IE20020799A1 - A system and method of protecting and preventing the theft of mobile communication devices - Google Patents
A system and method of protecting and preventing the theft of mobile communication devicesInfo
- Publication number
- IE20020799A1 IE20020799A1 IE20020799A IE20020799A IE20020799A1 IE 20020799 A1 IE20020799 A1 IE 20020799A1 IE 20020799 A IE20020799 A IE 20020799A IE 20020799 A IE20020799 A IE 20020799A IE 20020799 A1 IE20020799 A1 IE 20020799A1
- Authority
- IE
- Ireland
- Prior art keywords
- mobile phone
- owner
- theft device
- message
- display
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract description 7
- 238000010295 mobile communication Methods 0.000 title abstract description 4
- 230000004913 activation Effects 0.000 abstract description 12
- 238000004891 communication Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000001681 protective effect Effects 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 230000003213 activating effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A mobile communications device such as a mobile phone, personal organiser or computer according to the invention has special security protection which when activated prevents the use of the device and also displays a message that the device has been lost or stolen and belongs to a certain person. More particular to this invention is the method of activation of the protection device. There are two methods of activation and are classed as remote or local. A local activation occurs where the thief accidentally triggers the device by switching off the device while trying to change SIM card. A remote activation is performed by the user once the mobile device is considered to be lost or stolen. A remote activation can also be performed by the host network at the request of the owner providing the owner has correct stored number in the security memory level of the mobile phone.
Description
A SYSTEM AND METHOD OF PROTECTING AND PREVENTING THE THEFT OF MOBILE COMMUNICATION DEVICES.
DESCRIPTION.
FIELD OF THE INVENTION.
This invention relates to a mobile communication device such as a mobile phone with anti-theft electronic protection circuitry, and in particular to the methods of activation and means of alerting that the device was lost or stolen.
BACKGROUND OF THE INVENTION.
Statistics have shown that one in every three mobile phones are either lost or stolen. To date, there are only a few methods to prevent a thief from stealing a mobile phone. The first being a mobile phone has password protection within the pin number but this is easily overcome if the thief purchases a new SIM card or does not switch off the device.
The second is that the user notifies the operator that the mobile has been lost and the operator sends a special code to the device to render it useless. The short comings in this case are that the owner must remember the host operator number and the phone must be on when the transmission is taking place.
So, some users insure their phone against theft and loss but this costs a considerable amount over a yearly period. This does not deter the thief from stealing the device in the first place, nor does it help if the phone is just lost by the user. What is needed is a security protection device which renders the phone useless whether it be lost or stolen. This protective device should be deliberately triggered by the owner or accidentally triggered by the thief. Once it is activated a message should appear on the display that the phone has been lost or stolen and should be returned to the owner, or handed in to the nearest police station. A thief would not like to be caught with a mobile phone with this message on the display and would not be able to pass it on to his associates in crime. —-------— -
OPEN TO PUBL'C INSPECTION UNDER SECTION 28 AND RM£23
IE Ο 2 07 β 9
2.
A SUMMARY OF THE INVENTION.
An object of this invention is to propose a solution to the above problems and for recovery of lost or stolen mobile devices. The object is achieved according to invention by means of an inbuilt electronic security device which can be activated remotely by the user (or host mobile phone network) or locally by monitoring loss of power.
The object of the invention is to render the device useless should it be lost or stolen.
Another object of the invention is to display a message that the phone was stolen and the message remains on the display while there is power on the device.
Accordingly there is provided a system of monitoring incoming calls and compares the number to the stored secure number thus activating the security protective device should they match.
As another aspect of the invention the security device is activated when power is lost thus the thief can change the SIM card but the device will not function when he powers up again.
Another aspect of the invention is that the owner or the host net work (at the owner’s request) can activate the security device.
An object of the invention is for the safe return of the device should it be lost or stolen thus the name and address may be entered as part of the message.
As another aspect of the invention the mobile device may display that the device was lost and should be returned to a given address, after a certain time the message of the display will automatically change to display that the phone was stolen.
The invention also includes a subsystem, which secures the stored telephone number and is only accessible by the real owner.
As another aspect of the invention the display will only show the preselected message once in the locked up mode and cannot be changed until the owner enters the proper override code.
IE Ο 2 07 9 9
3.
Another aspect of the invention is that the owner can have as many activation numbers stored in the security level as he/she wishes.
As another aspect of the invention is that the owner can create the message to be displayed.
BRIEF DESCRIPTION OF THE DRAWINGS.
The accompanying drawings which are included are to provide further understanding of the invention. Understanding that these drawings depict only typical embodiments of the invention and are not to be considered to be limiting of its scope.
Fig 1 Illustrates a mobile phone communication device activated into security mode by the owner.
Fig 2 Illustrates an alternative method of activation where the host network is requested by the owner to call his lost/stolen mobile.
Fig 3 Shows in block diagram how the device responds to incoming calls.
Fig 4 Illustrates the operations and password codes required by the user to retain use of the mobile from the switch on position. (BIS means built in security)
FIG 5 Illustrates how incoming calls are monitored. It also shows that the display can be personalised by the owner.
IE 0 2 07 9 9
4.
A DETAILED DESCRIPTION OF A PREFERRED
EMBODIMENT OF THE INVENTION.
In a preferred embodiment, the present invention is contained within a mobile phone 100.
FIG 1. illustrates that the owner can call from a land line or any other phone 101 which he has stored as the activation number for the said device. Once the security device matches the incoming call number 102 the “Built in Security” device locks the message on the display 103 to show that it was stolen.
As an added feature of the said invention FIG 2 shows that the security device can also be activated by the host network at the request of the owner. Once the mobile is considered lost or stolen the owner contacts the host network to request that the mobile be activated into security mode. The owner calls from his home phone 101 to the host network 104. They in turn phone the mobile in question 100 via a communication link and antenna 105 and as the number 106 is also stored in the mobile this also activates the security device.
FIG 3. Represents what actually happens within the mobile phone receives an incoming call. Once the signal is received 302 and identified it is compared 303 to the stored security phone number. A check is done to see if they match 304, if not, the call can continue 305. If the phone numbers do match then this activates the “built in security” device 306. The B.I.S. can have many security features but most of all the display locks up and displays that the phone was stolen. This message remains on the display and cannot be erased until reset by the owner. Another important feature which should be incorporated is that the antenna be disconnected while activated.
FIG 4 Illustrates the operations required of the legitimate owner and the password codes required to gain access to all levels. Most importantly it shows that the device most lightly will be powered on when the thief takes the mobile and so has limited access. In the power off mode the security device is activated 402. When the power is turned on 403 there is only access to the keys so that the user can enter the proper password 404. A check is done for the codes and if they are not correct the security B.I.S function is activated again. If the password was correct then the user has access to all functions 406 except the B.I.S. level. This B.I.S level 410 contains the security activation phone numbers and the message to be displayed when activated, thus it
IE Ο 2 07 9 9
.
requires a password too 408. For the convenience of the owner it may be the same password as at other levels but for security reasons it may be a different code. As already mentioned it is assumed that the thief will take the device while power is on thus he has no access to the Security level and cannot interfere with any information contained within. Once again the security device is activated 407 if the thief enters the wrong code.
FIG 5 Shows the generalised set up of component parts within the mobile relating to the security device (B.I.S) 503. An incoming call 501 has it’s number assigned to a number register and this registered number is compared by the comparator 504 with the stored number 506. If the numbers are the same the stored message 507 is send to the display by the activation switching circuit 505. This activation circuit disables the antenna also so no calls can be received or sent by the thief.
The message 507 can be written by the user to make it a more personal feature on the display as it may offend the finder of a mobile phone if it has a stolen message on the display.
Claims (11)
1. A mobile phone handset comprising of an anti-theft security device which stores a plurality of phone numbers, has the capability to monitor all incoming phone call numbers and if they match any of the stored numbers it renders the mobile unusable and locks the display to read that the mobile phone was stolen.
2. A mobile phone handset of claim 1 wherein the anti-theft device can be activated from a remote location by the owner.
3. A mobile phone handset of claim 1 wherein the anti-theft device can also be activated from a remote location by the host network (using a different telephone number) at the request of the owner.
4. A mobile phone handset of claim 1 wherein the anti-theft device can be reset by the owner with the proper password once the phone has been returned.
5. A mobile phone handset of claim 1 wherein the anti-theft device can activate a message on the display that the phone has been lost or stolen and should be returned to the user.
6. A mobile phone handset of claim 1 wherein the anti-theft device can be activated once the power is turned off or when the battery has run down.
7. A mobile phone handset of claim 1 wherein the anti-theft device remains activated when power is returned.
8. A mobile phone handset of claim 5 where the display can automatically change from a “lost” message to “stolen” message after a given time.
9. A mobile phone handset of claim 1 wherein the anti-theft device can render the phone useless by disconnecting the antenna and by locking the display.
10. A mobile phone handset of claim 1 wherein the anti-theft device will activate by recognising one or more telephone numbers which are stored for comparison within the mobile phone memory by the owner. IE ο 2 Ο 7 9 9 7.
11. A mobile phone handset of claim 1 wherein the anti-theft device message can be written by the owner to display a more personalised message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IE20020799A IE20020799A1 (en) | 2002-10-07 | 2002-10-07 | A system and method of protecting and preventing the theft of mobile communication devices |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IE20020799A IE20020799A1 (en) | 2002-10-07 | 2002-10-07 | A system and method of protecting and preventing the theft of mobile communication devices |
Publications (1)
Publication Number | Publication Date |
---|---|
IE20020799A1 true IE20020799A1 (en) | 2004-04-07 |
Family
ID=32051173
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IE20020799A IE20020799A1 (en) | 2002-10-07 | 2002-10-07 | A system and method of protecting and preventing the theft of mobile communication devices |
Country Status (1)
Country | Link |
---|---|
IE (1) | IE20020799A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1670270A1 (en) * | 2004-12-13 | 2006-06-14 | Nederlandse Organisatie voor toegepast-natuurwetenschappelijk Onderzoek TNO | Method and means for controlling a mobile terminal |
-
2002
- 2002-10-07 IE IE20020799A patent/IE20020799A1/en not_active Application Discontinuation
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1670270A1 (en) * | 2004-12-13 | 2006-06-14 | Nederlandse Organisatie voor toegepast-natuurwetenschappelijk Onderzoek TNO | Method and means for controlling a mobile terminal |
WO2006065115A1 (en) * | 2004-12-13 | 2006-06-22 | Nederlandse Organisatie Voor Toegepast Natuurwetenschappelijk Onderzoek Tno | Method and means for controlling a mobile terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11917397B2 (en) | Method and apparatus for protecting data in a portable electronic device | |
US6836654B2 (en) | Anti-theft protection for a radiotelephony device | |
US6480096B1 (en) | Method and apparatus for theft deterrence and secure data retrieval in a communication device | |
US9241058B2 (en) | Mobile communication apparatus having anti-theft and auto-notification functions | |
JP4820066B2 (en) | Mobile communication terminal incorporating camera, system for retrieving the same, and method thereof | |
US20060276172A1 (en) | Mobile apparatus with remote lock and control function | |
US20130137376A1 (en) | Systems and methods for recovering low power devices | |
RU2276474C2 (en) | Method for protecting cell phones from stealing, device and plant for realization of said method | |
JP2002077372A (en) | Method and apparatus of controlling and protecting portable telephone from being lost, stolen or abused | |
CN202617350U (en) | Mobile phone safety management and control system | |
WO2006105552A2 (en) | Device for protecting data in laptop computers in case of their loss or theft | |
EP1220556A1 (en) | Remote disabling of a mobile phone device | |
EP2780900B1 (en) | Systems and methods for recovering low power devices | |
JP2003264631A (en) | Security method for sim card information | |
EP1473952B1 (en) | Mobile apparatus with remote lock and control function | |
IE20020799A1 (en) | A system and method of protecting and preventing the theft of mobile communication devices | |
US20040230823A1 (en) | Method and apparatus to eliminate theft of electronic equipment using existing telephone jack | |
KR100944246B1 (en) | Security Management System and Method using Mobile Communication Terminal with Universal Subscriber Identity Module | |
CN1060006C (en) | Anti-theft method for the number code of mobile telephone | |
CN100571436C (en) | A kind of implementation method of mobile terminal information resource safety guarantee | |
CN111050236B (en) | Electronic equipment anti-theft method, device and system, electronic equipment and storage medium | |
CN102069773A (en) | Anti-theft device in vehicle-mounted audio-visual system | |
JP2002369251A (en) | Portable terminal equipment with unauthorized operation preventing function, and unauthorized operation preventing system for the portable terminal equipment | |
JP2001297315A (en) | Ic card, portable electronic terminal and countermeasure system for illegal use thereof | |
JP4030338B2 (en) | Communication terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FC9A | Application refused sect. 31(1) |