[go: up one dir, main page]

IE20020799A1 - A system and method of protecting and preventing the theft of mobile communication devices - Google Patents

A system and method of protecting and preventing the theft of mobile communication devices

Info

Publication number
IE20020799A1
IE20020799A1 IE20020799A IE20020799A IE20020799A1 IE 20020799 A1 IE20020799 A1 IE 20020799A1 IE 20020799 A IE20020799 A IE 20020799A IE 20020799 A IE20020799 A IE 20020799A IE 20020799 A1 IE20020799 A1 IE 20020799A1
Authority
IE
Ireland
Prior art keywords
mobile phone
owner
theft device
message
display
Prior art date
Application number
IE20020799A
Inventor
Fintan Kelly
Original Assignee
Fintan Kelly
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fintan Kelly filed Critical Fintan Kelly
Priority to IE20020799A priority Critical patent/IE20020799A1/en
Publication of IE20020799A1 publication Critical patent/IE20020799A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A mobile communications device such as a mobile phone, personal organiser or computer according to the invention has special security protection which when activated prevents the use of the device and also displays a message that the device has been lost or stolen and belongs to a certain person. More particular to this invention is the method of activation of the protection device. There are two methods of activation and are classed as remote or local. A local activation occurs where the thief accidentally triggers the device by switching off the device while trying to change SIM card. A remote activation is performed by the user once the mobile device is considered to be lost or stolen. A remote activation can also be performed by the host network at the request of the owner providing the owner has correct stored number in the security memory level of the mobile phone.

Description

A SYSTEM AND METHOD OF PROTECTING AND PREVENTING THE THEFT OF MOBILE COMMUNICATION DEVICES.
DESCRIPTION.
FIELD OF THE INVENTION.
This invention relates to a mobile communication device such as a mobile phone with anti-theft electronic protection circuitry, and in particular to the methods of activation and means of alerting that the device was lost or stolen.
BACKGROUND OF THE INVENTION.
Statistics have shown that one in every three mobile phones are either lost or stolen. To date, there are only a few methods to prevent a thief from stealing a mobile phone. The first being a mobile phone has password protection within the pin number but this is easily overcome if the thief purchases a new SIM card or does not switch off the device.
The second is that the user notifies the operator that the mobile has been lost and the operator sends a special code to the device to render it useless. The short comings in this case are that the owner must remember the host operator number and the phone must be on when the transmission is taking place.
So, some users insure their phone against theft and loss but this costs a considerable amount over a yearly period. This does not deter the thief from stealing the device in the first place, nor does it help if the phone is just lost by the user. What is needed is a security protection device which renders the phone useless whether it be lost or stolen. This protective device should be deliberately triggered by the owner or accidentally triggered by the thief. Once it is activated a message should appear on the display that the phone has been lost or stolen and should be returned to the owner, or handed in to the nearest police station. A thief would not like to be caught with a mobile phone with this message on the display and would not be able to pass it on to his associates in crime. —-------— - OPEN TO PUBL'C INSPECTION UNDER SECTION 28 AND RM£23 IE Ο 2 07 β 9 2.
A SUMMARY OF THE INVENTION.
An object of this invention is to propose a solution to the above problems and for recovery of lost or stolen mobile devices. The object is achieved according to invention by means of an inbuilt electronic security device which can be activated remotely by the user (or host mobile phone network) or locally by monitoring loss of power.
The object of the invention is to render the device useless should it be lost or stolen.
Another object of the invention is to display a message that the phone was stolen and the message remains on the display while there is power on the device.
Accordingly there is provided a system of monitoring incoming calls and compares the number to the stored secure number thus activating the security protective device should they match.
As another aspect of the invention the security device is activated when power is lost thus the thief can change the SIM card but the device will not function when he powers up again.
Another aspect of the invention is that the owner or the host net work (at the owner’s request) can activate the security device.
An object of the invention is for the safe return of the device should it be lost or stolen thus the name and address may be entered as part of the message.
As another aspect of the invention the mobile device may display that the device was lost and should be returned to a given address, after a certain time the message of the display will automatically change to display that the phone was stolen.
The invention also includes a subsystem, which secures the stored telephone number and is only accessible by the real owner.
As another aspect of the invention the display will only show the preselected message once in the locked up mode and cannot be changed until the owner enters the proper override code.
IE Ο 2 07 9 9 3.
Another aspect of the invention is that the owner can have as many activation numbers stored in the security level as he/she wishes.
As another aspect of the invention is that the owner can create the message to be displayed.
BRIEF DESCRIPTION OF THE DRAWINGS.
The accompanying drawings which are included are to provide further understanding of the invention. Understanding that these drawings depict only typical embodiments of the invention and are not to be considered to be limiting of its scope.
Fig 1 Illustrates a mobile phone communication device activated into security mode by the owner.
Fig 2 Illustrates an alternative method of activation where the host network is requested by the owner to call his lost/stolen mobile.
Fig 3 Shows in block diagram how the device responds to incoming calls.
Fig 4 Illustrates the operations and password codes required by the user to retain use of the mobile from the switch on position. (BIS means built in security) FIG 5 Illustrates how incoming calls are monitored. It also shows that the display can be personalised by the owner.
IE 0 2 07 9 9 4.
A DETAILED DESCRIPTION OF A PREFERRED EMBODIMENT OF THE INVENTION.
In a preferred embodiment, the present invention is contained within a mobile phone 100.
FIG 1. illustrates that the owner can call from a land line or any other phone 101 which he has stored as the activation number for the said device. Once the security device matches the incoming call number 102 the “Built in Security” device locks the message on the display 103 to show that it was stolen.
As an added feature of the said invention FIG 2 shows that the security device can also be activated by the host network at the request of the owner. Once the mobile is considered lost or stolen the owner contacts the host network to request that the mobile be activated into security mode. The owner calls from his home phone 101 to the host network 104. They in turn phone the mobile in question 100 via a communication link and antenna 105 and as the number 106 is also stored in the mobile this also activates the security device.
FIG 3. Represents what actually happens within the mobile phone receives an incoming call. Once the signal is received 302 and identified it is compared 303 to the stored security phone number. A check is done to see if they match 304, if not, the call can continue 305. If the phone numbers do match then this activates the “built in security” device 306. The B.I.S. can have many security features but most of all the display locks up and displays that the phone was stolen. This message remains on the display and cannot be erased until reset by the owner. Another important feature which should be incorporated is that the antenna be disconnected while activated.
FIG 4 Illustrates the operations required of the legitimate owner and the password codes required to gain access to all levels. Most importantly it shows that the device most lightly will be powered on when the thief takes the mobile and so has limited access. In the power off mode the security device is activated 402. When the power is turned on 403 there is only access to the keys so that the user can enter the proper password 404. A check is done for the codes and if they are not correct the security B.I.S function is activated again. If the password was correct then the user has access to all functions 406 except the B.I.S. level. This B.I.S level 410 contains the security activation phone numbers and the message to be displayed when activated, thus it IE Ο 2 07 9 9 . requires a password too 408. For the convenience of the owner it may be the same password as at other levels but for security reasons it may be a different code. As already mentioned it is assumed that the thief will take the device while power is on thus he has no access to the Security level and cannot interfere with any information contained within. Once again the security device is activated 407 if the thief enters the wrong code.
FIG 5 Shows the generalised set up of component parts within the mobile relating to the security device (B.I.S) 503. An incoming call 501 has it’s number assigned to a number register and this registered number is compared by the comparator 504 with the stored number 506. If the numbers are the same the stored message 507 is send to the display by the activation switching circuit 505. This activation circuit disables the antenna also so no calls can be received or sent by the thief.
The message 507 can be written by the user to make it a more personal feature on the display as it may offend the finder of a mobile phone if it has a stolen message on the display.

Claims (11)

CLAIMS. What is claimed is,
1. A mobile phone handset comprising of an anti-theft security device which stores a plurality of phone numbers, has the capability to monitor all incoming phone call numbers and if they match any of the stored numbers it renders the mobile unusable and locks the display to read that the mobile phone was stolen.
2. A mobile phone handset of claim 1 wherein the anti-theft device can be activated from a remote location by the owner.
3. A mobile phone handset of claim 1 wherein the anti-theft device can also be activated from a remote location by the host network (using a different telephone number) at the request of the owner.
4. A mobile phone handset of claim 1 wherein the anti-theft device can be reset by the owner with the proper password once the phone has been returned.
5. A mobile phone handset of claim 1 wherein the anti-theft device can activate a message on the display that the phone has been lost or stolen and should be returned to the user.
6. A mobile phone handset of claim 1 wherein the anti-theft device can be activated once the power is turned off or when the battery has run down.
7. A mobile phone handset of claim 1 wherein the anti-theft device remains activated when power is returned.
8. A mobile phone handset of claim 5 where the display can automatically change from a “lost” message to “stolen” message after a given time.
9. A mobile phone handset of claim 1 wherein the anti-theft device can render the phone useless by disconnecting the antenna and by locking the display.
10. A mobile phone handset of claim 1 wherein the anti-theft device will activate by recognising one or more telephone numbers which are stored for comparison within the mobile phone memory by the owner. IE ο 2 Ο 7 9 9 7.
11. A mobile phone handset of claim 1 wherein the anti-theft device message can be written by the owner to display a more personalised message.
IE20020799A 2002-10-07 2002-10-07 A system and method of protecting and preventing the theft of mobile communication devices IE20020799A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
IE20020799A IE20020799A1 (en) 2002-10-07 2002-10-07 A system and method of protecting and preventing the theft of mobile communication devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IE20020799A IE20020799A1 (en) 2002-10-07 2002-10-07 A system and method of protecting and preventing the theft of mobile communication devices

Publications (1)

Publication Number Publication Date
IE20020799A1 true IE20020799A1 (en) 2004-04-07

Family

ID=32051173

Family Applications (1)

Application Number Title Priority Date Filing Date
IE20020799A IE20020799A1 (en) 2002-10-07 2002-10-07 A system and method of protecting and preventing the theft of mobile communication devices

Country Status (1)

Country Link
IE (1) IE20020799A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1670270A1 (en) * 2004-12-13 2006-06-14 Nederlandse Organisatie voor toegepast-natuurwetenschappelijk Onderzoek TNO Method and means for controlling a mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1670270A1 (en) * 2004-12-13 2006-06-14 Nederlandse Organisatie voor toegepast-natuurwetenschappelijk Onderzoek TNO Method and means for controlling a mobile terminal
WO2006065115A1 (en) * 2004-12-13 2006-06-22 Nederlandse Organisatie Voor Toegepast Natuurwetenschappelijk Onderzoek Tno Method and means for controlling a mobile terminal

Similar Documents

Publication Publication Date Title
US11917397B2 (en) Method and apparatus for protecting data in a portable electronic device
US6836654B2 (en) Anti-theft protection for a radiotelephony device
US6480096B1 (en) Method and apparatus for theft deterrence and secure data retrieval in a communication device
US9241058B2 (en) Mobile communication apparatus having anti-theft and auto-notification functions
JP4820066B2 (en) Mobile communication terminal incorporating camera, system for retrieving the same, and method thereof
US20060276172A1 (en) Mobile apparatus with remote lock and control function
US20130137376A1 (en) Systems and methods for recovering low power devices
RU2276474C2 (en) Method for protecting cell phones from stealing, device and plant for realization of said method
JP2002077372A (en) Method and apparatus of controlling and protecting portable telephone from being lost, stolen or abused
CN202617350U (en) Mobile phone safety management and control system
WO2006105552A2 (en) Device for protecting data in laptop computers in case of their loss or theft
EP1220556A1 (en) Remote disabling of a mobile phone device
EP2780900B1 (en) Systems and methods for recovering low power devices
JP2003264631A (en) Security method for sim card information
EP1473952B1 (en) Mobile apparatus with remote lock and control function
IE20020799A1 (en) A system and method of protecting and preventing the theft of mobile communication devices
US20040230823A1 (en) Method and apparatus to eliminate theft of electronic equipment using existing telephone jack
KR100944246B1 (en) Security Management System and Method using Mobile Communication Terminal with Universal Subscriber Identity Module
CN1060006C (en) Anti-theft method for the number code of mobile telephone
CN100571436C (en) A kind of implementation method of mobile terminal information resource safety guarantee
CN111050236B (en) Electronic equipment anti-theft method, device and system, electronic equipment and storage medium
CN102069773A (en) Anti-theft device in vehicle-mounted audio-visual system
JP2002369251A (en) Portable terminal equipment with unauthorized operation preventing function, and unauthorized operation preventing system for the portable terminal equipment
JP2001297315A (en) Ic card, portable electronic terminal and countermeasure system for illegal use thereof
JP4030338B2 (en) Communication terminal

Legal Events

Date Code Title Description
FC9A Application refused sect. 31(1)