device
US20170171741A1 (en) * 2014-02-07 2017-06-15 Driving Management Systems, Inc. Remote disabling of a mobile device
US9702709B2 (en) 2007-06-28 2017-07-11 Apple Inc. Disfavored route progressions or locations
US9753796B2 (en) 2013-12-06 2017-09-05 Lookout, Inc. Distributed monitoring, evaluation, and response for multiple devices
US9779253B2 (en) 2008-10-21 2017-10-03 Lookout, Inc. Methods and systems for sharing risk responses to improve the functioning of mobile communications devices
US9838877B2 (en) 2008-04-02 2017-12-05 Yougetitback Limited Systems and methods for dynamically assessing and mitigating risk of an insured entity
US9852416B2 (en) 2013-03-14 2017-12-26 Lookout, Inc. System and method for authorizing a payment transaction
US9886599B2 (en) 2008-04-02 2018-02-06 Yougetitback Limited Display of information through auxiliary user interface
US9955352B2 (en) 2009-02-17 2018-04-24 Lookout, Inc. Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such
US10079912B2 (en) 2007-07-27 2018-09-18 Blackberry Limited Wireless communication system installation
US10122747B2 (en) 2013-12-06 2018-11-06 Lookout, Inc. Response generation after distributed monitoring and evaluation of multiple devices
US10218697B2 (en) 2017-06-09 2019-02-26 Lookout, Inc. Use of device risk evaluation to manage access to services
US10366582B2 (en) 2016-06-21 2019-07-30 Bank Of America Corporation Devices and systems for detecting unauthorized communication of data from a magnetic stripe device or embedded smart chip device
US10440053B2 (en) 2016-05-31 2019-10-08 Lookout, Inc. Methods and systems for detecting and preventing network connection compromise
US10540494B2 (en) 2015-05-01 2020-01-21 Lookout, Inc. Determining source of side-loaded software using an administrator server
US10699273B2 (en) 2013-03-14 2020-06-30 Lookout, Inc. System and method for authorizing payment transaction based on device locations
US10812537B1 (en) * 2018-07-23 2020-10-20 Amazon Technologies, Inc. Using network locality to automatically trigger arbitrary workflows

Families Citing this family (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050186954A1 (en) * 2004-02-20 2005-08-25 Tom Kenney Systems and methods that provide user and/or network personal data disabling commands for mobile devices
US7760882B2 (en) * 2004-06-28 2010-07-20 Japan Communications, Inc. Systems and methods for mutual authentication of network nodes
US20060026268A1 (en) * 2004-06-28 2006-02-02 Sanda Frank S Systems and methods for enhancing and optimizing a user's experience on an electronic device
JP4750180B2 (en) 2006-02-27 2011-08-17 京セラ株式会社 Communication system and communication device
US8548452B2 (en) * 2006-04-13 2013-10-01 Blackberry Limited System and method for controlling device usage
CN101106768B (en) * 2006-07-12 2010-05-12 英华达(南京)科技有限公司 Data confidentiality and data return method for mobile communication device
US7603435B2 (en) 2006-11-15 2009-10-13 Palm, Inc. Over-the-air device kill pill and lock
KR100963789B1 (en) * 2008-06-04 2010-06-17 경북대학교 산학협력단 Privacy protction and trace system of mobile terminal
US8369867B2 (en) 2008-06-30 2013-02-05 Apple Inc. Location sharing
US9785662B2 (en) 2008-10-14 2017-10-10 Mobilegaurd Inc. System and method for capturing data sent by a mobile device
US8107944B2 (en) * 2008-10-14 2012-01-31 Todd Michael Cohan System and method for automatic data security, back-up and control for mobile devices
US9450918B2 (en) * 2008-10-14 2016-09-20 Todd Michael Cohan System and method for automatic data security, back-up and control for mobile devices
US8811965B2 (en) 2008-10-14 2014-08-19 Todd Michael Cohan System and method for automatic data security back-up and control for mobile devices
US10165089B2 (en) * 2008-10-14 2018-12-25 Mobileguard, Llc System and method for automatic data security, back-up and control for mobile devices
DE102008063454B4 (en) * 2008-12-17 2012-05-31 Siemens Aktiengesellschaft Method for monitoring network nodes
US8254957B2 (en) * 2009-06-16 2012-08-28 Intel Corporation Context-based limitation of mobile device operation
KR101466568B1 (en) * 2009-07-23 2014-12-01 린나이코리아 주식회사 Locking method for room controller in each room controlling system
US9258715B2 (en) 2009-12-14 2016-02-09 Apple Inc. Proactive security for mobile devices
US8503984B2 (en) * 2009-12-23 2013-08-06 Amos Winbush, III Mobile communication device user content synchronization with central web-based records and information sharing system
US20110149086A1 (en) * 2009-12-23 2011-06-23 Winbush Iii Amos Camera user content synchronization with central web-based records and information sharing system
EP2524320B1 (en) * 2010-01-14 2016-06-15 Hewlett Packard Development Company, L.P. Recovering data in a storage medium of an electronic device that has been tampered with
US9489523B2 (en) 2010-04-08 2016-11-08 University Of Washington Through Its Center For Commercialization Systems and methods for file access auditing
CN101937404B (en) * 2010-09-07 2014-01-08 湖南源科高新技术有限公司 Control method for accessing computer memory and computer thereof
US8478979B2 (en) * 2010-09-09 2013-07-02 Hewlett-Packard Development Company, L.P. Disable a feature of a computing machine
US8295812B1 (en) * 2010-10-15 2012-10-23 Sprint Communications Company L.P. Reducing mobile-phone fraud
US20130055350A1 (en) * 2011-08-30 2013-02-28 Only1Question.com Inc. Creating Incentives By Controlling Device Functions
US20130090110A1 (en) * 2011-10-11 2013-04-11 Thomas Cloonan Managing battery power usage of a lost mobile device to extend search time for the lost mobile device
US9077756B1 (en) * 2012-03-05 2015-07-07 Symantec Corporation Limiting external device access to mobile computing devices according to device type and connection context
MX352123B (en) * 2012-10-26 2017-11-09 Absolute Software Corp Device monitoring using multiple servers optimized for different types of communications.
US10354251B1 (en) 2013-07-26 2019-07-16 Sprint Communications Company L.P. Assigning risk levels to electronic commerce transactions
CN104573568A (en) * 2013-10-25 2015-04-29 上海宇芯科技有限公司 System function control method
US10412586B2 (en) * 2013-12-17 2019-09-10 Dropbox, Inc. Limited-functionality accounts
CN104809403A (en) * 2014-01-24 2015-07-29 红板凳科技股份有限公司 Root-preventing white screen method
US10601978B2 (en) * 2014-06-04 2020-03-24 T-Mobile Usa, Inc. Telecommunication device utilization based on heartbeat communication
US9344433B2 (en) 2014-07-15 2016-05-17 Dropbox, Inc. Unregistered user account generation for content item sharing
CN104284026A (en) * 2014-10-08 2015-01-14 宁夏天纵泓光余热发电技术有限公司 Mobile phone with security and protection function
CN104320538A (en) * 2014-10-09 2015-01-28 宁夏天纵泓光余热发电技术有限公司 Mobile phone capable of actively returning address list
US9558372B2 (en) * 2015-03-13 2017-01-31 Microsoft Technology Licensing, Llc Disablement of lost or stolen device
US9609119B2 (en) 2015-05-23 2017-03-28 Microsoft Technology Licensing, Llc Disablement of lost or stolen device
US10636265B2 (en) 2016-11-14 2020-04-28 Datalogic IP Tech, S.r.l. Systems, methods and articles to prevent unauthorized removal of mobile processor-based devices from designated areas
CN106851562A (en) * 2017-01-03 2017-06-13 惠州Tcl移动通信有限公司 It is a kind of prevent mobile phone lose after leakage of content method and system
CN107483547B (en) * 2017-07-20 2020-10-30 北京珠穆朗玛移动通信有限公司 Loss prevention method for user terminal, server, mobile terminal and storage medium
CN109525980A (en) * 2017-09-18 2019-03-26 中国电信股份有限公司 Realize the anti-lost method and system of mobile phone, anti-loss mobile phone
KR102477043B1 (en) 2017-11-08 2022-12-14 삼성전자주식회사 Electronic device and control method thereof
CN108758989A (en) * 2018-04-28 2018-11-06 四川虹美智能科技有限公司 A kind of air-conditioning and its application method
CN108592301A (en) * 2018-04-28 2018-09-28 四川虹美智能科技有限公司 A kind of acoustic control intelligent air-conditioning, system and application method
US10616405B1 (en) 2018-09-19 2020-04-07 International Business Machines Corporation Utilizing caller ID for managing a mobile device
US10659597B2 (en) 2018-09-27 2020-05-19 International Business Machines Corporation Limiting computing device functionality using capacitive coupling through a human body
US11134430B2 (en) 2018-12-10 2021-09-28 At&T Intellectual Property I, L.P. System and method for detecting and acting upon a violation of terms of service

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5276728A (en) * 1991-11-06 1994-01-04 Kenneth Pagliaroli Remotely activated automobile disabling system
US5734978A (en) * 1994-12-28 1998-03-31 Nec Corporation Mobile telephone with function to prevent illegal use and method and system for preventing illegal use of mobile telephone using the function
US5748084A (en) * 1996-11-18 1998-05-05 Isikoff; Jeremy M. Device security system
US6546243B2 (en) * 1995-10-10 2003-04-08 Qualcomm, Incorporated Method and system for over-the-air (OTA) service programming
US20040137893A1 (en) * 2003-01-15 2004-07-15 Sivakumar Muthuswamy Communication system for information security and recovery and method therfor
US20040203595A1 (en) * 2002-08-12 2004-10-14 Singhal Tara Chand Method and apparatus for user authentication using a cellular telephone and a transient pass code
US20040204021A1 (en) * 2002-04-02 2004-10-14 Keith Cocita Cell phone feature
US6813487B1 (en) * 2000-10-18 2004-11-02 David Alan Trommelen Method and apparatus for securing data stored in a remote electronic device

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10124345A (en) * 1996-10-09 1998-05-15 Hewlett Packard Co <Hp> Method for protecting remote computer
US6166652A (en) * 1997-06-23 2000-12-26 Benvenuti; Kerrie System and method for locating misplaced items
US6813498B1 (en) * 2000-10-27 2004-11-02 Lucent Technologies Inc. Apparatus, method and system for detection and recovery of missing wireless devices in communication systems
JP2003032354A (en) * 2001-07-16 2003-01-31 Nec Corp Mobile communication device
US20030065934A1 (en) * 2001-09-28 2003-04-03 Angelo Michael F. After the fact protection of data in remote personal and wireless devices
US7043263B2 (en) * 2002-04-11 2006-05-09 Kyocera Wireless Corp. System and method for mobile configuration
US6782251B2 (en) * 2002-09-26 2004-08-24 Motorola Inc. Method and apparatus for operating a lost mobile communication device
US7103367B2 (en) * 2003-03-12 2006-09-05 Sbc Knowledge Ventures, L.P. Network-based services for misplaced cellular mobile stations
US20050186954A1 (en) * 2004-02-20 2005-08-25 Tom Kenney Systems and methods that provide user and/or network personal data disabling commands for mobile devices
US7783281B1 (en) * 2004-04-22 2010-08-24 Sprint Spectrum L.P. Method and system for securing a mobile device
ATE541423T1 (en) * 2004-04-30 2012-01-15 Research In Motion Ltd SYSTEM AND METHOD FOR PERFORMING RECOVERY OPERATIONS ON MOBILE DEVICES

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5276728A (en) * 1991-11-06 1994-01-04 Kenneth Pagliaroli Remotely activated automobile disabling system
US5734978A (en) * 1994-12-28 1998-03-31 Nec Corporation Mobile telephone with function to prevent illegal use and method and system for preventing illegal use of mobile telephone using the function
US6546243B2 (en) * 1995-10-10 2003-04-08 Qualcomm, Incorporated Method and system for over-the-air (OTA) service programming
US5748084A (en) * 1996-11-18 1998-05-05 Isikoff; Jeremy M. Device security system
US6813487B1 (en) * 2000-10-18 2004-11-02 David Alan Trommelen Method and apparatus for securing data stored in a remote electronic device
US20040204021A1 (en) * 2002-04-02 2004-10-14 Keith Cocita Cell phone feature
US20040203595A1 (en) * 2002-08-12 2004-10-14 Singhal Tara Chand Method and apparatus for user authentication using a cellular telephone and a transient pass code
US20040137893A1 (en) * 2003-01-15 2004-07-15 Sivakumar Muthuswamy Communication system for information security and recovery and method therfor

Cited By (448)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7778664B1 (en) 2001-10-18 2010-08-17 Iwao Fujisaki Communication device
US7945287B1 (en) 2001-10-18 2011-05-17 Iwao Fujisaki Communication device
US9247383B1 (en) 2001-10-18 2016-01-26 Iwao Fujisaki Communication device
US9537988B1 (en) 2001-10-18 2017-01-03 Iwao Fujisaki Communication device
US10805451B1 (en) 2001-10-18 2020-10-13 Iwao Fujisaki Communication device
US7865216B1 (en) 2001-10-18 2011-01-04 Iwao Fujisaki Communication device
US8064964B1 (en) 2001-10-18 2011-11-22 Iwao Fujisaki Communication device
US9154776B1 (en) 2001-10-18 2015-10-06 Iwao Fujisaki Communication device
US8538485B1 (en) 2001-10-18 2013-09-17 Iwao Fujisaki Communication device
US8200275B1 (en) 2001-10-18 2012-06-12 Iwao Fujisaki System for communication device to display perspective 3D map
US7907942B1 (en) 2001-10-18 2011-03-15 Iwao Fujisaki Communication device
US9026182B1 (en) 2001-10-18 2015-05-05 Iwao Fujisaki Communication device
US9883025B1 (en) 2001-10-18 2018-01-30 Iwao Fujisaki Communication device
US9883021B1 (en) 2001-10-18 2018-01-30 Iwao Fujisaki Communication device
US7907963B1 (en) 2001-10-18 2011-03-15 Iwao Fujisaki Method to display three-dimensional map on communication device
US8805442B1 (en) 2001-10-18 2014-08-12 Iwao Fujisaki Communication device
US8086276B1 (en) 2001-10-18 2011-12-27 Iwao Fujisaki Communication device
US8744515B1 (en) 2001-10-18 2014-06-03 Iwao Fujisaki Communication device
US9197741B1 (en) 2001-10-18 2015-11-24 Iwao Fujisaki Communication device
US7853295B1 (en) 2001-10-18 2010-12-14 Iwao Fujisaki Communication device
US8068880B1 (en) 2001-10-18 2011-11-29 Iwao Fujisaki Communication device
US8498672B1 (en) 2001-10-18 2013-07-30 Iwao Fujisaki Communication device
US10284711B1 (en) 2001-10-18 2019-05-07 Iwao Fujisaki Communication device
US8024009B1 (en) 2001-10-18 2011-09-20 Iwao Fujisaki Communication device
US7996037B1 (en) 2001-10-18 2011-08-09 Iwao Fujisaki Communication device
US7853297B1 (en) 2001-10-18 2010-12-14 Iwao Fujisaki Communication device
US10425522B1 (en) 2001-10-18 2019-09-24 Iwao Fujisaki Communication device
US7949371B1 (en) 2001-10-18 2011-05-24 Iwao Fujisaki Communication device
US8290482B1 (en) 2001-10-18 2012-10-16 Iwao Fujisaki Communication device
US7945286B1 (en) 2001-10-18 2011-05-17 Iwao Fujisaki Communication device
US7904109B1 (en) 2001-10-18 2011-03-08 Iwao Fujisaki Communication device
US7945256B1 (en) 2001-10-18 2011-05-17 Iwao Fujisaki Communication device
US8538486B1 (en) 2001-10-18 2013-09-17 Iwao Fujisaki Communication device which displays perspective 3D map
US7945236B1 (en) 2001-10-18 2011-05-17 Iwao Fujisaki Communication device
US8750921B1 (en) 2001-10-18 2014-06-10 Iwao Fujisaki Communication device
US8682397B1 (en) 2003-02-08 2014-03-25 Iwao Fujisaki Communication device
US8229512B1 (en) 2003-02-08 2012-07-24 Iwao Fujisaki Communication device
US8430754B1 (en) 2003-04-03 2013-04-30 Iwao Fujisaki Communication device
US8425321B1 (en) 2003-04-03 2013-04-23 Iwao Fujisaki Video game device
US8241128B1 (en) 2003-04-03 2012-08-14 Iwao Fujisaki Communication device
US8165630B1 (en) 2003-09-26 2012-04-24 Iwao Fujisaki Communication device
US10805445B1 (en) 2003-09-26 2020-10-13 Iwao Fujisaki Communication device
US11184468B1 (en) 2003-09-26 2021-11-23 Iwao Fujisaki Communication device
US7890136B1 (en) 2003-09-26 2011-02-15 Iwao Fujisaki Communication device
US10547723B1 (en) 2003-09-26 2020-01-28 Iwao Fujisaki Communication device
US7856248B1 (en) 2003-09-26 2010-12-21 Iwao Fujisaki Communication device
US8326357B1 (en) 2003-09-26 2012-12-04 Iwao Fujisaki Communication device
US11190632B1 (en) 2003-09-26 2021-11-30 Iwao Fujisaki Communication device
US10547721B1 (en) 2003-09-26 2020-01-28 Iwao Fujisaki Communication device
US10547722B1 (en) 2003-09-26 2020-01-28 Iwao Fujisaki Communication device
US8320958B1 (en) 2003-09-26 2012-11-27 Iwao Fujisaki Communication device
US8311578B1 (en) 2003-09-26 2012-11-13 Iwao Fujisaki Communication device
US11184470B1 (en) 2003-09-26 2021-11-23 Iwao Fujisaki Communication device
US11184469B1 (en) 2003-09-26 2021-11-23 Iwao Fujisaki Communication device
US8331984B1 (en) 2003-09-26 2012-12-11 Iwao Fujisaki Communication device
US10547724B1 (en) 2003-09-26 2020-01-28 Iwao Fujisaki Communication device
US7996038B1 (en) 2003-09-26 2011-08-09 Iwao Fujisaki Communication device
US8694052B1 (en) 2003-09-26 2014-04-08 Iwao Fujisaki Communication device
US8010157B1 (en) 2003-09-26 2011-08-30 Iwao Fujisaki Communication device
US10547725B1 (en) 2003-09-26 2020-01-28 Iwao Fujisaki Communication device
US8712472B1 (en) 2003-09-26 2014-04-29 Iwao Fujisaki Communication device
US10560561B1 (en) 2003-09-26 2020-02-11 Iwao Fujisaki Communication device
US8041371B1 (en) 2003-09-26 2011-10-18 Iwao Fujisaki Communication device
US8055298B1 (en) 2003-09-26 2011-11-08 Iwao Fujisaki Communication device
US10237385B1 (en) 2003-09-26 2019-03-19 Iwao Fujisaki Communication device
US8064954B1 (en) 2003-09-26 2011-11-22 Iwao Fujisaki Communication device
US8774862B1 (en) 2003-09-26 2014-07-08 Iwao Fujisaki Communication device
US8781526B1 (en) 2003-09-26 2014-07-15 Iwao Fujisaki Communication device
US8447353B1 (en) 2003-09-26 2013-05-21 Iwao Fujisaki Communication device
US8781527B1 (en) 2003-09-26 2014-07-15 Iwao Fujisaki Communication device
US8447354B1 (en) 2003-09-26 2013-05-21 Iwao Fujisaki Communication device
US8090402B1 (en) 2003-09-26 2012-01-03 Iwao Fujisaki Communication device
US8095182B1 (en) 2003-09-26 2012-01-10 Iwao Fujisaki Communication device
US8442583B1 (en) 2003-09-26 2013-05-14 Iwao Fujisaki Communication device
US10805443B1 (en) 2003-09-26 2020-10-13 Iwao Fujisaki Communication device
US8331983B1 (en) 2003-09-26 2012-12-11 Iwao Fujisaki Communication device
US8121641B1 (en) 2003-09-26 2012-02-21 Iwao Fujisaki Communication device
US8532703B1 (en) 2003-09-26 2013-09-10 Iwao Fujisaki Communication device
US8301194B1 (en) 2003-09-26 2012-10-30 Iwao Fujisaki Communication device
US8417288B1 (en) 2003-09-26 2013-04-09 Iwao Fujisaki Communication device
US10805442B1 (en) 2003-09-26 2020-10-13 Iwao Fujisaki Communication device
US8150458B1 (en) 2003-09-26 2012-04-03 Iwao Fujisaki Communication device
US8160642B1 (en) 2003-09-26 2012-04-17 Iwao Fujisaki Communication device
US8391920B1 (en) 2003-09-26 2013-03-05 Iwao Fujisaki Communication device
US8326355B1 (en) 2003-09-26 2012-12-04 Iwao Fujisaki Communication device
US8380248B1 (en) 2003-09-26 2013-02-19 Iwao Fujisaki Communication device
US8364202B1 (en) 2003-09-26 2013-01-29 Iwao Fujisaki Communication device
US8364201B1 (en) 2003-09-26 2013-01-29 Iwao Fujisaki Communication device
US10805444B1 (en) 2003-09-26 2020-10-13 Iwao Fujisaki Communication device
US8195228B1 (en) 2003-09-26 2012-06-05 Iwao Fujisaki Communication device
US9077807B1 (en) 2003-09-26 2015-07-07 Iwao Fujisaki Communication device
US8351984B1 (en) 2003-09-26 2013-01-08 Iwao Fujisaki Communication device
US8346303B1 (en) 2003-09-26 2013-01-01 Iwao Fujisaki Communication device
US8295880B1 (en) 2003-09-26 2012-10-23 Iwao Fujisaki Communication device
US8229504B1 (en) 2003-09-26 2012-07-24 Iwao Fujisaki Communication device
US8335538B1 (en) 2003-09-26 2012-12-18 Iwao Fujisaki Communication device
US8233938B1 (en) 2003-09-26 2012-07-31 Iwao Fujisaki Communication device
US8340720B1 (en) 2003-09-26 2012-12-25 Iwao Fujisaki Communication device
US9596338B1 (en) 2003-09-26 2017-03-14 Iwao Fujisaki Communication device
US8244300B1 (en) 2003-09-26 2012-08-14 Iwao Fujisaki Communication device
US8346304B1 (en) 2003-09-26 2013-01-01 Iwao Fujisaki Communication device
US8260352B1 (en) 2003-09-26 2012-09-04 Iwao Fujisaki Communication device
US8121635B1 (en) 2003-11-22 2012-02-21 Iwao Fujisaki Communication device
US8238963B1 (en) 2003-11-22 2012-08-07 Iwao Fujisaki Communication device
US9094531B1 (en) 2003-11-22 2015-07-28 Iwao Fujisaki Communication device
US9325825B1 (en) 2003-11-22 2016-04-26 Iwao Fujisaki Communication device
US8295876B1 (en) 2003-11-22 2012-10-23 Iwao Fujisaki Communication device
US8224376B1 (en) 2003-11-22 2012-07-17 Iwao Fujisaki Communication device
US9554232B1 (en) 2003-11-22 2017-01-24 Iwao Fujisaki Communication device
US9674347B1 (en) 2003-11-22 2017-06-06 Iwao Fujisaki Communication device
US9955006B1 (en) 2003-11-22 2018-04-24 Iwao Fujisaki Communication device
US11115524B1 (en) 2003-11-22 2021-09-07 Iwao Fujisaki Communication device
US8565812B1 (en) 2003-11-22 2013-10-22 Iwao Fujisaki Communication device
US8554269B1 (en) 2003-11-22 2013-10-08 Iwao Fujisaki Communication device
US7917167B1 (en) 2003-11-22 2011-03-29 Iwao Fujisaki Communication device
US8081962B1 (en) 2004-03-23 2011-12-20 Iwao Fujisaki Communication device
US8121587B1 (en) 2004-03-23 2012-02-21 Iwao Fujisaki Communication device
US8041348B1 (en) 2004-03-23 2011-10-18 Iwao Fujisaki Communication device
US8270964B1 (en) 2004-03-23 2012-09-18 Iwao Fujisaki Communication device
US8195142B1 (en) 2004-03-23 2012-06-05 Iwao Fujisaki Communication device
US7564464B2 (en) * 2004-06-28 2009-07-21 Ricoh Company, Ltd. Image forming apparatus, operation panel control method, and computer product
US20060007500A1 (en) * 2004-06-28 2006-01-12 Yasushi Abe Image forming apparatus, operation panel control method, and computer product
US20060075414A1 (en) * 2004-10-06 2006-04-06 Robert Rapp Packaging methodology for adding functionality to a data storage device (disk drive, tape drive, other storage device, or storage subsystem) while maintaining the same form factor, standard size, or allocated size; or by increasing the overall package size to a larger form factor, standard size, or allocated size
US20060085310A1 (en) * 2004-10-14 2006-04-20 Cfph Llc System and method for facilitating a wireless financial transaction
US10460386B2 (en) 2004-10-14 2019-10-29 Cfph, Llc System and method for facilitating a wireless financial transaction
US11055780B2 (en) 2004-10-14 2021-07-06 Cfph, Llc System and method for facilitating a wireless financial transaction
US8086519B2 (en) 2004-10-14 2011-12-27 Cfph, Llc System and method for facilitating a wireless financial transaction
US7860778B2 (en) 2004-11-08 2010-12-28 Cfph, Llc System and method for implementing push technology in a wireless financial transaction
US8175959B2 (en) 2004-11-08 2012-05-08 Cfph, Llc System and method for implementing financial transaction
US11042936B2 (en) 2004-11-08 2021-06-22 Cfph, Llc System and method for implementing push technology in a wireless financial transaction
US9659328B2 (en) 2004-11-08 2017-05-23 Cfph, Llc System and method for implementing a transaction
US10217164B2 (en) 2004-11-08 2019-02-26 Cfph, Llc System and method for implementing push technology in a wireless financial transaction
US20060161628A1 (en) * 2005-01-14 2006-07-20 Research In Motion Limited System and method of remotely locating a lost mobile communication device
US8392554B2 (en) * 2005-01-14 2013-03-05 Research In Motion Limited System and method of remotely locating a lost mobile communication device
US20060211433A1 (en) * 2005-03-17 2006-09-21 Fujitsu Limited Portable electronic apparatus and non-carry processing program storage medium
US9967704B1 (en) 2005-04-04 2018-05-08 X One, Inc. Location sharing group map management
US10149092B1 (en) 2005-04-04 2018-12-04 X One, Inc. Location sharing service between GPS-enabled wireless devices, with shared target location exchange
US8831635B2 (en) 2005-04-04 2014-09-09 X One, Inc. Methods and apparatuses for transmission of an alert to multiple devices
US8750898B2 (en) 2005-04-04 2014-06-10 X One, Inc. Methods and systems for annotating target locations
US10200811B1 (en) 2005-04-04 2019-02-05 X One, Inc. Map presentation on cellular device showing positions of multiple other wireless device users
US9854402B1 (en) 2005-04-04 2017-12-26 X One, Inc. Formation of wireless device location sharing group
US9584960B1 (en) 2005-04-04 2017-02-28 X One, Inc. Rendez vous management using mobile phones or other mobile devices
US9854394B1 (en) 2005-04-04 2017-12-26 X One, Inc. Ad hoc location sharing group between first and second cellular wireless devices
US10750309B2 (en) 2005-04-04 2020-08-18 X One, Inc. Ad hoc location sharing group establishment for wireless devices with designated meeting point
US10750310B2 (en) 2005-04-04 2020-08-18 X One, Inc. Temporary location sharing group with event based termination
US10165059B2 (en) 2005-04-04 2018-12-25 X One, Inc. Methods, systems and apparatuses for the formation and tracking of location sharing groups
US10750311B2 (en) 2005-04-04 2020-08-18 X One, Inc. Application-based tracking and mapping function in connection with vehicle-based services provision
US8798645B2 (en) 2005-04-04 2014-08-05 X One, Inc. Methods and systems for sharing position data and tracing paths between mobile-device users
US9955298B1 (en) 2005-04-04 2018-04-24 X One, Inc. Methods, systems and apparatuses for the formation and tracking of location sharing groups
US8385964B2 (en) 2005-04-04 2013-02-26 Xone, Inc. Methods and apparatuses for geospatial-based sharing of information by multiple devices
US9883360B1 (en) 2005-04-04 2018-01-30 X One, Inc. Rendez vous management using mobile phones or other mobile devices
US8798593B2 (en) 2005-04-04 2014-08-05 X One, Inc. Location sharing and tracking using mobile phones or other wireless devices
US9185522B1 (en) 2005-04-04 2015-11-10 X One, Inc. Apparatus and method to transmit content to a cellular wireless device based on proximity to other wireless devices
US9253616B1 (en) 2005-04-04 2016-02-02 X One, Inc. Apparatus and method for obtaining content on a cellular wireless device based on proximity
US8538458B2 (en) 2005-04-04 2013-09-17 X One, Inc. Location sharing and tracking using mobile phones or other wireless devices
US8798647B1 (en) 2005-04-04 2014-08-05 X One, Inc. Tracking proximity of services provider to services consumer
US11356799B2 (en) 2005-04-04 2022-06-07 X One, Inc. Fleet location sharing application in association with services provision
US9615204B1 (en) 2005-04-04 2017-04-04 X One, Inc. Techniques for communication within closed groups of mobile devices
US9167558B2 (en) 2005-04-04 2015-10-20 X One, Inc. Methods and systems for sharing position data between subscribers involving multiple wireless providers
US9942705B1 (en) 2005-04-04 2018-04-10 X One, Inc. Location sharing group for services provision
US10791414B2 (en) 2005-04-04 2020-09-29 X One, Inc. Location sharing for commercial and proprietary content applications
US8712441B2 (en) 2005-04-04 2014-04-29 Xone, Inc. Methods and systems for temporarily sharing position data between mobile-device users
US9736618B1 (en) 2005-04-04 2017-08-15 X One, Inc. Techniques for sharing relative position between mobile devices
US10299071B2 (en) 2005-04-04 2019-05-21 X One, Inc. Server-implemented methods and systems for sharing location amongst web-enabled cell phones
US9031581B1 (en) 2005-04-04 2015-05-12 X One, Inc. Apparatus and method for obtaining content on a cellular wireless device based on proximity to other wireless devices
US10856099B2 (en) 2005-04-04 2020-12-01 X One, Inc. Application-based two-way tracking and mapping function with selected individuals
US11778415B2 (en) 2005-04-04 2023-10-03 Xone, Inc. Location sharing application in association with services provision
US9467832B2 (en) 2005-04-04 2016-10-11 X One, Inc. Methods and systems for temporarily sharing position data between mobile-device users
US10341809B2 (en) 2005-04-04 2019-07-02 X One, Inc. Location sharing with facilitated meeting point definition
US10341808B2 (en) 2005-04-04 2019-07-02 X One, Inc. Location sharing for commercial and proprietary content applications
US9654921B1 (en) 2005-04-04 2017-05-16 X One, Inc. Techniques for sharing position data between first and second devices
US9749790B1 (en) 2005-04-04 2017-08-29 X One, Inc. Rendez vous management using mobile phones or other mobile devices
US10313826B2 (en) 2005-04-04 2019-06-04 X One, Inc. Location sharing and map support in connection with services request
US9143723B1 (en) 2005-04-08 2015-09-22 Iwao Fujisaki Communication device
US9948890B1 (en) 2005-04-08 2018-04-17 Iwao Fujisaki Communication device
US9549150B1 (en) 2005-04-08 2017-01-17 Iwao Fujisaki Communication device
US10244206B1 (en) 2005-04-08 2019-03-26 Iwao Fujisaki Communication device
US8433364B1 (en) 2005-04-08 2013-04-30 Iwao Fujisaki Communication device
US20060242432A1 (en) * 2005-04-25 2006-10-26 Burks Ellisa P E.magnum
US20080293397A1 (en) * 2005-05-16 2008-11-27 Sony Ericsson Mobile Communications Ab Method for Disabling a Mobile Device
US7584201B2 (en) * 2005-08-10 2009-09-01 Qwest Communications International, Inc Management of mobile-device data
US20090292710A1 (en) * 2005-08-10 2009-11-26 Qwest Communication International Inc. Management of mobile-device data
US20070038680A1 (en) * 2005-08-10 2007-02-15 Qwest Communications International Inc. Management of mobile-device data
US20070117595A1 (en) * 2005-11-22 2007-05-24 Stephen Sherman Devices, methods and computer program products for providing a preferred operational mode to a wireless terminal
US8756390B2 (en) * 2005-12-05 2014-06-17 International Business Machines Corporation Methods and apparatuses for protecting data on mass storage devices
US20070130434A1 (en) * 2005-12-05 2007-06-07 International Business Machines Corporation Methods and apparatuses for protecting data on mass storage devices
DE102006041556A1 (en) * 2006-09-05 2008-03-20 Nokia Siemens Networks Gmbh & Co.Kg Data protection method in communication system, involves shifting protection device in terminal device into secured condition for prevention of unauthorized access and data stored on terminal device is transferred to back up device
DE102006041556B4 (en) * 2006-09-05 2008-11-06 Nokia Siemens Networks Gmbh & Co.Kg Methods and apparatus for securing data in a communication system
US8116737B2 (en) * 2006-10-13 2012-02-14 Huawei Technologies Co., Ltd. Method, system and apparatus for locking information
US20090203356A1 (en) * 2006-10-13 2009-08-13 Huawei Technologies Co., Ltd. Method, system and apparatus for locking information
US8301118B2 (en) * 2006-10-13 2012-10-30 Huawei Technologies Co., Ltd. Method, system and apparatus for locking information
US20120094636A1 (en) * 2006-10-13 2012-04-19 Huawei Technologies Co., Ltd. Method, system and apparatus for locking information
US20080154997A1 (en) * 2006-12-20 2008-06-26 Texas Instruments Incorporated Systems and methods for function control in a calculation device
US20170206378A1 (en) * 2007-01-19 2017-07-20 Blackberry Limited Selectively wiping a remote device
US10540520B2 (en) * 2007-01-19 2020-01-21 Blackberry Limited Selectively wiping a remote device
US10162983B2 (en) * 2007-01-19 2018-12-25 Blackberry Limited Selectively wiping a remote device
US9106670B2 (en) 2007-01-19 2015-08-11 Blackberry Limited Selectively wiping a remote device
US8056143B2 (en) 2007-01-19 2011-11-08 Research In Motion Limited Selectively wiping a remote device
US9652629B2 (en) * 2007-01-19 2017-05-16 Blackberry Limited Selectively wiping a remote device
WO2008086611A1 (en) * 2007-01-19 2008-07-24 Research In Motion Limited Selectively wiping a remote device
US20120079603A1 (en) * 2007-01-19 2012-03-29 Research In Motion Limited Selectively wiping a remote device
US20080178300A1 (en) * 2007-01-19 2008-07-24 Research In Motion Limited Selectively wiping a remote device
US20190080114A1 (en) * 2007-01-19 2019-03-14 Blackberry Limited Selectively wiping a remote device
US11030338B2 (en) * 2007-01-19 2021-06-08 Blackberry Limited Selectively wiping a remote device
US9100413B2 (en) * 2007-01-19 2015-08-04 Blackberry Limited Selectively wiping a remote device
US20150339495A1 (en) * 2007-01-19 2015-11-26 Blackberry Limited Selectively wiping a remote device
US8749343B2 (en) 2007-03-14 2014-06-10 Seth Cirker Selectively enabled threat based information system
US20090160673A1 (en) * 2007-03-14 2009-06-25 Seth Cirker Mobile wireless device with location-dependent capability
US20080224862A1 (en) * 2007-03-14 2008-09-18 Seth Cirker Selectively enabled threat based information system
US9135807B2 (en) * 2007-03-14 2015-09-15 Seth Cirker Mobile wireless device with location-dependent capability
US20080238614A1 (en) * 2007-03-30 2008-10-02 International Business Machines Corporation Method and system for securing and recovering a wireless communication device
US8825026B1 (en) 2007-05-03 2014-09-02 Iwao Fujisaki Communication device
US8825090B1 (en) 2007-05-03 2014-09-02 Iwao Fujisaki Communication device
US7890089B1 (en) 2007-05-03 2011-02-15 Iwao Fujisaki Communication device
US9185657B1 (en) 2007-05-03 2015-11-10 Iwao Fujisaki Communication device
US9092917B1 (en) 2007-05-03 2015-07-28 Iwao Fujisaki Communication device
US9396594B1 (en) 2007-05-03 2016-07-19 Iwao Fujisaki Communication device
US8774825B2 (en) 2007-06-28 2014-07-08 Apple Inc. Integration of map services with user applications in a mobile device
US9131342B2 (en) 2007-06-28 2015-09-08 Apple Inc. Location-based categorical information services
US8924144B2 (en) 2007-06-28 2014-12-30 Apple Inc. Location based tracking
US8332402B2 (en) 2007-06-28 2012-12-11 Apple Inc. Location based media items
US8290513B2 (en) 2007-06-28 2012-10-16 Apple Inc. Location-based services
US10064158B2 (en) 2007-06-28 2018-08-28 Apple Inc. Location aware mobile device
US9414198B2 (en) 2007-06-28 2016-08-09 Apple Inc. Location-aware mobile device
US8275352B2 (en) 2007-06-28 2012-09-25 Apple Inc. Location-based emergency information
US8204684B2 (en) 2007-06-28 2012-06-19 Apple Inc. Adaptive mobile device navigation
US8180379B2 (en) 2007-06-28 2012-05-15 Apple Inc. Synchronizing mobile and vehicle devices
US8175802B2 (en) 2007-06-28 2012-05-08 Apple Inc. Adaptive route guidance based on preferences
US9578621B2 (en) 2007-06-28 2017-02-21 Apple Inc. Location aware mobile device
US8311526B2 (en) 2007-06-28 2012-11-13 Apple Inc. Location-based categorical information services
US10952180B2 (en) 2007-06-28 2021-03-16 Apple Inc. Location-aware mobile device
US8762056B2 (en) 2007-06-28 2014-06-24 Apple Inc. Route reference
US8108144B2 (en) 2007-06-28 2012-01-31 Apple Inc. Location based tracking
US9702709B2 (en) 2007-06-28 2017-07-11 Apple Inc. Disfavored route progressions or locations
US9310206B2 (en) 2007-06-28 2016-04-12 Apple Inc. Location based tracking
US9066199B2 (en) 2007-06-28 2015-06-23 Apple Inc. Location-aware mobile device
US11221221B2 (en) 2007-06-28 2022-01-11 Apple Inc. Location based tracking
US11419092B2 (en) 2007-06-28 2022-08-16 Apple Inc. Location-aware mobile device
US8548735B2 (en) 2007-06-28 2013-10-01 Apple Inc. Location based tracking
US8738039B2 (en) 2007-06-28 2014-05-27 Apple Inc. Location-based categorical information services
US11665665B2 (en) 2007-06-28 2023-05-30 Apple Inc. Location-aware mobile device
US8694026B2 (en) 2007-06-28 2014-04-08 Apple Inc. Location based services
US10508921B2 (en) 2007-06-28 2019-12-17 Apple Inc. Location based tracking
US10458800B2 (en) 2007-06-28 2019-10-29 Apple Inc. Disfavored route progressions or locations
US10412703B2 (en) 2007-06-28 2019-09-10 Apple Inc. Location-aware mobile device
US9109904B2 (en) 2007-06-28 2015-08-18 Apple Inc. Integration of map services and user applications in a mobile device
US9891055B2 (en) 2007-06-28 2018-02-13 Apple Inc. Location based tracking
US9137280B2 (en) 2007-07-27 2015-09-15 Blackberry Limited Wireless communication systems
US8965992B2 (en) 2007-07-27 2015-02-24 Blackberry Limited Apparatus and methods for coordination of wireless systems
US10079912B2 (en) 2007-07-27 2018-09-18 Blackberry Limited Wireless communication system installation
US9270682B2 (en) 2007-07-27 2016-02-23 Blackberry Limited Administration of policies for wireless devices in a wireless communication system
US20090031250A1 (en) * 2007-07-27 2009-01-29 Jesse Boudreau Administration of wireless devices in a wireless communication system
US9641565B2 (en) 2007-07-27 2017-05-02 Blackberry Limited Apparatus and methods for operation of a wireless server
US20100330958A1 (en) * 2007-08-01 2010-12-30 Nxp B.V. Mobile communication device and method for disabling applications
US8811971B2 (en) * 2007-08-01 2014-08-19 Nxp B.V. Mobile communication device and method for disabling applications
US10148803B2 (en) 2007-08-24 2018-12-04 Iwao Fujisaki Communication device
US9232369B1 (en) 2007-08-24 2016-01-05 Iwao Fujisaki Communication device
US8676273B1 (en) 2007-08-24 2014-03-18 Iwao Fujisaki Communication device
US9596334B1 (en) 2007-08-24 2017-03-14 Iwao Fujisaki Communication device
US20160246962A1 (en) * 2007-08-29 2016-08-25 Mcafee, Inc. System, Method, and Computer Program Product for Isolating a Device Associated with At Least Potential Data Leakage Activity, Based on User Input
US10872148B2 (en) * 2007-08-29 2020-12-22 Mcafee, Llc System, method, and computer program product for isolating a device associated with at least potential data leakage activity, based on user input
US8888385B2 (en) 2007-09-21 2014-11-18 Seth Cirker Privacy ensuring covert camera
US9229298B2 (en) 2007-09-21 2016-01-05 Seth Cirker Privacy ensuring covert camera
US20090098857A1 (en) * 2007-10-10 2009-04-16 Dallas De Atley Securely Locating a Device
US8977294B2 (en) * 2007-10-10 2015-03-10 Apple Inc. Securely locating a device
US9082115B1 (en) 2007-10-26 2015-07-14 Iwao Fujisaki Communication device
US8676705B1 (en) 2007-10-26 2014-03-18 Iwao Fujisaki Communication device
US8639214B1 (en) 2007-10-26 2014-01-28 Iwao Fujisaki Communication device
US8755838B1 (en) 2007-10-29 2014-06-17 Iwao Fujisaki Communication device
US8472935B1 (en) 2007-10-29 2013-06-25 Iwao Fujisaki Communication device
US9094775B1 (en) 2007-10-29 2015-07-28 Iwao Fujisaki Communication device
US9002344B2 (en) 2007-12-05 2015-04-07 Microsoft Technology Licensing, Llc Phone content service
US20090149192A1 (en) * 2007-12-05 2009-06-11 Sandra Vargas Device Locate Service
US20090149223A1 (en) * 2007-12-05 2009-06-11 Friedman Jon D Mobile Communications Device having Moveable Housings
US20090197586A1 (en) * 2007-12-05 2009-08-06 Sandra Vargas Phone Content Service
US9139089B1 (en) 2007-12-27 2015-09-22 Iwao Fujisaki Inter-vehicle middle point maintaining implementer
US8355862B2 (en) 2008-01-06 2013-01-15 Apple Inc. Graphical user interface for presenting location information
US9838877B2 (en) 2008-04-02 2017-12-05 Yougetitback Limited Systems and methods for dynamically assessing and mitigating risk of an insured entity
US20130091564A1 (en) * 2008-04-02 2013-04-11 William Fitzgerald Systems and methods for mitigating the unauthorized use of a device
US9916481B2 (en) * 2008-04-02 2018-03-13 Yougetitback Limited Systems and methods for mitigating the unauthorized use of a device
US9886599B2 (en) 2008-04-02 2018-02-06 Yougetitback Limited Display of information through auxiliary user interface
WO2009127991A1 (en) * 2008-04-16 2009-10-22 Nxp B.V. Method and system to improve the security of a credit card
US8543157B1 (en) 2008-05-09 2013-09-24 Iwao Fujisaki Communication device which notifies its pin-point location or geographic area in accordance with user selection
US9702721B2 (en) 2008-05-12 2017-07-11 Apple Inc. Map service with network-based query for search
US9250092B2 (en) 2008-05-12 2016-02-02 Apple Inc. Map service with network-based query for search
US8644843B2 (en) 2008-05-16 2014-02-04 Apple Inc. Location determination
GB2461146A (en) * 2008-06-25 2009-12-30 Lenovo Sending a log of accessed data prior to executing disable command in lost computer
GB2461146B (en) * 2008-06-25 2011-09-07 Lenovo Sending log of accessed data prior to executing disable command in lost computer
US20090328233A1 (en) * 2008-06-25 2009-12-31 Lenovo (Singapore) Pte, Ltd. Sending log of accessed data prior to executing disable command in lost computer
US10503356B1 (en) 2008-06-30 2019-12-10 Iwao Fujisaki Communication device
US9060246B1 (en) 2008-06-30 2015-06-16 Iwao Fujisaki Communication device
US11112936B1 (en) 2008-06-30 2021-09-07 Iwao Fujisaki Communication device
US10175846B1 (en) 2008-06-30 2019-01-08 Iwao Fujisaki Communication device
US9241060B1 (en) 2008-06-30 2016-01-19 Iwao Fujisaki Communication device
US8340726B1 (en) 2008-06-30 2012-12-25 Iwao Fujisaki Communication device
US9049556B1 (en) 2008-07-02 2015-06-02 Iwao Fujisaki Communication device
US8452307B1 (en) 2008-07-02 2013-05-28 Iwao Fujisaki Communication device
US9326267B1 (en) 2008-07-02 2016-04-26 Iwao Fujisaki Communication device
US8359643B2 (en) 2008-09-18 2013-01-22 Apple Inc. Group formation using anonymous broadcast information
US9740852B2 (en) 2008-10-21 2017-08-22 Lookout, Inc. System and method for assessing an application to be installed on a mobile communications device
US8997181B2 (en) 2008-10-21 2015-03-31 Lookout, Inc. Assessing the security state of a mobile communications device
US8683593B2 (en) 2008-10-21 2014-03-25 Lookout, Inc. Server-assisted analysis of data for a mobile device
US9235704B2 (en) 2008-10-21 2016-01-12 Lookout, Inc. System and method for a scanning API
US9563749B2 (en) 2008-10-21 2017-02-07 Lookout, Inc. Comparing applications and assessing differences
US8752176B2 (en) 2008-10-21 2014-06-10 Lookout, Inc. System and method for server-coupled application re-analysis to obtain trust, distribution and ratings assessment
US8826441B2 (en) 2008-10-21 2014-09-02 Lookout, Inc. Event-based security state assessment and display for mobile devices
US10417432B2 (en) 2008-10-21 2019-09-17 Lookout, Inc. Methods and systems for blocking potentially harmful communications to improve the functioning of an electronic device
US9223973B2 (en) 2008-10-21 2015-12-29 Lookout, Inc. System and method for attack and malware prevention
US9344431B2 (en) 2008-10-21 2016-05-17 Lookout, Inc. System and method for assessing an application based on data from multiple devices
US9294500B2 (en) 2008-10-21 2016-03-22 Lookout, Inc. System and method for creating and applying categorization-based policy to secure a mobile communications device from access to certain data objects
US9996697B2 (en) 2008-10-21 2018-06-12 Lookout, Inc. Methods and systems for blocking the installation of an application to improve the functioning of a mobile communications device
US20110145920A1 (en) * 2008-10-21 2011-06-16 Lookout, Inc System and method for adverse mobile application identification
US8875289B2 (en) 2008-10-21 2014-10-28 Lookout, Inc. System and method for preventing malware on a mobile communication device
US10509911B2 (en) 2008-10-21 2019-12-17 Lookout, Inc. Methods and systems for conditionally granting access to services based on the security state of the device requesting access
US8881292B2 (en) 2008-10-21 2014-11-04 Lookout, Inc. Evaluating whether data is safe or malicious
US10509910B2 (en) 2008-10-21 2019-12-17 Lookout, Inc. Methods and systems for granting access to services based on a security state that varies with the severity of security events
US8561144B2 (en) 2008-10-21 2013-10-15 Lookout, Inc. Enforcing security based on a security state assessment of a mobile device
US9100389B2 (en) 2008-10-21 2015-08-04 Lookout, Inc. Assessing an application based on application data associated with the application
US9065846B2 (en) 2008-10-21 2015-06-23 Lookout, Inc. Analyzing data gathered through different protocols
US9367680B2 (en) 2008-10-21 2016-06-14 Lookout, Inc. System and method for mobile communication device application advisement
US11080407B2 (en) 2008-10-21 2021-08-03 Lookout, Inc. Methods and systems for analyzing data after initial analyses by known good and known bad security components
US8505095B2 (en) 2008-10-21 2013-08-06 Lookout, Inc. System and method for monitoring and analyzing multiple interfaces and multiple protocols
US9860263B2 (en) 2008-10-21 2018-01-02 Lookout, Inc. System and method for assessing data objects on mobile communications devices
US8984628B2 (en) 2008-10-21 2015-03-17 Lookout, Inc. System and method for adverse mobile application identification
US9245119B2 (en) 2008-10-21 2016-01-26 Lookout, Inc. Security status assessment using mobile device security information database
US9043919B2 (en) 2008-10-21 2015-05-26 Lookout, Inc. Crawling multiple markets and correlating
US8745739B2 (en) 2008-10-21 2014-06-03 Lookout, Inc. System and method for server-coupled application re-analysis to obtain characterization assessment
US8544095B2 (en) 2008-10-21 2013-09-24 Lookout, Inc. System and method for server-coupled application re-analysis
US9407640B2 (en) 2008-10-21 2016-08-02 Lookout, Inc. Assessing a security state of a mobile communications device to determine access to specific tasks
US8510843B2 (en) 2008-10-21 2013-08-13 Lookout, Inc. Security status and information display system
US8533844B2 (en) 2008-10-21 2013-09-10 Lookout, Inc. System and method for security data collection and analysis
US9779253B2 (en) 2008-10-21 2017-10-03 Lookout, Inc. Methods and systems for sharing risk responses to improve the functioning of mobile communications devices
US9781148B2 (en) 2008-10-21 2017-10-03 Lookout, Inc. Methods and systems for sharing risk responses between collections of mobile communications devices
US8260320B2 (en) 2008-11-13 2012-09-04 Apple Inc. Location specific content
US8306522B1 (en) * 2008-12-23 2012-11-06 Sprint Communications Company L.P. Dynamic interface for mobile devices
US9351044B1 (en) 2008-12-23 2016-05-24 Sprint Communications Company L.P. Dynamic interface for mobile devices
US8635109B2 (en) 2009-02-17 2014-01-21 Lookout, Inc. System and method for providing offers for mobile devices
US8682400B2 (en) 2009-02-17 2014-03-25 Lookout, Inc. Systems and methods for device broadcast of location information when battery is low
US8538815B2 (en) 2009-02-17 2013-09-17 Lookout, Inc. System and method for mobile device replacement
US9569643B2 (en) 2009-02-17 2017-02-14 Lookout, Inc. Method for detecting a security event on a portable electronic device and establishing audio transmission with a client computer
US8774788B2 (en) 2009-02-17 2014-07-08 Lookout, Inc. Systems and methods for transmitting a communication based on a device leaving or entering an area
US20110047033A1 (en) * 2009-02-17 2011-02-24 Lookout, Inc. System and method for mobile device replacement
US9232491B2 (en) 2009-02-17 2016-01-05 Lookout, Inc. Mobile device geolocation
US10623960B2 (en) * 2009-02-17 2020-04-14 Lookout, Inc. Methods and systems for enhancing electronic device security by causing the device to go into a mode for lost or stolen devices
US9179434B2 (en) 2009-02-17 2015-11-03 Lookout, Inc. Systems and methods for locking and disabling a device in response to a request
US9042876B2 (en) 2009-02-17 2015-05-26 Lookout, Inc. System and method for uploading location information based on device movement
US9100925B2 (en) 2009-02-17 2015-08-04 Lookout, Inc. Systems and methods for displaying location information of a device
US20100210240A1 (en) * 2009-02-17 2010-08-19 Flexilis, Inc. System and method for remotely securing or recovering a mobile device
US8855601B2 (en) 2009-02-17 2014-10-07 Lookout, Inc. System and method for remotely-initiated audio communication
US20190342759A1 (en) * 2009-02-17 2019-11-07 Lookout, Inc. Methods and systems for enhancing electronic device security by causing the device to go into a mode for lost or stolen devices
US8825007B2 (en) 2009-02-17 2014-09-02 Lookout, Inc. Systems and methods for applying a security policy to a device based on a comparison of locations
US9167550B2 (en) 2009-02-17 2015-10-20 Lookout, Inc. Systems and methods for applying a security policy to a device based on location
US9955352B2 (en) 2009-02-17 2018-04-24 Lookout, Inc. Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such
US8467768B2 (en) 2009-02-17 2013-06-18 Lookout, Inc. System and method for remotely securing or recovering a mobile device
US8929874B2 (en) 2009-02-17 2015-01-06 Lookout, Inc. Systems and methods for remotely controlling a lost mobile communications device
US11122433B2 (en) * 2009-02-17 2021-09-14 Lookout, Inc. Methods and systems for enhancing electronic device security by intercepting and analyzing a communication
US10419936B2 (en) 2009-02-17 2019-09-17 Lookout, Inc. Methods and systems for causing mobile communications devices to emit sounds with encoded information
US8666367B2 (en) 2009-05-01 2014-03-04 Apple Inc. Remotely locating and commanding a mobile device
US8660530B2 (en) 2009-05-01 2014-02-25 Apple Inc. Remotely receiving and communicating commands to a mobile device for execution by the mobile device
US8670748B2 (en) 2009-05-01 2014-03-11 Apple Inc. Remotely locating and commanding a mobile device
US9979776B2 (en) 2009-05-01 2018-05-22 Apple Inc. Remotely locating and commanding a mobile device
US8419806B2 (en) 2009-05-05 2013-04-16 Absolute Software Corporation Discriminating data protection system
US8925100B2 (en) 2009-05-05 2014-12-30 Absolute Software Corporation Discriminating data protection system
EP2427851A4 (en) * 2009-05-05 2014-10-08 Absolute Software Corp Discriminating data protection system
US20100287619A1 (en) * 2009-05-05 2010-11-11 Absolute Software Corporation Discriminating data protection system
WO2010127455A1 (en) * 2009-05-05 2010-11-11 Absolute Software Corporation Discriminating data protection system
EP2427851A1 (en) * 2009-05-05 2012-03-14 Absolute Software Corporation Discriminating data protection system
AU2010244945B2 (en) * 2009-05-05 2015-01-22 Absolute Software Corporation Discriminating data protection system
US20110143757A1 (en) * 2009-12-15 2011-06-16 Electronics And Telecommunications Research Institute Apparatus and method for providing group service in wireless communication system
US8489095B2 (en) 2009-12-15 2013-07-16 Electronics And Telecommunications Research Institute Apparatus and method for providing group service in wireless communication system
US20110145927A1 (en) * 2009-12-16 2011-06-16 Verizon Patent And Licensing Inc. Method and system for providing remote configuration of missing mobile devices
US8974544B2 (en) * 2009-12-16 2015-03-10 Verizon Patent And Licensing Inc. Method and system for providing remote configuration of missing mobile devices
US20110151895A1 (en) * 2009-12-21 2011-06-23 I-Contain Limited Mobile monitoring device and monitoring system for electronic equipment
US20120013929A1 (en) * 2010-07-13 2012-01-19 Toshiba Tec Kabushiki Kaisha Image forming apparatus
US9326146B2 (en) 2010-12-06 2016-04-26 Gemalto Inc. Method for downloading a subscription in an UICC embedded in a terminal
US9760726B2 (en) 2010-12-06 2017-09-12 Gemalto Sa Method for remotely delivering a full subscription profile to a UICC over IP
US9301145B2 (en) 2010-12-06 2016-03-29 Gemalto Sa UICCs embedded in terminals or removable therefrom
US10242210B2 (en) 2010-12-06 2019-03-26 Gemalto Sa Method for managing content on a secure element connected to an equipment
US9532223B2 (en) 2010-12-06 2016-12-27 Gemalto Sa Method for downloading a subscription from an operator to a UICC embedded in a terminal
US9817993B2 (en) 2010-12-06 2017-11-14 Gemalto Sa UICCs embedded in terminals or removable therefrom
US9690950B2 (en) 2010-12-06 2017-06-27 Gemalto Sa Method for exporting data of a Javacard application stored in a UICC to a host
US9294919B2 (en) 2010-12-06 2016-03-22 Gemalto Sa Method for exporting on a secure server data comprised on a UICC comprised in a terminal
US9462475B2 (en) 2010-12-06 2016-10-04 Gemalto Sa UICCs embedded in terminals or removable therefrom
US9037193B2 (en) 2010-12-06 2015-05-19 Gemalto Sa Method for switching between a first and a second logical UICCS comprised in a same physical UICC
WO2012076485A1 (en) * 2010-12-06 2012-06-14 Gemalto Sa System for managing multiple subscriptions in a uicc
US9946888B2 (en) 2010-12-06 2018-04-17 Gemalto Sa System for managing multiple subscriptions in a UICC
US9408066B2 (en) 2010-12-06 2016-08-02 Gemalto Inc. Method for transferring securely the subscription information and user data from a first terminal to a second terminal
US8738765B2 (en) 2011-06-14 2014-05-27 Lookout, Inc. Mobile device DNS optimization
US8788881B2 (en) 2011-08-17 2014-07-22 Lookout, Inc. System and method for mobile device push communications
US10181118B2 (en) 2011-08-17 2019-01-15 Lookout, Inc. Mobile communications device payment method utilizing location information
US9143910B2 (en) 2011-09-30 2015-09-22 Blackberry Limited Method and system for remote wipe through voice mail
EP2575384A1 (en) * 2011-09-30 2013-04-03 Research In Motion Limited System and method for remote wipe through voice mail
US9544759B2 (en) 2011-11-01 2017-01-10 Google Inc. Systems, methods, and computer program products for managing states
US10114976B2 (en) 2011-11-01 2018-10-30 Google Llc Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
US9928382B2 (en) 2011-11-01 2018-03-27 Google Llc Systems, methods, and computer program products for managing secure elements
US9652628B2 (en) 2011-11-01 2017-05-16 Google Inc. Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
US9215074B2 (en) 2012-06-05 2015-12-15 Lookout, Inc. Expressing intent to control behavior of application components
US10419222B2 (en) 2012-06-05 2019-09-17 Lookout, Inc. Monitoring for fraudulent or harmful behavior in applications being installed on user devices
US9940454B2 (en) 2012-06-05 2018-04-10 Lookout, Inc. Determining source of side-loaded software using signature of authorship
US9992025B2 (en) 2012-06-05 2018-06-05 Lookout, Inc. Monitoring installed applications on user devices
US9407443B2 (en) 2012-06-05 2016-08-02 Lookout, Inc. Component analysis of software applications on computing devices
US10256979B2 (en) 2012-06-05 2019-04-09 Lookout, Inc. Assessing application authenticity and performing an action in response to an evaluation result
US11336458B2 (en) 2012-06-05 2022-05-17 Lookout, Inc. Evaluating authenticity of applications based on assessing user device context for increased security
US9589129B2 (en) 2012-06-05 2017-03-07 Lookout, Inc. Determining source of side-loaded software
KR101709417B1 (en) * 2012-06-20 2017-02-22 후아웨이 테크놀러지 컴퍼니 리미티드 Security mode for mobile communications devices
US8756669B2 (en) * 2012-06-20 2014-06-17 Futurewei Technologies, Inc. Security mode for mobile communications devices
KR20150024388A (en) * 2012-06-20 2015-03-06 후아웨이 테크놀러지 컴퍼니 리미티드 Security mode for mobile communications devices
US10949819B2 (en) 2012-07-31 2021-03-16 Google Llc Managing devices associated with a digital wallet account
US10127533B2 (en) * 2012-07-31 2018-11-13 Google Llc Managing devices associated with a digital wallet account
US20140040126A1 (en) * 2012-07-31 2014-02-06 Google Inc. Managing devices associated with a digital wallet account
US9479571B2 (en) 2012-09-18 2016-10-25 Google Inc. Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
US11601273B2 (en) 2012-09-18 2023-03-07 Google Llc Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
US10057773B2 (en) 2012-09-18 2018-08-21 Google Llc Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
US10924279B2 (en) 2012-09-18 2021-02-16 Google Llc Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
US8655307B1 (en) 2012-10-26 2014-02-18 Lookout, Inc. System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security
US9769749B2 (en) 2012-10-26 2017-09-19 Lookout, Inc. Modifying mobile device settings for resource conservation
US9408143B2 (en) 2012-10-26 2016-08-02 Lookout, Inc. System and method for using context models to control operation of a mobile communications device
KR102244465B1 (en) * 2012-11-27 2021-04-26 아이데미아 프랑스 Electronic assembly comprising a disabling module
US20160162687A1 (en) * 2012-11-27 2016-06-09 Oberthur Technologies Electronic assembly comprising a disabling module
US9817972B2 (en) * 2012-11-27 2017-11-14 Oberthur Technologies Electronic assembly comprising a disabling module
EP2735969A1 (en) * 2012-11-27 2014-05-28 Oberthur Technologies Electronic assembly including a deactivation module
KR20140067940A (en) * 2012-11-27 2014-06-05 오베르뛰르 테크놀로지스 Electronic assembly comprising a disabling module
FR2998689A1 (en) * 2012-11-27 2014-05-30 Oberthur Technologies ELECTRONIC ASSEMBLY COMPRISING A DEACTIVATION MODULE
US9208215B2 (en) 2012-12-27 2015-12-08 Lookout, Inc. User classification based on data gathered from a computing device
US9374369B2 (en) 2012-12-28 2016-06-21 Lookout, Inc. Multi-factor authentication and comprehensive login system for client-server networks
US8855599B2 (en) 2012-12-31 2014-10-07 Lookout, Inc. Method and apparatus for auxiliary communications with mobile communications device
US9424409B2 (en) 2013-01-10 2016-08-23 Lookout, Inc. Method and system for protecting privacy and enhancing security on an electronic device
US9852416B2 (en) 2013-03-14 2017-12-26 Lookout, Inc. System and method for authorizing a payment transaction
US10699273B2 (en) 2013-03-14 2020-06-30 Lookout, Inc. System and method for authorizing payment transaction based on device locations
US9307412B2 (en) 2013-04-24 2016-04-05 Lookout, Inc. Method and system for evaluating security for an interactive service operation by a mobile device
US10990696B2 (en) 2013-10-25 2021-04-27 Lookout, Inc. Methods and systems for detecting attempts to access personal information on mobile communications devices
US10452862B2 (en) 2013-10-25 2019-10-22 Lookout, Inc. System and method for creating a policy for managing personal data on a mobile communications device
US9642008B2 (en) 2013-10-25 2017-05-02 Lookout, Inc. System and method for creating and assigning a policy for a mobile communications device based on personal data
US10122747B2 (en) 2013-12-06 2018-11-06 Lookout, Inc. Response generation after distributed monitoring and evaluation of multiple devices
US10742676B2 (en) 2013-12-06 2020-08-11 Lookout, Inc. Distributed monitoring and evaluation of multiple devices
US9753796B2 (en) 2013-12-06 2017-09-05 Lookout, Inc. Distributed monitoring, evaluation, and response for multiple devices
US20170171741A1 (en) * 2014-02-07 2017-06-15 Driving Management Systems, Inc. Remote disabling of a mobile device
US10120696B2 (en) * 2015-03-19 2018-11-06 Sony Corporation Method and device for controlling usability of a communication device
US20160274920A1 (en) * 2015-03-19 2016-09-22 Sony Corporation Method and device for integrated usability control
US10540494B2 (en) 2015-05-01 2020-01-21 Lookout, Inc. Determining source of side-loaded software using an administrator server
US11259183B2 (en) 2015-05-01 2022-02-22 Lookout, Inc. Determining a security state designation for a computing device based on a source of software
US10440053B2 (en) 2016-05-31 2019-10-08 Lookout, Inc. Methods and systems for detecting and preventing network connection compromise
US11683340B2 (en) 2016-05-31 2023-06-20 Lookout, Inc. Methods and systems for preventing a false report of a compromised network connection
US10366582B2 (en) 2016-06-21 2019-07-30 Bank Of America Corporation Devices and systems for detecting unauthorized communication of data from a magnetic stripe device or embedded smart chip device
US9681471B1 (en) 2016-08-31 2017-06-13 Bank Of America Corporation Pairing of devices for activation/deactivation of a paired device
US10218697B2 (en) 2017-06-09 2019-02-26 Lookout, Inc. Use of device risk evaluation to manage access to services
US11038876B2 (en) 2017-06-09 2021-06-15 Lookout, Inc. Managing access to services based on fingerprint matching
US10812537B1 (en) * 2018-07-23 2020-10-20 Amazon Technologies, Inc. Using network locality to automatically trigger arbitrary workflows

Also Published As

Publication number Publication date
US20080233919A1 (en) 2008-09-25
KR20060122966A (en) 2006-11-30
CN1947447A (en) 2007-04-11
US20150181434A1 (en) 2015-06-25
US9794787B2 (en) 2017-10-17
EP1719368A1 (en) 2006-11-08
US8995958B2 (en) 2015-03-31
WO2005084052A1 (en) 2005-09-09
KR20080045296A (en) 2008-05-22

Similar Documents

Publication Publication Date Title
US9794787B2 (en) System and method for limiting mobile device functionality
US10681552B2 (en) Method for mitigating the unauthorized use of a device
US9881152B2 (en) System for monitoring the unauthorized use of a device
US8932368B2 (en) Method for monitoring the unauthorized use of a device
US8248237B2 (en) System for mitigating the unauthorized use of a device
US9031536B2 (en) Method for mitigating the unauthorized use of a device
US20130091564A1 (en) Systems and methods for mitigating the unauthorized use of a device
US20130137376A1 (en) Systems and methods for recovering low power devices
EP1609043B1 (en) Apparatus for authorising access to an electronic device
US20090251318A1 (en) Anti-theft system of mobile device
CN105893826B (en) Message display method based on finger print information and intelligent terminal
US20060281450A1 (en) Methods and apparatuses for safeguarding data
EP2780900B1 (en) Systems and methods for recovering low power devices
CN106897639B (en) Mobile terminal and security verification method and device thereof
WO2014027242A1 (en) Systems and methods for mitigating the unauthorized use of a device
KR101078669B1 (en) Event management system and method of portable terminal based on location information
JP2006163847A (en) Information processing system and information terminal constituting it
CN111027092A (en) Terminal privacy protection method, terminal and computer storage medium
JP2009099128A (en) Portable terminal and portable terminal management system

Legal Events

Date Code Title Description
AS Assignment

Owner name: NOKIA CORPORATION, FINLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KENNEY, TOM;REEL/FRAME:015012/0878

Effective date: 20040130

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION