WO2017111962A1 - System and method for securing electronic device during low power and following hardware change - Google Patents
System and method for securing electronic device during low power and following hardware change Download PDFInfo
- Publication number
- WO2017111962A1 WO2017111962A1 PCT/US2015/067500 US2015067500W WO2017111962A1 WO 2017111962 A1 WO2017111962 A1 WO 2017111962A1 US 2015067500 W US2015067500 W US 2015067500W WO 2017111962 A1 WO2017111962 A1 WO 2017111962A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic device
- location
- message
- server
- charge
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power management, i.e. event-based initiation of a power-saving mode
- G06F1/3206—Monitoring of events, devices or parameters that trigger a change in power modality
- G06F1/3212—Monitoring battery levels, e.g. power saving mode being initiated when battery voltage goes below a certain level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0251—Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0261—Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
- H04M1/673—Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72457—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Definitions
- TITLE SYSTEM AND METHOD FOR SECURING ELECTRONIC DEVICE DURING LOW POWER AND FOLLOWING HARDWARE CHANGE
- the technology of the present disclosure relates generally to electronic devices and, more particularly, to a system and method for improving the ability to find a lost electronic device as well as improving the security of the device in certain situations.
- the disclosed operations may make the electronic device less attractive to being stolen.
- Some mobile electronic devices have location discovery tools to facilitate finding the device if lost or stolen.
- Exemplary tools of this nature are "Find my iPhone” by Apple and “Find my Xperia” by Sony. These types of tools can be very effective, but rely on relatively power intensive processes. Once the battery is drained, the location discovery tool and other operations of the device will no longer be available.
- a method of tracking location of an electronic device includes detecting a condition for which long term location tracking functions of the electronic device are preprogrammed in the electronic device; locking the electronic device, the locking of the electronic device restricting access to one or more user functions of the electronic device available to the user in an unlocked state; and transmitting a message by narrow band ( B) long term evolution (LTE), the message for relay by one or more receiving devices to a server that identifies the location of the electronic device and the message containing an identifier value for the electronic device.
- B narrow band
- LTE long term evolution
- the condition is remaining charge of a battery that powers the electronic device is below a predetermined amount of charge.
- the predetermined amount of charge is a charge amount that is less than five percent.
- the condition is removal or replacement of a subscriber identity module (SIM) card associated with the electronic device.
- SIM subscriber identity module
- the message includes a location value corresponding to a location of the electronic device determined by the electronic device.
- the location value is determined before the locking of the electronic device.
- the location value is updated upon determination of at least one of movement of the electronic device, receipt of a message from the server to update the location value, or upon a time trigger preprogrammed in the electronic device.
- the method further includes unlocking the electronic device if a security challenge is met.
- the transmitting of the message is repeated on a periodic basis or according to a predetermined schedule.
- the identifier value is a value obtained from a SIM card associated with the electronic device.
- an electronic device includes communication circuitry and control circuitry configured to execute long term location tracking functions embodied in executable logic, the executable logic includes logic to: detect a condition that triggers the long term location tracking functions; lock the electronic device to restrict access to one or more user functions of the electronic device available to the user in an unlocked state; and transmit a message by narrow band ( B) long term evolution (LTE) via the communication circuitry, the message for relay by one or more receiving devices to a server that identifies the location of the electronic device and the message containing an identifier value for the electronic device.
- B narrow band
- LTE long term evolution
- the condition is remaining charge of a battery that powers the electronic device is below a predetermined amount of charge.
- the predetermined amount of charge is a charge amount that is less than five percent.
- the condition is removal or replacement of a subscriber identity module (SIM) card associated with the electronic device.
- SIM subscriber identity module
- the message includes a location value corresponding to a location of the electronic device determined by the electronic device.
- the location value is determined before the locking of the electronic device.
- the location value is updated upon determination of at least one of movement of the electronic device, receipt of a message from the server to update the location value, or upon a time trigger preprogrammed in the electronic device.
- the executable logic further includes logic to unlock the electronic device if a security challenge is met.
- the transmitting of the message is repeated on a periodic basis or according to a predetermined schedule.
- the identifier value is a value obtained from a SIM card associated with the electronic device.
- FIG. 1 is a schematic diagram of an operational environment for an electronic device.
- FIG. 2 is a schematic diagram of the electronic device.
- FIG. 3 is a flow-diagram of a power management operation for the electronic device.
- FIG. 4 is a flow-diagram of a security operation for hardware changes of the electronic device.
- inventions of systems and methods for improving the security of an electronic device and prolonging the time during which location of a lost electronic device may be identified are primarily described in the context of a portable electronic device, such as smart phone or tablet computer. But the techniques may be applied in other contexts, such as other types of electronic devices, computers, gaming consoles, vehicles, appliances, shipping containers, and other valuable or commonly stolen items.
- the techniques involve entering a low power transmission mode to periodically transmit an identifier for the electronic device and, in some cases, a last known location value.
- the low power transmission mode may be a narrow-band (NB) long-term evolution (LTE) transmission technique sometimes employed for machine type communications and/or machine-to-machine (M2M) transmissions. These types of transmissions are sometimes referred to as Internet of Things (IoT) transmissions.
- NB LTE transmission is made using unlicensed spectrum and base stations that receive the transmission will process the transmission (e.g., relay the transmission) even if the transmitting device does not have a service agreement with the subscriber network associated with the base station. Under these operations, the electronic device may remain visible for very long periods of time without recharging.
- long-term location tracking of the electronic device by a server may be made, such as tracking for at least one day, at least one week, at least one month, or at least one year.
- the electronic device may enter the low power transmission mode when the electronic device has remaining battery charge under a predetermined threshold, such as about three percent to about five percent, or when a hardware change is made, such as replacement of a subscriber identity module (SIM) card.
- a security operation may be need to be satisfied. Therefore, since the electronic device may remain visible for an extended time after one of these events until a security operation is satisfied, the electronic device may be less attractive to being stolen.
- FIG. 1 is a schematic diagram of an exemplary system for implementing the disclosed techniques. It will be appreciated that the illustrated system is representative and other systems may be used to implement the disclosed techniques. Also, functions disclosed as being carried out by a single device, such as the disclosed server, may be carried out in a distributed manner across nodes of a computing environment.
- the system includes a server 10 that, at times, may be in operative communication with an electronic device 12 (also referred to as a user equipment or UE).
- the server 10 also may be in operative communication with other electronic devices (e.g., electronic device 14), with one or more subscriber networks and/or with one or more local networks.
- the subscriber networks are cellular networks operated by respective mobile telephone service providers.
- One of the illustrated subscriber networks is a home network 16 for the electronic device 12 that has at least one base station 18 (or other access point) in operative range from the electronic device 12.
- the other of the illustrated networks is a foreign network 20 relative to the electronic device 12 that has at least one base station 22 (or other access point) in operative range from the electronic device 12.
- the local network identified by reference numeral 24, is a wireless network such as a WiFi network that has at least one access point 26 (e.g., a router) in operative range from the electronic device 12.
- the subscriber networks 16, 20 and the local network 24 may communicate with the server 10 by way of a communications medium, such as the Internet 28 and/or one or more intermediate networks.
- the server 10 may be part of one of the subscriber networks 16, 20 or may be separate from the subscriber networks 16, 20.
- the electronic device 14 may detect NB transmissions from the electronic device 12.
- the NB transmissions may be relayed from the electronic device 14 to the server 10 via one of the networks 16, 20, 24 or another network or
- the electronic device 12 may be one of a variety of types of devices, such as a mobile phone, a tablet computer, a laptop computer, a desktop computer, a gaming device, etc.
- the server 10 and the electronic device 12 are configured to carry out the respective logical functions that are described herein. In addition to carrying out the operations described herein, the server 10 may carry out other support and service operations for the electronic device 12.
- the electronic device 12 includes a control circuit 30 that is responsible for overall operation of the electronic device 12, including controlling the electronic device 12 to carry out the operations described in greater detail below.
- the control circuit 30 includes a processor 32 that executes an operating system 34 and various applications 36.
- the functions described in this disclosure document may be embodied as part of the operating system 34. In other embodiments, these functions may be embodied as a dedicated application or part of an application used for other tasks.
- the operating system 34, the applications 36, and stored data 38 are stored on a memory 40.
- the operating system 34 and applications 36 are embodied in the form of executable logic routines (e.g., lines of code, software programs, etc.) that are stored on a non-transitory computer readable medium (e.g., the memory 40) of the electronic device 12 and are executed by the control circuit 30.
- executable logic routines e.g., lines of code, software programs, etc.
- a non-transitory computer readable medium e.g., the memory 40
- the processor 32 of the control circuit 30 may be a central processing unit (CPU), microcontroller, or microprocessor.
- the processor 32 executes code stored in a memory (not shown) within the control circuit 30 and/or in a separate memory, such as the memory 40, in order to carry out operation of the electronic device 12.
- the memory 40 may be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, a random access memory (RAM), or other suitable device.
- the memory 40 includes a non-volatile memory for long term data storage and a volatile memory that functions as system memory for the control circuit 30.
- the memory 40 may exchange data with the control circuit 30 over a data bus. Accompanying control lines and an address bus between the memory 40 and the control circuit 30 also may be present.
- the memory 40 is considered a non-transitory computer readable medium.
- the electronic device 12 includes communications circuitry that enables the electronic device 12 to establish various wireless communication connections.
- the communications circuitry includes a radio circuit 42.
- the radio circuit 42 includes one or more radio frequency transceivers and an antenna assembly (or assemblies).
- the radio circuit 42 represents one or more than one radio transceiver, one or more than one antenna, tuners, impedance matching circuits, and any other components needed for the various supported frequency bands and radio access technologies.
- Exemplary network access technologies supported by the radio circuit 42 include cellular circuit-switched network technologies and packet-switched network technologies (e.g., WiFi).
- the radio circuit 42 further represents any radio transceivers and antennas used for local wireless communications directly with another electronic device, such as over a Bluetooth interface.
- the electronic device 12 further includes the display 44 for displaying information to a user.
- the display 44 may be coupled to the control circuit 30 by a video circuit 46 that converts video data to a video signal used to drive the display 44.
- the video circuit 46 may include any appropriate buffers, decoders, video data processors and so forth.
- the electronic device 12 may include one or more user inputs 48 for receiving user input for controlling operation of the electronic device 12.
- Exemplary user inputs 48 include, but are not limited to, a touch sensitive input 50 that overlays or is part of the display 44 for touch screen functionality, and one or more buttons 52.
- Other types of data inputs may be present, such as one or more motion sensors 54 (e.g., gyro sensor(s), accelerometer(s), etc.).
- the electronic device 12 may further include a sound circuit 56 for processing audio signals. Coupled to the sound circuit 56 are a speaker 58 and a microphone 60 that enable audio operations that are carried out with the electronic device 12 (e.g., conduct telephone calls, output sound, capture audio, etc.).
- the sound circuit 56 may include any appropriate buffers, encoders, decoders, amplifiers and so forth.
- the electronic device 12 may further include a power supply unit 62 that includes a rechargeable battery 64.
- the power supply unit 62 supplies operating power from the battery 64 to the various components of the electronic device 12 in the absence a connection from the electronic device 12 to an external power source.
- the power supply unit 62 may monitor the amount of charge of the battery 64, which is typically expressed as a percentage of charge remaining.
- the electronic device 12 also may include various other components.
- the electronic device 12 may includes one or more input/output (I/O) connectors (not shown) in the form electrical connectors for operatively connecting to another device (e.g., a computer) or an accessory (e.g., earphones) via a cable, or for receiving power from an external power supply.
- I/O input/output
- the electronic device 12 may includes one or more input/output (I/O) connectors (not shown) in the form electrical connectors for operatively connecting to another device (e.g., a computer) or an accessory (e.g., earphones) via a cable, or for receiving power from an external power supply.
- I/O input/output
- Another exemplary component may be one or more cameras 66 for taking photographs or video, or for use in video telephony.
- a position data receiver 68 such as a global positioning system (GPS) receiver, may be present to assist in determining the location of the electronic device 12.
- the electronic device 12 also may include a subscriber identity module (SIM) card slot 70 in which a SIM card 72 is received.
- SIM subscriber identity module
- the slot 70 includes any appropriate connectors and interface hardware to establish an operative connection between the electronic device 12 and the SIM card 72.
- the server 10 may be implemented as a computer-based system that is capable of executing computer applications (e.g., software programs), including a lost device function 74 that, when executed, carries out functions of the server 10 that are described herein.
- the lost device function 74 and a database 76 may be stored on a non-transitory computer readable medium, such as a memory 78.
- the database 76 may be used to store various information sets used to carry out the functions described in this disclosure.
- the memory 78 may be a magnetic, optical or electronic storage device (e.g., hard disk, optical disk, flash memory, etc.), and may comprise several devices, including volatile and nonvolatile memory components. Accordingly, the memory 78 may include, for example, random access memory (RAM) for acting as system memory, read-only memory (ROM), solid-state drives, hard disks, optical disks (e.g., CDs and DVDs), flash devices and/or other memory components, plus associated drives, players and/or readers for the memory devices.
- RAM random access memory
- ROM read-only memory
- solid-state drives hard disks
- optical disks e.g., CDs and DVDs
- flash devices and/or other memory components plus associated drives, players and/or readers for the memory devices.
- the server 10 may include one or more processors 80 used to execute instructions that carry out logic routines.
- the processor 80 and the memory 78 may be coupled using a local interface 82.
- the local interface 82 may be, for example, a data bus with accompanying control bus, a network, or other subsystem.
- the server 10 may have various input/output (I/O) interfaces for operatively connecting to various peripheral devices, as well as one or more communications interfaces 84.
- the communications interface 84 may include for example, a modem and/or a network interface card.
- the communications interface 84 may enable the server 10 to send and receive data signals to and from other computing devices via an external network.
- the communications interface 84 may operatively connect the server 10 to one or more external communications mediums, including establishing operative connection to the Internet 28.
- FIG. 3 shown is an exemplary flow diagram representing steps that may be carried out by the electronic device 12 when executing logical instructions to carry out a power management for lost device operation.
- the power management for lost device operation may be carried out regardless of whether the electronic device 12 is actually lost (e.g., in a location unknown to the user of the device). More specifically, the electronic device 12 may carry out the power management for lost device operation when charge of the battery 64 falls below a predetermined threshold. Therefore, in one embodiment, a trigger for entering a "lost mode" is based on battery change and not on the user's knowledge of the location of the electronic device 12. Other triggering events may cause the electronic device 12 to enter the lost mode.
- the server 10 may send a command to the electronic device 12 to enter the lost mode. This may occur if the user discovers that he or she cannot find the electronic device 12 and, using another device, communicates this condition to the server 10 that, in turn, begins an operation to attempt to assist the user locate the electronic device 12.
- FIG. 3 illustrates an exemplary process flow representing steps that may be carried out by the electronic device 12 when executing the logical instructions to implement the power management for lost device operation. Complimentary operations of the server 10 also will be understood from this disclosure. Although illustrated in a logical progression, the illustrated blocks of FIG. 3 may be carried out in other orders and/or with concurrence between two or more blocks. Therefore, the illustrated flow diagram may be altered (including omitting steps) and/or may be implemented in an object-oriented manner or in a state-oriented manner.
- the power management for lost device operation may run in the background during normal device operation to check for a condition that triggers entry into a lost mode. For example, in block 86, the remaining battery charge may be compared to a predetermined threshold.
- the predetermined threshold may be, for example, three percent. Other predetermined battery charge thresholds are possible, such five percent or seven percent. If the charge of the battery is above the predetermined threshold, the electronic device 12 may carry out normal operations in block 88, such as engage in user controlled activities, enter a power save mode when not in use, enter a locked state when not in use, etc.
- the logical flow may progress to block 90.
- the electronic device 12 enters the lost mode.
- the lost mode includes locking the electronic device 12 to prevent use of certain operations without satisfying an unlock challenge.
- the lost mode also may include shutting down as many operations as possible to conserve power.
- the lost mode may exit at anytime during the lost mode if the user satisfies the unlock challenge even if the charge of the battery is below the threshold. Also, in one embodiment, if the user is using the electronic device 12 when the condition of block 86 is satisfied, then entry into lost may be delayed until the electronic device 12 enters a power save or locked state by action of the user or inactivity of the electronic device 12.
- the electronic device 12 may periodically transmit data in block 92.
- the transmission of block 92 may be made on a predetermined schedule and/or the time between transmissions may change based on certain events or the length of time that the electronic device 12 remains in the lost mode.
- the data transmitted in block 92 may include a device identifier.
- One exemplary identifier is an international mobile subscriber identity (EVISI) value retrieved from the SIM card 72.
- EVISI international mobile subscriber identity
- Other device identifier values are possible, such a serial number of the device, subscriber information, telephone number, or a unique identification code that was previously associated with the SIM card 72.
- Other data that is transmitted may include a last known location of the electronic device 12, such a location determined using the position data receiver 68 or a position determined by the home subscriber network 16. This location determination may be made before the electronic device 12 enters the lost mode 90. If a confidence level in the last known location is relatively low, then the last known location may not be transmitted. Alternatively, the last known location may be transmitted if a message is received from the server 10 that prompts determination and transmission of the location of the electronic device 12.
- Other data that may be transmitted includes an identification of the server 10.
- the identification of the server 10 may be used by devices that receive the transmission to relay the data from the transmission to the server 10.
- the transmission may be made using a NB LTE protocol (also referred to as IoT communication or NB IoT).
- NB LTE also referred to as IoT communication or NB IoT.
- the use of NB LTE consumes a relatively low amount of power, which will allow the electronic device 12 to periodically make the transmission over a long period of time before the charge of the battery 64 is depleted to the point where there is insufficient power from the battery 64 to make the transmission.
- the electronic device 12 may remain visible to the server 10 for one or more years.
- the transmission may be made as a machine type communication.
- Machine type communications under NB LTE, and similar radio access technologies follow a protocol under which a wide variety of devices that detect the transmission will process the transmission, such as by serving as a relay device that forwards the transmission or its content to another device.
- the other devices serve as multiple possible pathways for communications from the electronic device 12 to reach the server 10.
- one or more of the base station 18 of the home network 16, the base station 22 of the foreign subscriber network 20, the access point 36 or the electronic device 14 may detect the transmission and relay the transmission or its content to the server 10.
- the number and identity of the devices that detect the transmission from the electronic device 12 and relay the transmission to the server 10 will change.
- the device may relay the transmission to the server 10.
- the relayed transmission may be in the transmission's original form or as a message containing data from the transmission.
- the relayed transmission may include a way for the server 10 to determine the location of the relaying device. For fixed location devices, such as the base stations 18 and 22, the location of the device may be known in advance by the server 10 or may be ascertainable from a database by the server 10. For other relaying devices, the relaying device may provide its location as part of the relayed transmission or the device may be polled by the server 10 to supply the device's location.
- the server 10 may analyze each relayed transmission and the locations of the devices that detected and relayed the transmission to estimate a location of the electronic device 12. If possible from the information collected by the server 10, the estimate may be derived by triangulation.
- the relayed transmission may include signal strength of the transmission from the electronic device 12, which may be used by the server 10 to improve the triangulation results.
- the estimated location of the electronic device 12 may be an area surrounding the relaying device(s). The area may be based on the effective transmission range of the transmitted signal. Effective transmission range of the transmitted signal may be dependent on the transmission characters of the electronic device 12 and the receive characteristics of the receiving/relaying device.
- the server 10 may share the estimated location with an authorized user of the electronic device 12. Since, during the lost mode, the electronic device 12 is locked and its location may not be known to the authorized user, the location may be shared via another device that accesses the server 10 or receives communications from the server 10. In other situations, the estimated location may be shared with other parties, such as law enforcement, rescue personnel, or other authorized person or entity.
- the server 10 may require authentication of the user or other party prior to sharing the estimated location information.
- the estimated location information may be displayed on a map. When the user is close to the estimated location and if the electronic device 12 still cannot be found, the user may interface with server 10 to have the server 10 send a wake signal to the electronic device 12 to which the electronic device 12 reacts by playing a sound and/or emitting light.
- the transmission of block 92 may take any appropriate form, such as a data message or signal.
- the message or signal may be addressed to the server 10.
- the transmission of block 92 may be sent on a periodic basis, such as every five minutes, every ten minutes or every fifteen minutes.
- the transmission may be sent relatively frequently after entering the lost mode and then transmission frequency may decrease the longer the electronic device 12 stays in the lost mode. For instance, in the first day of lost mode the transmission may be sent every five minutes. Then in the second through seventh day of the lost mode, the transmission may be sent every fifteen minutes. Then, for the next month, the transmission may be sent once an hour and, thereafter, the transmission may be sent once or twice a day. Of course, other transmission schedules may be followed. Also, certain events may trigger the
- a transmission may be made and additional transmissions may be made at a relatively frequent rate (e.g., every minute or every five minutes) for a period of time or until the motion stops.
- the electronic device 12 may check for one or more events during the lost mode. For instance, in block 94, the electronic device 12 may determine if an event occurs that triggers the electronic deice 12 to attempt to determine its location.
- An exemplary event of this nature includes receipt of a message from the server 10 that commands the electronic device 12 to attempt to determine the location of the electronic device 12.
- the electronic device 12 may periodically wake up radio operations to attempt to detect inbound messages for the electronic device 12.
- Turning on of the receiving functionality may be carried out at predetermined times that are scheduled to coincide with the transmission of messages from the server 10.
- the messages may be received over any suitable radio access technology, such as a control message transmitted over cellular protocols (e.g., 3G or 4G signaling protocols) or over NB LTE signaling protocols.
- Another event that may trigger a positive determination in block 94 is the elapsing of a predetermined amount of time since entering the lost mode or the elapsing of a predetermined amount of time since the last attempt to determine location of the electronic device 12.
- Another event that may trigger a positive determination in block 94 is detection of movement of the electronic device 12 by the motion sensor 54.
- the electronic device 12 may attempt to determine its location in block 96. Location may be determined by signaling with the home subscriber network 16, by using GPS, etc. If location can be ascertained in block 96, the determined location may be used in future transmissions at block 92.
- Another event that the electronic device 12 may monitor for is whether the electronic device 12 is connected to external power to charge the battery 64. For example, in block 98, if a determination is made that the charge of the battery exceeds the predetermined threshold of block 86, then the logical flow may proceed to block 100. In block 100, the user is prompted to complete a security challenge.
- the challenge may be based on entering biometric information (e.g., a fingerprint), entering a password or PIN, entering a dynamic key value, entering a predetermined sequence of gestures, etc.
- the challenge is the same challenge used to unlock the electronic device 12 after the electronic device 12 goes into a locked state following a period of inactivity or by user action to lock the device.
- the challenge may be an advanced challenge requiring additional or different actions than the challenge used to unlock the electronic device 12 after the electronic device 12 goes into a locked state following a period of inactivity or by user action to lock the device. If the challenge is met, the electronic device 12 may be unlocked and enter normal operation at block 88. If the challenge is not met, the electronic device may remain in the lost mode. As indicated, in the lost mode, the electronic device 12 may remain locked and periodically transmit data in block 92.
- FIG. 4 shown is an exemplary flow diagram representing steps that may be carried out by the electronic device 12 when executing logical instructions to carry out a hardware security operation.
- the hardware security operation is carried out if the SIM card 72 is removed or is replaced with a different SIM card.
- Other hardware changes to the electronic device 12 may result in execution of the security operation, such as removal of a case, housing component, replacement of the battery 64, removal from a cradle, disconnection from an external power source, etc.
- FIG. 4 illustrates an exemplary process flow representing steps that may be carried out by the electronic device 12 when executing the logical instructions to implement the hardware security operation. Complimentary operations of server 10 also will be understood from this disclosure. Although illustrated in a logical progression, the illustrated blocks of FIG. 4 may be carried out in other orders and/or with concurrence between two or more blocks. Therefore, the illustrated flow diagram may be altered (including omitting steps) and/or may be implemented in an object-oriented manner or in a state-oriented manner.
- the hardware security operation may run in the background during normal device operation to check for a condition that triggers entry into a security mode.
- the electronic device 12 may monitor for removal or replacement of the SIM card 72. If the SIM card 72 is not removed or replaced, the electronic device 12 may carry out normal operations in block 104, such as engage in user controlled activities, enter a power save mode when not in use, enter a locked state when not in use, etc.
- the electronic device 12 detects that the SIM card 104 is removed, then the logical flow may progress to block 106.
- the electronic device 12 enters a security mode.
- the security mode includes locking the electronic device 12 to prevent use of certain operations without satisfying an unlock challenge.
- the electronic device 12 may prompt the user for an input to complete a security challenge to unlock the electronic device 12 in block 108.
- the challenge may be based on entering biometric information (e.g., a fingerprint), entering a password or PIN, entering a dynamic key value, entering a predetermined sequence of gestures, etc.
- the challenge is the same challenge used to unlock the electronic device 12 after the electronic device 12 goes into a locked state following a period of inactivity or by user action to lock the device.
- the challenge may be an advanced challenge requiring additional or different actions than the challenge used to unlock the electronic device 12 after the electronic device 12 goes into a locked state following a period of inactivity or by user action to lock the device. If the challenge is met in block 110, the electronic device 12 may be unlocked and enter normal operation at block 104.
- the electronic device may remain in the security mode. As indicated, in the security mode, the electronic device 12 may remain locked.
- the electronic device may periodically transmit data in block 112. Similar to the transmission of block 92, the transmission of block 112 may be made on a predetermined schedule and/or the time between transmissions may change based on certain events or the length of time that the electronic device 12 remains in the security mode. Also similar to block 92, the data transmitted in block 112 may include a device identifier, such as an IMSI value. The IMSI value may have been retrieved from the SIM card 72 at a prior time and securely stored in memory 40. Other device identifier values are possible, such as serial number of the device, subscriber information, telephone number, or a unique identification code that was previously associated with the SIM card 72 prior to its removal or replacement.
- a device identifier such as an IMSI value.
- the IMSI value may have been retrieved from the SIM card 72 at a prior time and securely stored in memory 40.
- Other device identifier values are possible, such as serial number of the device, subscriber information, telephone number, or a unique identification code that was previously associated with the SIM
- the IMSI value, other data retrieved from the SIM card 72 or other device identifier used for the data transmission may be stored in a secure, possibly hidden, location of the memory 40. Additional data that is transmitted may include a last known location of the electronic device 12, such a location determined using the position data receiver 68 or a position determined by the home subscriber network 16. This location determination may be made before the electronic device 12 enters the security mode 112 or during the security mode. Other data that may be transmitted includes an identification of the server 10 for use by devices that receive the transmission to relay the data from the transmission to the server 10. Also, the IMSI value of other data retrieved from the new SIM card may be included in the data transmission of block 112.
- the transmission of block 112 may be made using full power operations over normal cellular and/or pack-switch transmission protocols (e.g., 3G, 4G, LTE, WiFi, etc.).
- the transmission of block 1 12 may be made using a NB LTE protocol (also referred to as IoT communication or NB IoT) and/or made as a machine type
- the transmission of block 112 may be communicated to the server 10 by devices that receive the transmission and are configured to process the transmission type.
- the server 10 may then track location of the electronic device 12, such as by using the techniques described herein. Since replacement of the SIM card is an activity that thieves of mobile devices typically perform, there will be less incentive for thieves to steal mobile devices. This is because the mobile device will be subject to the security mode in which the device will remain locked and is traceable as soon as the SIM card is removed or replaced.
- the check of block 102 may be carried out at start up of the electronic device 12. In this manner, even if the electronic device 12 is powered off for replacement of the SIM card and reactivated, the replacement of the SIM card will cause the electronic device 12 to enter the security mode.
- the electronic device 12 may store the IMSI value of an approved SIM card in long term memory for comparison against an IMSI read at start up.
- an item e.g., an appliance, electronic device, machine, shipping container, vehicle, etc.
- an item may be configured to monitor for a condition that, if changed, would indicate possible
- Exemplary monitored conditions include, but are not limited to, the application of external power, an operative communication connection with another device (e.g., over a cable such as USB or over a wireless link such as Bluetooth), and the presence of another item (e.g., a coordinating cradle or stand on which the item is placed). If the condition changes (e.g., removal of the external power source, disruption of the communication connection, or separation from the coordinating item), the item may be further configured to emit the transmission of block 112 unless a security challenge is met.
- the item may include a battery to power electronics in the item that carry out these functions.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Environmental & Geological Engineering (AREA)
- Human Computer Interaction (AREA)
- Telephone Function (AREA)
Abstract
Tracking of a location of an electronic device includes detecting a condition for which long term location tracking functions of the electronic device are preprogrammed in the electronic device; locking the electronic device, the locking of the electronic device restricting access to one or more user functions of the electronic device available to the user in an unlocked state; and transmitting a message by narrow band (NB) long term evolution (LTE), the message for relay by one or more receiving devices to a server that identifies the location of the electronic device and the message containing an identifier value for the electronic device.
Description
TITLE : SYSTEM AND METHOD FOR SECURING ELECTRONIC DEVICE DURING LOW POWER AND FOLLOWING HARDWARE CHANGE
TECHNICAL FIELD OF THE INVENTION
The technology of the present disclosure relates generally to electronic devices and, more particularly, to a system and method for improving the ability to find a lost electronic device as well as improving the security of the device in certain situations. The disclosed operations may make the electronic device less attractive to being stolen.
BACKGROUND
Some mobile electronic devices have location discovery tools to facilitate finding the device if lost or stolen. Exemplary tools of this nature are "Find my iPhone" by Apple and "Find my Xperia" by Sony. These types of tools can be very effective, but rely on relatively power intensive processes. Once the battery is drained, the location discovery tool and other operations of the device will no longer be available.
SUMMARY
According to one aspect of the disclosure, disclosed is a method of tracking location of an electronic device. The method includes detecting a condition for which long term location tracking functions of the electronic device are preprogrammed in the electronic device; locking the electronic device, the locking of the electronic device restricting access to one or more user functions of the electronic device available to the user in an unlocked state; and transmitting a message by narrow band ( B) long term evolution (LTE), the message for relay by one or more receiving devices to a server that identifies the location of the electronic device and the message containing an identifier value for the electronic device.
According to one embodiment of the method, the condition is remaining charge of a battery that powers the electronic device is below a predetermined amount of charge.
According to one embodiment of the method, the predetermined amount of charge is a charge amount that is less than five percent.
According to one embodiment of the method, the condition is removal or replacement of a subscriber identity module (SIM) card associated with the electronic device.
According to one embodiment of the method, the message includes a location value corresponding to a location of the electronic device determined by the electronic device.
According to one embodiment of the method, the location value is determined before the locking of the electronic device.
According to one embodiment of the method, the location value is updated upon determination of at least one of movement of the electronic device, receipt of a message from the server to update the location value, or upon a time trigger preprogrammed in the electronic device.
According to one embodiment, the method further includes unlocking the electronic device if a security challenge is met.
According to one embodiment of the method, the transmitting of the message is repeated on a periodic basis or according to a predetermined schedule.
According to one embodiment of the method, the identifier value is a value obtained from a SIM card associated with the electronic device.
According to another aspect of the disclosure, disclosed is an electronic device. The electronic device includes communication circuitry and control circuitry configured to execute long term location tracking functions embodied in executable logic, the executable logic includes logic to: detect a condition that triggers the long term location tracking functions; lock the electronic device to restrict access to one or more user functions of the
electronic device available to the user in an unlocked state; and transmit a message by narrow band ( B) long term evolution (LTE) via the communication circuitry, the message for relay by one or more receiving devices to a server that identifies the location of the electronic device and the message containing an identifier value for the electronic device.
According to one embodiment of the electronic device, the condition is remaining charge of a battery that powers the electronic device is below a predetermined amount of charge.
According to one embodiment of the electronic device, the predetermined amount of charge is a charge amount that is less than five percent.
According to one embodiment of the electronic device, the condition is removal or replacement of a subscriber identity module (SIM) card associated with the electronic device.
According to one embodiment of the electronic device, the message includes a location value corresponding to a location of the electronic device determined by the electronic device.
According to one embodiment of the electronic device, the location value is determined before the locking of the electronic device.
According to one embodiment of the electronic device, the location value is updated upon determination of at least one of movement of the electronic device, receipt of a message from the server to update the location value, or upon a time trigger preprogrammed in the electronic device.
According to one embodiment of the electronic device, the executable logic further includes logic to unlock the electronic device if a security challenge is met.
According to one embodiment of the electronic device, the transmitting of the message is repeated on a periodic basis or according to a predetermined schedule.
According to one embodiment of the electronic device, the identifier value is a value obtained from a SIM card associated with the electronic device.
BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a schematic diagram of an operational environment for an electronic device.
FIG. 2 is a schematic diagram of the electronic device.
FIG. 3 is a flow-diagram of a power management operation for the electronic device. FIG. 4 is a flow-diagram of a security operation for hardware changes of the electronic device.
DETAILED DESCRIPTION OF EMBODIMENTS
Embodiments will now be described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. It will be understood that the figures are not necessarily to scale. Features that are described and/or illustrated with respect to one embodiment may be used in the same way or in a similar way in one or more other embodiments and/or in combination with or instead of the features of the other embodiments. Introduction
Described below in conjunction with the appended figures are various
embodiments of systems and methods for improving the security of an electronic device and prolonging the time during which location of a lost electronic device may be identified. The disclosed techniques are primarily described in the context of a portable electronic device, such as smart phone or tablet computer. But the techniques may be applied in other contexts, such as other types of electronic devices, computers, gaming
consoles, vehicles, appliances, shipping containers, and other valuable or commonly stolen items.
The techniques involve entering a low power transmission mode to periodically transmit an identifier for the electronic device and, in some cases, a last known location value. The low power transmission mode may be a narrow-band (NB) long-term evolution (LTE) transmission technique sometimes employed for machine type communications and/or machine-to-machine (M2M) transmissions. These types of transmissions are sometimes referred to as Internet of Things (IoT) transmissions. In a typical implementation, the NB LTE transmission is made using unlicensed spectrum and base stations that receive the transmission will process the transmission (e.g., relay the transmission) even if the transmitting device does not have a service agreement with the subscriber network associated with the base station. Under these operations, the electronic device may remain visible for very long periods of time without recharging. As such, long-term location tracking of the electronic device by a server may be made, such as tracking for at least one day, at least one week, at least one month, or at least one year.
The electronic device may enter the low power transmission mode when the electronic device has remaining battery charge under a predetermined threshold, such as about three percent to about five percent, or when a hardware change is made, such as replacement of a subscriber identity module (SIM) card. To exit the low power transmission mode, a security operation may be need to be satisfied. Therefore, since the electronic device may remain visible for an extended time after one of these events until a security operation is satisfied, the electronic device may be less attractive to being stolen.
System Architecture
FIG. 1 is a schematic diagram of an exemplary system for implementing the disclosed techniques. It will be appreciated that the illustrated system is representative and other systems may be used to implement the disclosed techniques. Also, functions disclosed as being carried out by a single device, such as the disclosed server, may be carried out in a distributed manner across nodes of a computing environment.
The system includes a server 10 that, at times, may be in operative communication with an electronic device 12 (also referred to as a user equipment or UE). The server 10 also may be in operative communication with other electronic devices (e.g., electronic device 14), with one or more subscriber networks and/or with one or more local networks. In the illustrated embodiment, the subscriber networks are cellular networks operated by respective mobile telephone service providers. One of the illustrated subscriber networks is a home network 16 for the electronic device 12 that has at least one base station 18 (or other access point) in operative range from the electronic device 12. The other of the illustrated networks is a foreign network 20 relative to the electronic device 12 that has at least one base station 22 (or other access point) in operative range from the electronic device 12. In the illustrated embodiment, the local network, identified by reference numeral 24, is a wireless network such as a WiFi network that has at least one access point 26 (e.g., a router) in operative range from the electronic device 12. The subscriber networks 16, 20 and the local network 24 may communicate with the server 10 by way of a communications medium, such as the Internet 28 and/or one or more intermediate networks. In one embodiment, the server 10 may be part of one of the subscriber networks 16, 20 or may be separate from the subscriber networks 16, 20.
As will be described, the electronic device 14 may detect NB transmissions from the electronic device 12. The NB transmissions may be relayed from the electronic device 14 to the server 10 via one of the networks 16, 20, 24 or another network or
communication medium. Other communication operations of the electronic device 14 are possible, but will not be described further. NB transmissions from the electronic device 14 that are detected by any of the base stations 18, 22 or the access point 26 may be relayed to the server 10 via the respective networks 16, 20, 24. The electronic device 12 may be one of a variety of types of devices, such as a mobile phone, a tablet computer, a laptop computer, a desktop computer, a gaming device, etc. As will be described, the server 10 and the electronic device 12 are configured to carry out the respective logical functions that are described herein. In addition to carrying out the operations described herein, the server 10 may carry out other support and service operations for the electronic device 12.
With additional reference to FIG. 2, illustrated is a schematic block diagram of the electronic device 12 in its exemplary embodiment as a mobile telephone. The electronic device 12 includes a control circuit 30 that is responsible for overall operation of the electronic device 12, including controlling the electronic device 12 to carry out the operations described in greater detail below. The control circuit 30 includes a processor 32 that executes an operating system 34 and various applications 36. The functions described in this disclosure document may be embodied as part of the operating system 34. In other embodiments, these functions may be embodied as a dedicated application or part of an application used for other tasks.
The operating system 34, the applications 36, and stored data 38 (e.g., data associated with the operating system 34, the applications 36, and user files), are stored on a memory 40. The operating system 34 and applications 36 are embodied in the form of executable logic routines (e.g., lines of code, software programs, etc.) that are stored on a non-transitory computer readable medium (e.g., the memory 40) of the electronic device 12 and are executed by the control circuit 30. The functions described herein may be thought of as methods that are carried out by the electronic device 12.
The processor 32 of the control circuit 30 may be a central processing unit (CPU), microcontroller, or microprocessor. The processor 32 executes code stored in a memory (not shown) within the control circuit 30 and/or in a separate memory, such as the memory 40, in order to carry out operation of the electronic device 12. The memory 40 may be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, a random access memory (RAM), or other suitable device. In a typical arrangement, the memory 40 includes a non-volatile memory for long term data storage and a volatile memory that functions as system memory for the control circuit 30. The memory 40 may exchange data with the control circuit 30 over a data bus. Accompanying control lines and an address bus between the memory 40 and the control circuit 30 also may be present. The memory 40 is considered a non-transitory computer readable medium.
The electronic device 12 includes communications circuitry that enables the electronic device 12 to establish various wireless communication connections. In the exemplary embodiment, the communications circuitry includes a radio circuit 42. The
radio circuit 42 includes one or more radio frequency transceivers and an antenna assembly (or assemblies). In the case that the electronic device 12 is a multi-mode device capable of communicating using more than one standard and/or over more than one radio frequency band, the radio circuit 42 represents one or more than one radio transceiver, one or more than one antenna, tuners, impedance matching circuits, and any other components needed for the various supported frequency bands and radio access technologies.
Exemplary network access technologies supported by the radio circuit 42 include cellular circuit-switched network technologies and packet-switched network technologies (e.g., WiFi). The radio circuit 42 further represents any radio transceivers and antennas used for local wireless communications directly with another electronic device, such as over a Bluetooth interface.
The electronic device 12 further includes the display 44 for displaying information to a user. The display 44 may be coupled to the control circuit 30 by a video circuit 46 that converts video data to a video signal used to drive the display 44. The video circuit 46 may include any appropriate buffers, decoders, video data processors and so forth.
The electronic device 12 may include one or more user inputs 48 for receiving user input for controlling operation of the electronic device 12. Exemplary user inputs 48 include, but are not limited to, a touch sensitive input 50 that overlays or is part of the display 44 for touch screen functionality, and one or more buttons 52. Other types of data inputs may be present, such as one or more motion sensors 54 (e.g., gyro sensor(s), accelerometer(s), etc.).
The electronic device 12 may further include a sound circuit 56 for processing audio signals. Coupled to the sound circuit 56 are a speaker 58 and a microphone 60 that enable audio operations that are carried out with the electronic device 12 (e.g., conduct telephone calls, output sound, capture audio, etc.). The sound circuit 56 may include any appropriate buffers, encoders, decoders, amplifiers and so forth.
The electronic device 12 may further include a power supply unit 62 that includes a rechargeable battery 64. The power supply unit 62 supplies operating power from the battery 64 to the various components of the electronic device 12 in the absence a connection from the electronic device 12 to an external power source. The power supply
unit 62 may monitor the amount of charge of the battery 64, which is typically expressed as a percentage of charge remaining.
The electronic device 12 also may include various other components. For instance, the electronic device 12 may includes one or more input/output (I/O) connectors (not shown) in the form electrical connectors for operatively connecting to another device (e.g., a computer) or an accessory (e.g., earphones) via a cable, or for receiving power from an external power supply.
Another exemplary component may be one or more cameras 66 for taking photographs or video, or for use in video telephony. As another example, a position data receiver 68, such as a global positioning system (GPS) receiver, may be present to assist in determining the location of the electronic device 12. The electronic device 12 also may include a subscriber identity module (SIM) card slot 70 in which a SIM card 72 is received. The slot 70 includes any appropriate connectors and interface hardware to establish an operative connection between the electronic device 12 and the SIM card 72. The server 10 may be implemented as a computer-based system that is capable of executing computer applications (e.g., software programs), including a lost device function 74 that, when executed, carries out functions of the server 10 that are described herein. The lost device function 74 and a database 76 may be stored on a non-transitory computer readable medium, such as a memory 78. The database 76 may be used to store various information sets used to carry out the functions described in this disclosure. The memory 78 may be a magnetic, optical or electronic storage device (e.g., hard disk, optical disk, flash memory, etc.), and may comprise several devices, including volatile and nonvolatile memory components. Accordingly, the memory 78 may include, for example, random access memory (RAM) for acting as system memory, read-only memory (ROM), solid-state drives, hard disks, optical disks (e.g., CDs and DVDs), flash devices and/or other memory components, plus associated drives, players and/or readers for the memory devices.
To execute logical operations, the server 10 may include one or more processors 80 used to execute instructions that carry out logic routines. The processor 80 and the
memory 78 may be coupled using a local interface 82. The local interface 82 may be, for example, a data bus with accompanying control bus, a network, or other subsystem.
The server 10 may have various input/output (I/O) interfaces for operatively connecting to various peripheral devices, as well as one or more communications interfaces 84. The communications interface 84 may include for example, a modem and/or a network interface card. The communications interface 84 may enable the server 10 to send and receive data signals to and from other computing devices via an external network. In particular, the communications interface 84 may operatively connect the server 10 to one or more external communications mediums, including establishing operative connection to the Internet 28.
Power Management for Lost Device Operation
With additional reference to FIG. 3, shown is an exemplary flow diagram representing steps that may be carried out by the electronic device 12 when executing logical instructions to carry out a power management for lost device operation. It will be understood that the power management for lost device operation may be carried out regardless of whether the electronic device 12 is actually lost (e.g., in a location unknown to the user of the device). More specifically, the electronic device 12 may carry out the power management for lost device operation when charge of the battery 64 falls below a predetermined threshold. Therefore, in one embodiment, a trigger for entering a "lost mode" is based on battery change and not on the user's knowledge of the location of the electronic device 12. Other triggering events may cause the electronic device 12 to enter the lost mode. For instance, the server 10 may send a command to the electronic device 12 to enter the lost mode. This may occur if the user discovers that he or she cannot find the electronic device 12 and, using another device, communicates this condition to the server 10 that, in turn, begins an operation to attempt to assist the user locate the electronic device 12.
FIG. 3 illustrates an exemplary process flow representing steps that may be carried out by the electronic device 12 when executing the logical instructions to implement the power management for lost device operation. Complimentary operations of the server 10 also will be understood from this disclosure. Although illustrated in a logical progression,
the illustrated blocks of FIG. 3 may be carried out in other orders and/or with concurrence between two or more blocks. Therefore, the illustrated flow diagram may be altered (including omitting steps) and/or may be implemented in an object-oriented manner or in a state-oriented manner.
In one embodiment, the power management for lost device operation may run in the background during normal device operation to check for a condition that triggers entry into a lost mode. For example, in block 86, the remaining battery charge may be compared to a predetermined threshold. The predetermined threshold may be, for example, three percent. Other predetermined battery charge thresholds are possible, such five percent or seven percent. If the charge of the battery is above the predetermined threshold, the electronic device 12 may carry out normal operations in block 88, such as engage in user controlled activities, enter a power save mode when not in use, enter a locked state when not in use, etc.
If the charge of the battery is below the predetermined threshold or another trigger for entering the lost mode occurs (e.g., the above-described receipt of a command from the server 10), then the logical flow may progress to block 90. In block 90, the electronic device 12 enters the lost mode. The lost mode includes locking the electronic device 12 to prevent use of certain operations without satisfying an unlock challenge. The lost mode also may include shutting down as many operations as possible to conserve power.
Various components and functions may be activated at appropriate times to carry out the functions described below. In one embodiment, however, the lost mode may exit at anytime during the lost mode if the user satisfies the unlock challenge even if the charge of the battery is below the threshold. Also, in one embodiment, if the user is using the electronic device 12 when the condition of block 86 is satisfied, then entry into lost may be delayed until the electronic device 12 enters a power save or locked state by action of the user or inactivity of the electronic device 12.
After entry of the lost mode, the electronic device 12 may periodically transmit data in block 92. As will be described, the transmission of block 92 may be made on a predetermined schedule and/or the time between transmissions may change based on certain events or the length of time that the electronic device 12 remains in the lost mode.
The data transmitted in block 92 may include a device identifier. One exemplary identifier is an international mobile subscriber identity (EVISI) value retrieved from the SIM card 72. Other device identifier values are possible, such a serial number of the device, subscriber information, telephone number, or a unique identification code that was previously associated with the SIM card 72. Other data that is transmitted may include a last known location of the electronic device 12, such a location determined using the position data receiver 68 or a position determined by the home subscriber network 16. This location determination may be made before the electronic device 12 enters the lost mode 90. If a confidence level in the last known location is relatively low, then the last known location may not be transmitted. Alternatively, the last known location may be transmitted if a message is received from the server 10 that prompts determination and transmission of the location of the electronic device 12.
Other data that may be transmitted includes an identification of the server 10. The identification of the server 10 may be used by devices that receive the transmission to relay the data from the transmission to the server 10.
The transmission may be made using a NB LTE protocol (also referred to as IoT communication or NB IoT). The use of NB LTE consumes a relatively low amount of power, which will allow the electronic device 12 to periodically make the transmission over a long period of time before the charge of the battery 64 is depleted to the point where there is insufficient power from the battery 64 to make the transmission.
Depending on the frequency of transmission and other operations that the electronic device 12 may make while in the lost mode, it is possible that the electronic device 12 may remain visible to the server 10 for one or more years.
Also, the transmission may be made as a machine type communication. Machine type communications under NB LTE, and similar radio access technologies, follow a protocol under which a wide variety of devices that detect the transmission will process the transmission, such as by serving as a relay device that forwards the transmission or its content to another device. In this manner, the other devices serve as multiple possible pathways for communications from the electronic device 12 to reach the server 10. Thus, using the illustrated example, one or more of the base station 18 of the home network 16, the base station 22 of the foreign subscriber network 20, the access point 36 or the
electronic device 14 may detect the transmission and relay the transmission or its content to the server 10. As other devices move within range of the electronic device 12 and/or as the electronic device 12 moves within range of other devices, the number and identity of the devices that detect the transmission from the electronic device 12 and relay the transmission to the server 10 will change.
When the transmission from the electronic device 12 is received by a compatible device, the device may relay the transmission to the server 10. The relayed transmission may be in the transmission's original form or as a message containing data from the transmission. The relayed transmission may include a way for the server 10 to determine the location of the relaying device. For fixed location devices, such as the base stations 18 and 22, the location of the device may be known in advance by the server 10 or may be ascertainable from a database by the server 10. For other relaying devices, the relaying device may provide its location as part of the relayed transmission or the device may be polled by the server 10 to supply the device's location. The server 10 may analyze each relayed transmission and the locations of the devices that detected and relayed the transmission to estimate a location of the electronic device 12. If possible from the information collected by the server 10, the estimate may be derived by triangulation. In one embodiment, the relayed transmission may include signal strength of the transmission from the electronic device 12, which may be used by the server 10 to improve the triangulation results. In other embodiments, or when only one or two devices relay the transmission, the estimated location of the electronic device 12 may be an area surrounding the relaying device(s). The area may be based on the effective transmission range of the transmitted signal. Effective transmission range of the transmitted signal may be dependent on the transmission characters of the electronic device 12 and the receive characteristics of the receiving/relaying device.
The server 10 may share the estimated location with an authorized user of the electronic device 12. Since, during the lost mode, the electronic device 12 is locked and its location may not be known to the authorized user, the location may be shared via another device that accesses the server 10 or receives communications from the server 10. In other situations, the estimated location may be shared with other parties, such as law enforcement, rescue personnel, or other authorized person or entity. The server 10 may
require authentication of the user or other party prior to sharing the estimated location information. In one embodiment, the estimated location information may be displayed on a map. When the user is close to the estimated location and if the electronic device 12 still cannot be found, the user may interface with server 10 to have the server 10 send a wake signal to the electronic device 12 to which the electronic device 12 reacts by playing a sound and/or emitting light.
The transmission of block 92 may take any appropriate form, such as a data message or signal. The message or signal may be addressed to the server 10.
The transmission of block 92 may be sent on a periodic basis, such as every five minutes, every ten minutes or every fifteen minutes. In one embodiment, the transmission may be sent relatively frequently after entering the lost mode and then transmission frequency may decrease the longer the electronic device 12 stays in the lost mode. For instance, in the first day of lost mode the transmission may be sent every five minutes. Then in the second through seventh day of the lost mode, the transmission may be sent every fifteen minutes. Then, for the next month, the transmission may be sent once an hour and, thereafter, the transmission may be sent once or twice a day. Of course, other transmission schedules may be followed. Also, certain events may trigger the
transmission and/or cause an increase in the transmission frequency. For instance, if the electronic device 12 detects movement as indicated by the motion sensor 54, then a transmission may be made and additional transmissions may be made at a relatively frequent rate (e.g., every minute or every five minutes) for a period of time or until the motion stops.
The electronic device 12 may check for one or more events during the lost mode. For instance, in block 94, the electronic device 12 may determine if an event occurs that triggers the electronic deice 12 to attempt to determine its location. An exemplary event of this nature includes receipt of a message from the server 10 that commands the electronic device 12 to attempt to determine the location of the electronic device 12. For this purpose, the electronic device 12 may periodically wake up radio operations to attempt to detect inbound messages for the electronic device 12. Turning on of the receiving functionality may be carried out at predetermined times that are scheduled to coincide with the transmission of messages from the server 10. The messages may be
received over any suitable radio access technology, such as a control message transmitted over cellular protocols (e.g., 3G or 4G signaling protocols) or over NB LTE signaling protocols. Another event that may trigger a positive determination in block 94 is the elapsing of a predetermined amount of time since entering the lost mode or the elapsing of a predetermined amount of time since the last attempt to determine location of the electronic device 12. Another event that may trigger a positive determination in block 94 is detection of movement of the electronic device 12 by the motion sensor 54.
If a positive determination is made in block 94, the electronic device 12 may attempt to determine its location in block 96. Location may be determined by signaling with the home subscriber network 16, by using GPS, etc. If location can be ascertained in block 96, the determined location may be used in future transmissions at block 92.
Another event that the electronic device 12 may monitor for is whether the electronic device 12 is connected to external power to charge the battery 64. For example, in block 98, if a determination is made that the charge of the battery exceeds the predetermined threshold of block 86, then the logical flow may proceed to block 100. In block 100, the user is prompted to complete a security challenge. The challenge may be based on entering biometric information (e.g., a fingerprint), entering a password or PIN, entering a dynamic key value, entering a predetermined sequence of gestures, etc. In one embodiment, the challenge is the same challenge used to unlock the electronic device 12 after the electronic device 12 goes into a locked state following a period of inactivity or by user action to lock the device. In other embodiment, the challenge may be an advanced challenge requiring additional or different actions than the challenge used to unlock the electronic device 12 after the electronic device 12 goes into a locked state following a period of inactivity or by user action to lock the device. If the challenge is met, the electronic device 12 may be unlocked and enter normal operation at block 88. If the challenge is not met, the electronic device may remain in the lost mode. As indicated, in the lost mode, the electronic device 12 may remain locked and periodically transmit data in block 92.
SIM Security Operation
With additional reference to FIG. 4, shown is an exemplary flow diagram representing steps that may be carried out by the electronic device 12 when executing logical instructions to carry out a hardware security operation. In the illustrated and described embodiment, the hardware security operation is carried out if the SIM card 72 is removed or is replaced with a different SIM card. Other hardware changes to the electronic device 12 may result in execution of the security operation, such as removal of a case, housing component, replacement of the battery 64, removal from a cradle, disconnection from an external power source, etc.
FIG. 4 illustrates an exemplary process flow representing steps that may be carried out by the electronic device 12 when executing the logical instructions to implement the hardware security operation. Complimentary operations of server 10 also will be understood from this disclosure. Although illustrated in a logical progression, the illustrated blocks of FIG. 4 may be carried out in other orders and/or with concurrence between two or more blocks. Therefore, the illustrated flow diagram may be altered (including omitting steps) and/or may be implemented in an object-oriented manner or in a state-oriented manner.
In one embodiment, the hardware security operation may run in the background during normal device operation to check for a condition that triggers entry into a security mode. For example, in block 102, the electronic device 12 may monitor for removal or replacement of the SIM card 72. If the SIM card 72 is not removed or replaced, the electronic device 12 may carry out normal operations in block 104, such as engage in user controlled activities, enter a power save mode when not in use, enter a locked state when not in use, etc.
If the electronic device 12 detects that the SIM card 104 is removed, then the logical flow may progress to block 106. In block 106, the electronic device 12 enters a security mode. The security mode includes locking the electronic device 12 to prevent use of certain operations without satisfying an unlock challenge.
In the locked state, the electronic device 12 may prompt the user for an input to complete a security challenge to unlock the electronic device 12 in block 108. The challenge may be based on entering biometric information (e.g., a fingerprint), entering a password or PIN, entering a dynamic key value, entering a predetermined sequence of gestures, etc. In one embodiment, the challenge is the same challenge used to unlock the electronic device 12 after the electronic device 12 goes into a locked state following a period of inactivity or by user action to lock the device. In other embodiment, the challenge may be an advanced challenge requiring additional or different actions than the challenge used to unlock the electronic device 12 after the electronic device 12 goes into a locked state following a period of inactivity or by user action to lock the device. If the challenge is met in block 110, the electronic device 12 may be unlocked and enter normal operation at block 104.
If the challenge is not met, the electronic device may remain in the security mode. As indicated, in the security mode, the electronic device 12 may remain locked.
Additionally, in block 112, the electronic device may periodically transmit data in block 112. Similar to the transmission of block 92, the transmission of block 112 may be made on a predetermined schedule and/or the time between transmissions may change based on certain events or the length of time that the electronic device 12 remains in the security mode. Also similar to block 92, the data transmitted in block 112 may include a device identifier, such as an IMSI value. The IMSI value may have been retrieved from the SIM card 72 at a prior time and securely stored in memory 40. Other device identifier values are possible, such as serial number of the device, subscriber information, telephone number, or a unique identification code that was previously associated with the SIM card 72 prior to its removal or replacement. The IMSI value, other data retrieved from the SIM card 72 or other device identifier used for the data transmission may be stored in a secure, possibly hidden, location of the memory 40. Additional data that is transmitted may include a last known location of the electronic device 12, such a location determined using the position data receiver 68 or a position determined by the home subscriber network 16. This location determination may be made before the electronic device 12 enters the security mode 112 or during the security mode. Other data that may be transmitted
includes an identification of the server 10 for use by devices that receive the transmission to relay the data from the transmission to the server 10. Also, the IMSI value of other data retrieved from the new SIM card may be included in the data transmission of block 112.
In one embodiment, the transmission of block 112 may be made using full power operations over normal cellular and/or pack-switch transmission protocols (e.g., 3G, 4G, LTE, WiFi, etc.). In an alternative embodiment or in addition to the full power transmission, the transmission of block 1 12 may be made using a NB LTE protocol (also referred to as IoT communication or NB IoT) and/or made as a machine type
communication. In this manner, the advantages of low power consumption and/or potentially more transmission delivery pathways to the server 10 may be realized. The transmission of block 112 may be communicated to the server 10 by devices that receive the transmission and are configured to process the transmission type.
The server 10 may then track location of the electronic device 12, such as by using the techniques described herein. Since replacement of the SIM card is an activity that thieves of mobile devices typically perform, there will be less incentive for thieves to steal mobile devices. This is because the mobile device will be subject to the security mode in which the device will remain locked and is traceable as soon as the SIM card is removed or replaced.
It is noted that the check of block 102 may be carried out at start up of the electronic device 12. In this manner, even if the electronic device 12 is powered off for replacement of the SIM card and reactivated, the replacement of the SIM card will cause the electronic device 12 to enter the security mode. For this purpose, the electronic device 12 may store the IMSI value of an approved SIM card in long term memory for comparison against an IMSI read at start up. Other Applications
The security operation may be used in other contexts. For instance, an item (e.g., an appliance, electronic device, machine, shipping container, vehicle, etc.) may be configured to monitor for a condition that, if changed, would indicate possible
unauthorized movement of the item. Exemplary monitored conditions include, but are not
limited to, the application of external power, an operative communication connection with another device (e.g., over a cable such as USB or over a wireless link such as Bluetooth), and the presence of another item (e.g., a coordinating cradle or stand on which the item is placed). If the condition changes (e.g., removal of the external power source, disruption of the communication connection, or separation from the coordinating item), the item may be further configured to emit the transmission of block 112 unless a security challenge is met. The item may include a battery to power electronics in the item that carry out these functions.
Conclusion Although certain embodiments have been shown and described, it is understood that equivalents and modifications falling within the scope of the appended claims will occur to others who are skilled in the art upon the reading and understanding of this specification.
Claims
What is claimed is: 1. A method of tracking location of an electronic device, comprising:
detecting a condition for which long term location tracking functions of the electronic device are preprogrammed in the electronic device;
locking the electronic device, the locking of the electronic device restricting access to one or more user functions of the electronic device available to the user in an unlocked state; and
transmitting a message by narrow band ( B) long term evolution (LTE), the message for relay by one or more receiving devices to a server that identifies the location of the electronic device and the message containing an identifier value for the electronic device.
2. The method of claim 1, wherein the condition is remaining charge of a battery that powers the electronic device is below a predetermined amount of charge.
3. The method of claim 2, wherein the predetermined amount of charge is a charge amount that is less than five percent.
4. The method of claim 1, wherein the condition is removal or replacement of a subscriber identity module (SIM) card associated with the electronic device.
5. The method of any of claims 1-4, wherein the message includes a location value corresponding to a location of the electronic device determined by the electronic device.
6. The method of claim 5, wherein the location value is determined before the locking of the electronic device.
7. The method of claim 5, wherein the location value is updated upon determination of at least one of movement of the electronic device, receipt of a message from the server to update the location value, or upon a time trigger preprogrammed in the electronic device.
8. The method of any of claims 1-7, further comprising unlocking the electronic device if a security challenge is met.
9. The method of any of claims 1-8, wherein the transmitting of the message is repeated on a periodic basis or according to a predetermined schedule.
10. The method of any of claims 1-9, wherein the identifier value is a value obtained from a SIM card associated with the electronic device.
11. An electronic device, comprising:
communication circuitry; and
control circuitry configured to execute long term location tracking functions embodied in executable logic, the executable logic comprising logic to:
detect a condition that triggers the long term location tracking functions; lock the electronic device to restrict access to one or more user functions of the electronic device available to the user in an unlocked state; and
transmit a message by narrow band ( B) long term evolution (LTE) via the communication circuitry, the message for relay by one or more receiving devices to a server that identifies the location of the electronic device and the message containing an identifier value for the electronic device.
12. The electronic device of claim 11, wherein the condition is remaining charge of a battery that powers the electronic device is below a predetermined amount of charge.
13. The electronic device of claim 12, wherein the predetermined amount of charge is a charge amount that is less than five percent.
14. The electronic device of claim 11, wherein the condition is removal or replacement of a subscriber identity module (SIM) card associated with the electronic device.
15. The electronic device of any of claims 11-14, wherein the message includes a location value corresponding to a location of the electronic device determined by the electronic device.
16. The electronic device of claim 15, wherein the location value is determined before the locking of the electronic device.
17. The electronic device of claim 15, wherein the location value is updated upon determination of at least one of movement of the electronic device, receipt of a message from the server to update the location value, or upon a time trigger
preprogrammed in the electronic device.
18. The electronic device of any of claims 11-17, wherein the executable logic further includes logic to unlock the electronic device if a security challenge is met.
19. The electronic device of any of claims 11-18, wherein the transmitting of the message is repeated on a periodic basis or according to a predetermined schedule.
20. The electronic device of any of claims 11-19, wherein the identifier value is a value obtained from a SIM card associated with the electronic device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2015/067500 WO2017111962A1 (en) | 2015-12-22 | 2015-12-22 | System and method for securing electronic device during low power and following hardware change |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2015/067500 WO2017111962A1 (en) | 2015-12-22 | 2015-12-22 | System and method for securing electronic device during low power and following hardware change |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017111962A1 true WO2017111962A1 (en) | 2017-06-29 |
Family
ID=55650648
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2015/067500 WO2017111962A1 (en) | 2015-12-22 | 2015-12-22 | System and method for securing electronic device during low power and following hardware change |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2017111962A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230156477A1 (en) * | 2020-12-28 | 2023-05-18 | Pismo Labs Technology Limited | Methods and systems for allowing device to send and receive data |
WO2024064467A1 (en) * | 2022-09-22 | 2024-03-28 | Qualcomm Incorporated | Saving battery usage on battery powered devices |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090280826A1 (en) * | 2008-05-09 | 2009-11-12 | Ajay Malik | Integrated Active Tags in Mobile Devices |
EP2621202A1 (en) * | 2012-01-27 | 2013-07-31 | Alcatel Lucent | Mobile communication device tracing |
-
2015
- 2015-12-22 WO PCT/US2015/067500 patent/WO2017111962A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090280826A1 (en) * | 2008-05-09 | 2009-11-12 | Ajay Malik | Integrated Active Tags in Mobile Devices |
EP2621202A1 (en) * | 2012-01-27 | 2013-07-31 | Alcatel Lucent | Mobile communication device tracing |
Non-Patent Citations (1)
Title |
---|
PAGE: "LTE-M - Optimizing LTE for the Internet of Things White Paper Nokia Networks Nokia Networks white paper LTE-M - Optimizing LTE for the Internet of Things FutureWorks Contents", 1 May 2015 (2015-05-01), XP055258450, Retrieved from the Internet <URL:http://networks.nokia.com/sites/default/files/document/nokia_lte-m_-_optimizing_lte_for_the_internet_of_things_white_paper.pdf> [retrieved on 20160315] * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230156477A1 (en) * | 2020-12-28 | 2023-05-18 | Pismo Labs Technology Limited | Methods and systems for allowing device to send and receive data |
WO2024064467A1 (en) * | 2022-09-22 | 2024-03-28 | Qualcomm Incorporated | Saving battery usage on battery powered devices |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11102611B2 (en) | Tracking a mobile device | |
US11216549B2 (en) | Security verification method and device | |
EP3236640B1 (en) | Method and apparatus for detecting and dealing with a lost electronics device | |
US9213810B2 (en) | Systems and methods for identifying unauthorized users of an electronic device | |
US9699594B2 (en) | Mobile user device and method of communication over a wireless medium | |
US20130298208A1 (en) | System for mobile security | |
US20180114417A1 (en) | Method and apparatus for providing a security mechanism on a mobile device | |
CA3087996C (en) | System and method for controlling the power states of a mobile computing device | |
WO2017177789A1 (en) | Anti-theft method and device for mobile terminal | |
US10542434B2 (en) | Evaluating as to whether or not a wireless terminal is authorized | |
WO2017111962A1 (en) | System and method for securing electronic device during low power and following hardware change | |
CN106066953B (en) | Fingerprint unlocking control method and terminal equipment | |
CN111316269A (en) | Terminal security protection method and device | |
US20170017787A1 (en) | Automatically securing an electronic device | |
KR20160023241A (en) | Lost Property Search App smart device using Beacon. | |
EP3076697A1 (en) | Apparatus and method for providing a security mechanism on a mobile device | |
CN106874746B (en) | Application program calling method and device and mobile terminal | |
CN107341391B (en) | Information processing method and related product | |
US11803626B2 (en) | Wireless kill switch | |
US20240127011A1 (en) | Techniques for managing physical cards stored in a physical wallet | |
US9633241B2 (en) | Method and apparatus for battery operated radio tags | |
CN110770730A (en) | Electronic device unlocking method, electronic device, storage medium, and program product | |
CN113849790A (en) | Verification code automatic input method and device, storage medium and electronic equipment | |
Zhao et al. | MMSnap: An MMS based forensic system for recovering stolen phones | |
CN107592417A (en) | Mobile terminal and Related product with high privacy classes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15848166 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 28/08/2018) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15848166 Country of ref document: EP Kind code of ref document: A1 |