WO2006130885A2 - Mobile electronic device - Google Patents
Mobile electronic device Download PDFInfo
- Publication number
- WO2006130885A2 WO2006130885A2 PCT/ZA2006/000073 ZA2006000073W WO2006130885A2 WO 2006130885 A2 WO2006130885 A2 WO 2006130885A2 ZA 2006000073 W ZA2006000073 W ZA 2006000073W WO 2006130885 A2 WO2006130885 A2 WO 2006130885A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic device
- security method
- mobile
- signal
- mobile electronic
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
- H04W8/245—Transfer of terminal data from a network towards a terminal
Definitions
- This invention relates to a mobile electronic device, and a security method for a mobile electronic device.
- PDA Portable Digital Assistants
- This invention proposes a possible solution to this problem.
- a mobile electronic device which includes a receiver which is configured to receive a deactivation signal from a remote transmitter; and a security module arranged in communication with the receiver, which module is configured to deactivate said electronic device when the receiver receives the deactivation signal, in use.
- the electronic device may include a mobile telephone.
- the electronic device may include a handheld computer.
- the electronic device may include a portable digital assistant (PDA).
- PDA portable digital assistant
- the electronic device may include a digital camera. It is to be appreciated that the electronic device may include any type of portable electronic equipment.
- the receiver may be a receiver of the electronic device. Otherwise, the receiver may be a dedicated receiver of the security module.
- the security module may be configured to temporarily deactivate the device, e.g. the device is reactivated after a predetermined time delay, upon receipt of a further activation signal, and/or the like. Otherwise, the module may be configured to permanently deactivate the device by rendering a crucial element of said device inoperable, e.g. destroy a central processor, destroy all the electronic components with an electrical surge, or the like.
- the device may include an alarm which is activated when the security module deactivates the mobile device, e.g. an audio alarm, or the like.
- the security module may include an alarm which is activated when the receiver receives the deactivation signal.
- the device may include a transmitter which is configured to transmit the geographical location of the device to a remote receiver upon instruction from the module so that the device is able to be located.
- the security module may include a transmitter which is configured to transmit the geographical location of the device to a remote receiver so that the device is able to be tracked.
- the remote transmitter may include a remote control device, a computer interfaced with a network, a telephone, and/or the like.
- a security method for a mobile electronic device which method includes the steps of receiving an electronic deactivation request from a requester which request uniquely identifies a specific mobile electronic device; and automatically transmitting a deactivation signal to the uniquely identified mobile electronic device in order to deactivate said device.
- the step of receiving the request may include receiving the request via an electronic network.
- the network may include a mobile telephone network.
- the network may include a computer network, e.g. the Internet, or the like.
- the network may include a radio network.
- the network may include a land-based telephone network.
- the request may uniquely identify the mobile device by including a specific identity code of said device, e.g. an International Mobile Equipment Identification (IMEI) number, or the like.
- IMEI International Mobile Equipment Identification
- the request may uniquely identify the device by a predetermined code which has been previously assigned to that device in a registration process, or the like. Accordingly, the method may include the step of first registering a mobile device before receiving the deactivation request.
- the step of transmitting the deactivation signal may include transmitting a general deactivation code over an electronic network which signal is configured to only deactivate the identified device. Otherwise, the step of transmitting the signal may include first locating the device before transmitting a specific deactivation signal to that specific device.
- the electronic device may include a mobile telephone.
- the electronic device may include a handheld computer.
- the electronic device may include a portable digital assistant (PDA).
- PDA portable digital assistant
- the electronic device may include a digital camera.
- the electronic device may include any type of portable electronic equipment.
- the deactivation signal may be configured to temporarily deactivate the device, e.g. the device is reactivated after a predetermined time delay, upon receipt of a further activation signal, and/or the like. Otherwise, the deactivation signal may be configured to permanently deactivate the device by facilitating in rendering a crucial element of said device inoperable, e.g. destroying a central processor, or the like.
- the deactivation signal may include an alarm signal which activates an alarm in the electronic device upon reception of the signal.
- the method may include the further step of receiving a location signal from the device which location signal includes a geographical location of the device so that the device is able to be tracked.
- Figure 1 shows, in perspective view, a mobile electronic device, in accordance with the invention.
- Figure 2 shows, in diagrammatic view, a security method for a mobile electronic device.
- a mobile electronic device in accordance with the invention, is generally indicated by reference numeral 10.
- the device 10 includes a receiver 12, a security module 14, and an alarm 16.
- the electronic device 10 is a mobile telephone. It is to be appreciated that, in further embodiments of the invention, the electronic device 10 may include a handheld computer, a portable digital assistant (PDA), a digital camera, or any other type of portable electronic equipment.
- PDA portable digital assistant
- the receiver 12 is generally configured to receive a deactivation signal from a remote transmitter (not shown).
- the receiver 12 is a receiver of the electronic device 10 itself, i.e. the receiver used by the mobile telephone. It is however to be appreciated that, in further embodiments, the receiver 12 may be a dedicated receiver of the security module 14.
- a digital camera may not have a receiver to perform its function, and the security module 14 then has a dedicated receiver.
- the security module 14 is arranged in communication with the receiver 12, and the module 14 is configured to deactivate said electronic device 10 when the receiver 12 receives the deactivation signal from a remote transmitter.
- the security module 14 is configured to temporarily deactivate the device 10, e.g. the device 10 is reactivated after a predetermined time delay, upon receipt of a further activation signal, and/or the like.
- the module 14 is configured to permanently deactivate the device 10 by rendering a crucial element of said device 10 inoperable, e.g. by destroying a central processor, or the like.
- the crucial element is typically a component without which the device 10 cannot function, such as a processor, or the like.
- the module 14 is configured to destroy the electronic device 10 completely, e.g. destroy all the electronic components with an electrical surge, or the like. It is to be appreciated that by destroying all the electronic components, it is not possible to salvage some of the components for spare parts. This provides further deterrence to would-be thieves.
- the device 10 also includes an alarm 16 which is activated when the security module 14 deactivates the mobile device 10 upon receipt of the signal.
- the alarm 16 is typically an audio alarm, or the like. This audio alarm will generally be an inherent alarm of the device 10, e.g. a speaker, or the like of the mobile telephone.
- the security module 14 may include the alarm 16 which is activated when the receiver receives the deactivation signal. This would be the case where the device 10 does not include an inherent alarm.
- the remote transmitter is typically a remote control device which uses a satellite network to transmit the deactivation signal to the device.
- the remote transmitter may be a computer connected to a network which sends the deactivation signal, e.g. across the Internet, or the like.
- the remote transmitter may also be a telephone whereby the deactivation signal is requested.
- the device 10 or module 14 may include a transmitter (not shown) which is configured to transmit the geographical location of the device 10 to a remote receiver (not shown) so that the device 10 is able to be tracked. For example, a GPS (Global Positioning System), or the like.
- the invention also extends to the embodiment of the security module 14 and a remote activator (not shown) which is not fitted to an electronic device 10.
- the module is typically configured to be retrofitted to an electronic device 10. For example, fitted between a battery and housing of such a device, or the like.
- the security method 18 for a mobile electronic device 10 includes the steps of receiving 22 an electronic deactivation request from a requester, and automatically transmitting 24 a deactivation signal to the identified device. In this manner the device 10 is deactivated.
- the electronic request is able to uniquely identify the mobile electronic device.
- the step of receiving 22 the request generally includes receiving 22 the request via an electronic network.
- the network may include a mobile telephone network, a computer network, a radio network, a land-based telephone network, and/or the like. It is to be appreciated that the network can include any type of electronic communications network.
- the request generally uniquely identifies the mobile device by including a specific identity code of said device, e.g. an International Mobile Equipment Identification (IMEI) number, or the like. Otherwise, the request may uniquely identify the device by a predetermined code which has been previously assigned to that device in a registration process, or the like. Accordingly, the method 18 then includes the further step of first registering 20 a unique identifier of the device.
- IMEI International Mobile Equipment Identification
- the step of transmitting 24 the deactivation signal may include transmitting a general deactivation code over an electronic network which signal is configured to only deactivate the identified device. Otherwise, the step of transmitting 24 the signal may include first locating the device before transmitting a specific deactivation signal to that specific device, e.g. first locating a mobile telephone and then sending the deactivation signal to a specific transmitter servicing a cell of that particular phone.
- the deactivation signal temporarily deactivates the device, e.g. the device is reactivated after a predetermined time delay, upon receipt of a further activation signal, and/or the like. Otherwise, the deactivation signal permanently deactivates the device by facilitating in rendering a crucial element of said device inoperable, e.g. destroying a central processor, or the like.
- the deactivation signal may also include an alarm signal which activates an alarm in the electronic device upon reception of the signal.
- the method 18 includes the further step of receiving 26 a location signal from the device which location signal includes a geographical location of the device so that the device is able to be tracked.
- deactivating signal In use, once a person realizes that his/her mobile telephone, for example, has been stolen, he/she is able to transmit the deactivating signal to the security module in order to deactivate the phone. Such deactivation may be temporary or permanent, as described above. Temporary deactivation will typically involve locating the telephone handset to retrieve it, as described above. Else, in other embodiments, the mobile handset is completely destroyed to render it useless to the thief.
- the invention includes a variety of ways to transmit the deactivating signal.
- the deactivating signal is sent via the telecommunications network of the mobile handset, i.e. the network of the mobile service provider. This signal uniquely identifies the handset and deactivates it using the security module 14. It is also envisaged that a person is able to transmit the deactivating signal via a computer network.
- a person is able to request deactivation via a specific website, where the IMEl number of the phone is entered and the deactivation signal is sent via the mobile network. It is also possible to transmit the deactivating signal via a separate radio network, or the like. As such, the deactivating signal may also be sent via a remote control device over a radio frequency, or the like.
- the Inventor regards it as an advantage that the invention provides a means whereby a stolen electronic device can be deactivated to serve as a deterrent to thieves.
- the Inventor regards it as a further advantage that the device is able to be tracked if stolen in order to retrieve the device.
Abstract
A mobile electronic device 10 includes a receiver 12 for receiving a deactivation signal from a remote transmitter, and a security module 14 for deactivating the device 10 upon receipt of such signal. One embodiment also provides for an alarm 16 for alerting that the phone has been deactivated. The invention also includes a security method associated with the device 10.
Description
MOBILE ELECTRONIC DEVICE
FIELD OF THE INVENTION
This invention relates to a mobile electronic device, and a security method for a mobile electronic device.
BACKGROUND TO THE INVENTION
The theft of mobile electronic devices, such as mobile telephones,
Portable Digital Assistants (PDA's), palmtops, and the like, is a widespread problem.
The relative small size and portability of these devices make them an easy and profitable target for criminals. It is quite simple to steal such a device and sell it, as these devices are able to be used by another person with minor modifications and/or retrofitting of a new identity module like a Security Identity Module (SIM), or the like.
This invention proposes a possible solution to this problem.
SUMMARY OF THE INVENTION
According to one aspect of the invention there is provided a mobile electronic device which includes a receiver which is configured to receive a deactivation signal from a remote transmitter; and a security module arranged in communication with the receiver, which module is configured to deactivate said electronic device when the receiver receives the deactivation signal, in use.
The electronic device may include a mobile telephone. The electronic device may include a handheld computer. The electronic device may include a portable digital assistant (PDA). The electronic device may include a digital camera. It is to be appreciated that the electronic device may include any type of portable electronic equipment.
The receiver may be a receiver of the electronic device. Otherwise, the receiver may be a dedicated receiver of the security module.
The security module may be configured to temporarily deactivate the device, e.g. the device is reactivated after a predetermined time delay, upon receipt of a further activation signal, and/or the like. Otherwise, the module may be configured to permanently deactivate the device by rendering a crucial element of said device inoperable, e.g. destroy a central processor, destroy all the electronic components with an electrical surge, or the like.
The device may include an alarm which is activated when the security module deactivates the mobile device, e.g. an audio alarm, or the like. Otherwise, the security module may include an alarm which is activated when the receiver receives the deactivation signal.
The device may include a transmitter which is configured to transmit the geographical location of the device to a remote receiver upon instruction from the module so that the device is able to be located. Otherwise, the security module may include a transmitter which is configured to transmit the geographical location of the device to a remote receiver so that the device is able to be tracked.
The remote transmitter may include a remote control device, a computer interfaced with a network, a telephone, and/or the like.
According to a second aspect of the invention there is provided a security method for a mobile electronic device which method includes the steps of receiving an electronic deactivation request from a requester which request uniquely identifies a specific mobile electronic device; and automatically transmitting a deactivation signal to the uniquely identified mobile electronic device in order to deactivate said device.
The step of receiving the request may include receiving the request via an electronic network. Accordingly, the network may include a mobile telephone network. The network may include a computer network, e.g. the Internet, or the like. The network
may include a radio network. The network may include a land-based telephone network.
The request may uniquely identify the mobile device by including a specific identity code of said device, e.g. an International Mobile Equipment Identification (IMEI) number, or the like.
The request may uniquely identify the device by a predetermined code which has been previously assigned to that device in a registration process, or the like. Accordingly, the method may include the step of first registering a mobile device before receiving the deactivation request.
The step of transmitting the deactivation signal may include transmitting a general deactivation code over an electronic network which signal is configured to only deactivate the identified device. Otherwise, the step of transmitting the signal may include first locating the device before transmitting a specific deactivation signal to that specific device.
As such, the electronic device may include a mobile telephone. The electronic device may include a handheld computer. The electronic device may include a portable digital assistant (PDA). The electronic device may include a digital camera.
It is to be appreciated that the electronic device may include any type of portable electronic equipment.
The deactivation signal may be configured to temporarily deactivate the device, e.g. the device is reactivated after a predetermined time delay, upon receipt of a further activation signal, and/or the like. Otherwise, the deactivation signal may be configured to permanently deactivate the device by facilitating in rendering a crucial element of said device inoperable, e.g. destroying a central processor, or the like.
The deactivation signal may include an alarm signal which activates an alarm in the electronic device upon reception of the signal.
The method may include the further step of receiving a location signal from the device which location signal includes a geographical location of the device so that the device is able to be tracked.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention is now described, by way of non-limiting example, with reference to the accompanying drawings wherein
Figure 1 shows, in perspective view, a mobile electronic device, in accordance with the invention; and
Figure 2 shows, in diagrammatic view, a security method for a mobile electronic device.
DETAILED DESCRIPTION OF THE INVENTION
With reference to the accompanying drawings, a mobile electronic device, in accordance with the invention, is generally indicated by reference numeral 10.
In the embodiment shown, the device 10 includes a receiver 12, a security module 14, and an alarm 16.
In the embodiment shown, the electronic device 10 is a mobile telephone. It is to be appreciated that, in further embodiments of the invention, the electronic device 10 may include a handheld computer, a portable digital assistant (PDA), a digital camera, or any other type of portable electronic equipment.
The receiver 12 is generally configured to receive a deactivation signal from a remote transmitter (not shown). In the embodiment shown, the receiver 12 is a receiver of the electronic device 10 itself, i.e. the receiver used by the mobile telephone. It is however to be appreciated that, in further embodiments, the receiver 12 may be a dedicated receiver of the security module 14. For example, a digital camera may not have a receiver to perform its function, and the security module 14 then has a dedicated receiver.
The security module 14 is arranged in communication with the receiver 12, and the module 14 is configured to deactivate said electronic device 10 when the receiver 12 receives the deactivation signal from a remote transmitter.
In one embodiment of the invention, the security module 14 is configured to temporarily deactivate the device 10, e.g. the device 10 is reactivated after a predetermined time delay, upon receipt of a further activation signal, and/or the like.
In a further embodiment of the invention, the module 14 is configured to permanently deactivate the device 10 by rendering a crucial element of said device 10 inoperable, e.g. by destroying a central processor, or the like. It is to be appreciated that the crucial element is typically a component without which the device 10 cannot function, such as a processor, or the like.
In a yet further embodiment of the invention, the module 14 is configured to destroy the electronic device 10 completely, e.g. destroy all the electronic components with an electrical surge, or the like. It is to be appreciated that by destroying all the electronic components, it is not possible to salvage some of the components for spare parts. This provides further deterrence to would-be thieves.
In a preferred embodiment of the invention, the device 10 also includes an alarm 16 which is activated when the security module 14 deactivates the mobile device 10 upon receipt of the signal. The alarm 16 is typically an audio alarm, or the like. This audio alarm will generally be an inherent alarm of the device 10, e.g. a speaker, or the like of the mobile telephone.
Otherwise, the security module 14 may include the alarm 16 which is activated when the receiver receives the deactivation signal. This would be the case where the device 10 does not include an inherent alarm.
The remote transmitter is typically a remote control device which uses a satellite network to transmit the deactivation signal to the device. Otherwise, in further embodiments, the remote transmitter may be a computer connected to a network which sends the deactivation signal, e.g. across the Internet, or the like. The remote transmitter may also be a telephone whereby the deactivation signal is requested.
Additionally, the device 10 or module 14 may include a transmitter (not shown) which is configured to transmit the geographical location of the device 10 to a remote receiver (not shown) so that the device 10 is able to be tracked. For example, a GPS (Global Positioning System), or the like.
It is to be appreciated that the invention also extends to the embodiment of the security module 14 and a remote activator (not shown) which is not fitted to an electronic device 10. In this embodiment, the module is typically configured to be retrofitted to an electronic device 10. For example, fitted between a battery and housing of such a device, or the like.
As shown in Figure 2, the security method 18 for a mobile electronic device 10 includes the steps of receiving 22 an electronic deactivation request from a requester, and automatically transmitting 24 a deactivation signal to the identified device. In this manner the device 10 is deactivated.
The electronic request is able to uniquely identify the mobile electronic device. As such, the step of receiving 22 the request generally includes receiving 22 the request via an electronic network. Accordingly, the network may include a mobile telephone network, a computer network, a radio network, a land-based telephone network, and/or the like. It is to be appreciated that the network can include any type of electronic communications network.
The request generally uniquely identifies the mobile device by including a specific identity code of said device, e.g. an International Mobile Equipment Identification (IMEI) number, or the like. Otherwise, the request may uniquely identify the device by a predetermined code which has been previously assigned to that device in a registration process, or the like. Accordingly, the method 18 then includes the further step of first registering 20 a unique identifier of the device.
The step of transmitting 24 the deactivation signal may include transmitting a general deactivation code over an electronic network which signal is configured to only deactivate the identified device. Otherwise, the step of transmitting 24 the signal may include first locating the device before transmitting a specific
deactivation signal to that specific device, e.g. first locating a mobile telephone and then sending the deactivation signal to a specific transmitter servicing a cell of that particular phone.
In one embodiment, the deactivation signal temporarily deactivates the device, e.g. the device is reactivated after a predetermined time delay, upon receipt of a further activation signal, and/or the like. Otherwise, the deactivation signal permanently deactivates the device by facilitating in rendering a crucial element of said device inoperable, e.g. destroying a central processor, or the like.
In addition, the deactivation signal may also include an alarm signal which activates an alarm in the electronic device upon reception of the signal.
In a further embodiment, the method 18 includes the further step of receiving 26 a location signal from the device which location signal includes a geographical location of the device so that the device is able to be tracked.
In use, once a person realizes that his/her mobile telephone, for example, has been stolen, he/she is able to transmit the deactivating signal to the security module in order to deactivate the phone. Such deactivation may be temporary or permanent, as described above. Temporary deactivation will typically involve locating the telephone handset to retrieve it, as described above. Else, in other embodiments, the mobile handset is completely destroyed to render it useless to the thief.
It is to be appreciated that the invention includes a variety of ways to transmit the deactivating signal. In one embodiment, the deactivating signal is sent via the telecommunications network of the mobile handset, i.e. the network of the mobile service provider. This signal uniquely identifies the handset and deactivates it using the security module 14. It is also envisaged that a person is able to transmit the deactivating signal via a computer network.
For example, a person is able to request deactivation via a specific website, where the IMEl number of the phone is entered and the deactivation signal is sent via the mobile network. It is also possible to transmit the deactivating signal via a
separate radio network, or the like. As such, the deactivating signal may also be sent via a remote control device over a radio frequency, or the like.
It shall be understood that the examples are provided for illustrating the invention further and to assist a person skilled in the art with understanding the invention and is not meant to be construed as unduly limiting the reasonable scope of the invention.
The Inventor regards it as an advantage that the invention provides a means whereby a stolen electronic device can be deactivated to serve as a deterrent to thieves. The Inventor regards it as a further advantage that the device is able to be tracked if stolen in order to retrieve the device.
Claims
1. A mobile electronic device which includes a receiver which is configured to receive a deactivation signal from a remote transmitter; and a security module arranged in communication with the receiver, which module is configured to deactivate said electronic device when the receiver receives the deactivation signal.
2. A mobile electronic device as claimed in claim 2, wherein the electronic device includes a mobile telephone.
3. A mobile electronic device as claimed in claim 2, wherein the electronic device includes a handheld computer.
4. A mobile electronic device as claimed in claim 2 wherein the electronic device includes a portable digital assistant (PDA).
5. A mobile electronic device as claimed in claim 2, wherein the electronic device includes a digital camera.
6. A mobile electronic device as claimed in any one of claims 1 to 5, wherein the security module is configured to temporarily deactivate the device.
7. A mobile electronic device as claimed in claim 6, wherein the security module is configured to activate the device upon receipt of a further instructing signal by the receiver.
8. A mobile electronic device as claimed in any one of claims 1 to 5, wherein the security module is configured to permanently deactivate the device by rendering a crucial element of said device inoperable.
9. A mobile electronic device as claimed in any one of claims 1 to 8, which includes an alarm which is configured to be activated when the security module deactivates the mobile device.
10. A mobile electronic device as claimed in any one of claims 1 to 9, which includes a transmitter configured to transmit the geographical location of the device to a remote receiver so that the device is able to be tracked when the security module has deactivated said device.
11. A mobile electronic device as claimed in any one of claims 1 to 10, wherein the remote transmitter includes a remote control device.
12. A mobile electronic device as claimed in any one of claims 1 to 11 , wherein the remote transmitter includes a computer interfaced with a communications network for transmitting the deactivation signal.
13. A mobile electronic device as claimed in any one of claims 1 to 12, wherein the remote transmitter includes a telephone handset transmitting the deactivation signal via a suitable communications network.
14. A security method for a mobile electronic device, which method includes the steps of receiving an electronic deactivation request from a requester which request uniquely identifies a specific mobile electronic device; and automatically transmitting a deactivation signal to the uniquely identified mobile electronic device in order to deactivate said device.
15. A security method as claimed in claim 14, wherein the step of receiving the request includes receiving the request via an electronic network.
16. A security method as claimed in claim 15, wherein the network includes a mobile telephone network.
17. A security method as claimed in either one of claims 15 or 16, wherein the network includes a computer network.
18. A security method as claimed in any one of claims 15 to 17, wherein the network includes a radio network.
19. A security method as claimed in any one of claims 15 to 18, wherein the network includes a land-based telephone network.
20. A security method as claimed in any one of claims 14 to 19, wherein the request uniquely identifies the mobile device by including a specific identity code of said device.
21. A security method as claimed in claim 20, wherein the identity code includes an International Mobile Equipment Identification (IMEI) number.
22. A security method as claimed in any one of claims 14 to 19, wherein the request uniquely identifies the device by a predetermined code which has been previously assigned to that device in a registration process.
23. A security method as claimed in claim 22, which includes the step of first registering a mobile device before receiving the deactivation request.
24. A security method as claimed in any one of claims 14 to 23, wherein the step of transmitting the deactivation signal includes transmitting a general deactivation code over an electronic network which signal is configured to only deactivate the identified device.
25. A security method as claimed in any one of claims 14 to 24, wherein the step of transmitting the signal includes first locating the device before transmitting a specific deactivation signal to that specific device.
26. A security method as claimed in any one of claims 14 to 25, wherein the electronic device includes a mobile telephone.
27. A security method as claimed in any one of claims 14 to 25, wherein the electronic device includes a handheld computer.
28. A security method as claimed in any one of claims 14 to 25, wherein the electronic device includes a portable digital assistant (PDA).
29. A security method as claimed in any one of claims 14 to 25, wherein the electronic device includes a digital camera.
30. A security method as claimed in any one of claims 14 to 29, wherein the deactivation signal is configured to temporarily deactivate the device.
31. A security method as claimed in any one of claims 14 to 29, wherein the deactivation signal is configured to permanently deactivate the device by facilitating in rendering a crucial element of said device inoperable.
32. A security method as claimed in any one of claims 14 to 31 , wherein the deactivation signal includes an alarm signal which activates an alarm in the electronic device upon reception of the signal.
33. A security method as claimed in any one of claims 14 to 32, which includes the further step of receiving a location signal from the device, which location signal includes a geographical location of the device so that the device is able to be located.
34. A mobile electronic device as claimed in claim 1 or a security method as claimed in claim or 14, substantially as herein described and illustrated.
35. A new mobile electronic device or a new security method, substantially as herein described.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ZA2005/4554 | 2005-06-03 | ||
ZA200504554 | 2005-06-03 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2006130885A2 true WO2006130885A2 (en) | 2006-12-07 |
WO2006130885A3 WO2006130885A3 (en) | 2012-08-30 |
Family
ID=37482382
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/ZA2006/000073 WO2006130885A2 (en) | 2005-06-03 | 2006-06-05 | Mobile electronic device |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2006130885A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2488973A (en) * | 2011-02-28 | 2012-09-19 | Zulkarin Jahangir | Remote client for securely accessing medical data and services |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5384564A (en) * | 1992-01-23 | 1995-01-24 | Keith H. Wycoff | Battery saving arrangement for selectively addressable, portable receivers |
US5459448A (en) * | 1994-06-27 | 1995-10-17 | Dortenzio; Christopher J. | Automotive continuous protection anti-theft system |
EP0891110A1 (en) * | 1997-07-10 | 1999-01-13 | Alcatel | Method and system for preventing a mobile station from causing disturbance |
FR2775862A1 (en) * | 1998-03-05 | 1999-09-10 | Rene Feghali | REMOTE CONTROL SYSTEM FOR DEACTIVATION / REACTIVATION OF SIGNALS TRANSMITTED BY A PORTABLE TELEPHONE AND METHOD FOR IMPLEMENTING SAID SYSTEM |
EP1441235A2 (en) * | 2003-01-22 | 2004-07-28 | Avon and Somerset Police Authority | Location system |
WO2005031544A2 (en) * | 2003-09-26 | 2005-04-07 | Disney Enterprises, Inc. | Cell phone parental control |
-
2006
- 2006-06-05 WO PCT/ZA2006/000073 patent/WO2006130885A2/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5384564A (en) * | 1992-01-23 | 1995-01-24 | Keith H. Wycoff | Battery saving arrangement for selectively addressable, portable receivers |
US5459448A (en) * | 1994-06-27 | 1995-10-17 | Dortenzio; Christopher J. | Automotive continuous protection anti-theft system |
EP0891110A1 (en) * | 1997-07-10 | 1999-01-13 | Alcatel | Method and system for preventing a mobile station from causing disturbance |
FR2775862A1 (en) * | 1998-03-05 | 1999-09-10 | Rene Feghali | REMOTE CONTROL SYSTEM FOR DEACTIVATION / REACTIVATION OF SIGNALS TRANSMITTED BY A PORTABLE TELEPHONE AND METHOD FOR IMPLEMENTING SAID SYSTEM |
EP1441235A2 (en) * | 2003-01-22 | 2004-07-28 | Avon and Somerset Police Authority | Location system |
WO2005031544A2 (en) * | 2003-09-26 | 2005-04-07 | Disney Enterprises, Inc. | Cell phone parental control |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2488973A (en) * | 2011-02-28 | 2012-09-19 | Zulkarin Jahangir | Remote client for securely accessing medical data and services |
Also Published As
Publication number | Publication date |
---|---|
WO2006130885A3 (en) | 2012-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6975222B2 (en) | Asset tracking apparatus and method | |
US6987975B1 (en) | Method of generating control signals based on location of radio terminals | |
US6813498B1 (en) | Apparatus, method and system for detection and recovery of missing wireless devices in communication systems | |
RU2418387C2 (en) | Method to disable mobile device | |
KR101140904B1 (en) | Apparatus and methods for locating, tracking and/or recovering a wireless communication device | |
US20180072263A1 (en) | Vehicle-disabling remote anti-theft system and method | |
JP2003296859A (en) | Active assistance requesting antitheft system and method therefor | |
CN104838681A (en) | Fake base station detection with core network support | |
JP2006203902A (en) | Mobile device including rfid tag reader | |
US20110077051A1 (en) | UICC Control Over Devices Used to Obtain Service | |
US20040198441A1 (en) | Wireless communication device and method | |
EP1834472A2 (en) | Triggering an emergency mode in a radio communication system and methods thereof | |
WO2015038312A1 (en) | Method of and system for controlling communications over a public safety network | |
CN101445095B (en) | Anti-theft alarming method of an on-line automobile and alarm system thereof | |
CN104219317A (en) | Router, system and method for anti-theft tracking for mobile terminal on basis of location positioning | |
WO2006130885A2 (en) | Mobile electronic device | |
EP1480856B1 (en) | A method and system for identifying an unauthorized use of a telematic device | |
EP2780900B1 (en) | Systems and methods for recovering low power devices | |
EP1329127A2 (en) | Method and apparatus for securing a mobile electronic device based on location | |
CN104640075A (en) | Mobile terminal security management method and mobile terminal | |
CN101519062B (en) | Anti-theft alarm method for networked motor vehicle and alarm system thereof | |
EP1510831B1 (en) | Two-way tracking system and method using an existing wireless network | |
CN104973011A (en) | Method and apparatus for preventing vehicles from being stolen | |
JP4030338B2 (en) | Communication terminal | |
Khimani et al. | IoT Security and Hardware Implementation using DTMF 8870. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NENP | Non-entry into the national phase in: |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC DATED 22.04.2008. |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06760764 Country of ref document: EP Kind code of ref document: A2 |