WO2006130885A2 - Mobile electronic device - Google Patents

Mobile electronic device Download PDF

Info

Publication number
WO2006130885A2
WO2006130885A2 PCT/ZA2006/000073 ZA2006000073W WO2006130885A2 WO 2006130885 A2 WO2006130885 A2 WO 2006130885A2 ZA 2006000073 W ZA2006000073 W ZA 2006000073W WO 2006130885 A2 WO2006130885 A2 WO 2006130885A2
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
security method
mobile
signal
mobile electronic
Prior art date
Application number
PCT/ZA2006/000073
Other languages
French (fr)
Other versions
WO2006130885A3 (en
Inventor
Janice Tarryn Susan Saul
Original Assignee
Janice Tarryn Susan Saul
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Janice Tarryn Susan Saul filed Critical Janice Tarryn Susan Saul
Publication of WO2006130885A2 publication Critical patent/WO2006130885A2/en
Publication of WO2006130885A3 publication Critical patent/WO2006130885A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal

Definitions

  • This invention relates to a mobile electronic device, and a security method for a mobile electronic device.
  • PDA Portable Digital Assistants
  • This invention proposes a possible solution to this problem.
  • a mobile electronic device which includes a receiver which is configured to receive a deactivation signal from a remote transmitter; and a security module arranged in communication with the receiver, which module is configured to deactivate said electronic device when the receiver receives the deactivation signal, in use.
  • the electronic device may include a mobile telephone.
  • the electronic device may include a handheld computer.
  • the electronic device may include a portable digital assistant (PDA).
  • PDA portable digital assistant
  • the electronic device may include a digital camera. It is to be appreciated that the electronic device may include any type of portable electronic equipment.
  • the receiver may be a receiver of the electronic device. Otherwise, the receiver may be a dedicated receiver of the security module.
  • the security module may be configured to temporarily deactivate the device, e.g. the device is reactivated after a predetermined time delay, upon receipt of a further activation signal, and/or the like. Otherwise, the module may be configured to permanently deactivate the device by rendering a crucial element of said device inoperable, e.g. destroy a central processor, destroy all the electronic components with an electrical surge, or the like.
  • the device may include an alarm which is activated when the security module deactivates the mobile device, e.g. an audio alarm, or the like.
  • the security module may include an alarm which is activated when the receiver receives the deactivation signal.
  • the device may include a transmitter which is configured to transmit the geographical location of the device to a remote receiver upon instruction from the module so that the device is able to be located.
  • the security module may include a transmitter which is configured to transmit the geographical location of the device to a remote receiver so that the device is able to be tracked.
  • the remote transmitter may include a remote control device, a computer interfaced with a network, a telephone, and/or the like.
  • a security method for a mobile electronic device which method includes the steps of receiving an electronic deactivation request from a requester which request uniquely identifies a specific mobile electronic device; and automatically transmitting a deactivation signal to the uniquely identified mobile electronic device in order to deactivate said device.
  • the step of receiving the request may include receiving the request via an electronic network.
  • the network may include a mobile telephone network.
  • the network may include a computer network, e.g. the Internet, or the like.
  • the network may include a radio network.
  • the network may include a land-based telephone network.
  • the request may uniquely identify the mobile device by including a specific identity code of said device, e.g. an International Mobile Equipment Identification (IMEI) number, or the like.
  • IMEI International Mobile Equipment Identification
  • the request may uniquely identify the device by a predetermined code which has been previously assigned to that device in a registration process, or the like. Accordingly, the method may include the step of first registering a mobile device before receiving the deactivation request.
  • the step of transmitting the deactivation signal may include transmitting a general deactivation code over an electronic network which signal is configured to only deactivate the identified device. Otherwise, the step of transmitting the signal may include first locating the device before transmitting a specific deactivation signal to that specific device.
  • the electronic device may include a mobile telephone.
  • the electronic device may include a handheld computer.
  • the electronic device may include a portable digital assistant (PDA).
  • PDA portable digital assistant
  • the electronic device may include a digital camera.
  • the electronic device may include any type of portable electronic equipment.
  • the deactivation signal may be configured to temporarily deactivate the device, e.g. the device is reactivated after a predetermined time delay, upon receipt of a further activation signal, and/or the like. Otherwise, the deactivation signal may be configured to permanently deactivate the device by facilitating in rendering a crucial element of said device inoperable, e.g. destroying a central processor, or the like.
  • the deactivation signal may include an alarm signal which activates an alarm in the electronic device upon reception of the signal.
  • the method may include the further step of receiving a location signal from the device which location signal includes a geographical location of the device so that the device is able to be tracked.
  • Figure 1 shows, in perspective view, a mobile electronic device, in accordance with the invention.
  • Figure 2 shows, in diagrammatic view, a security method for a mobile electronic device.
  • a mobile electronic device in accordance with the invention, is generally indicated by reference numeral 10.
  • the device 10 includes a receiver 12, a security module 14, and an alarm 16.
  • the electronic device 10 is a mobile telephone. It is to be appreciated that, in further embodiments of the invention, the electronic device 10 may include a handheld computer, a portable digital assistant (PDA), a digital camera, or any other type of portable electronic equipment.
  • PDA portable digital assistant
  • the receiver 12 is generally configured to receive a deactivation signal from a remote transmitter (not shown).
  • the receiver 12 is a receiver of the electronic device 10 itself, i.e. the receiver used by the mobile telephone. It is however to be appreciated that, in further embodiments, the receiver 12 may be a dedicated receiver of the security module 14.
  • a digital camera may not have a receiver to perform its function, and the security module 14 then has a dedicated receiver.
  • the security module 14 is arranged in communication with the receiver 12, and the module 14 is configured to deactivate said electronic device 10 when the receiver 12 receives the deactivation signal from a remote transmitter.
  • the security module 14 is configured to temporarily deactivate the device 10, e.g. the device 10 is reactivated after a predetermined time delay, upon receipt of a further activation signal, and/or the like.
  • the module 14 is configured to permanently deactivate the device 10 by rendering a crucial element of said device 10 inoperable, e.g. by destroying a central processor, or the like.
  • the crucial element is typically a component without which the device 10 cannot function, such as a processor, or the like.
  • the module 14 is configured to destroy the electronic device 10 completely, e.g. destroy all the electronic components with an electrical surge, or the like. It is to be appreciated that by destroying all the electronic components, it is not possible to salvage some of the components for spare parts. This provides further deterrence to would-be thieves.
  • the device 10 also includes an alarm 16 which is activated when the security module 14 deactivates the mobile device 10 upon receipt of the signal.
  • the alarm 16 is typically an audio alarm, or the like. This audio alarm will generally be an inherent alarm of the device 10, e.g. a speaker, or the like of the mobile telephone.
  • the security module 14 may include the alarm 16 which is activated when the receiver receives the deactivation signal. This would be the case where the device 10 does not include an inherent alarm.
  • the remote transmitter is typically a remote control device which uses a satellite network to transmit the deactivation signal to the device.
  • the remote transmitter may be a computer connected to a network which sends the deactivation signal, e.g. across the Internet, or the like.
  • the remote transmitter may also be a telephone whereby the deactivation signal is requested.
  • the device 10 or module 14 may include a transmitter (not shown) which is configured to transmit the geographical location of the device 10 to a remote receiver (not shown) so that the device 10 is able to be tracked. For example, a GPS (Global Positioning System), or the like.
  • the invention also extends to the embodiment of the security module 14 and a remote activator (not shown) which is not fitted to an electronic device 10.
  • the module is typically configured to be retrofitted to an electronic device 10. For example, fitted between a battery and housing of such a device, or the like.
  • the security method 18 for a mobile electronic device 10 includes the steps of receiving 22 an electronic deactivation request from a requester, and automatically transmitting 24 a deactivation signal to the identified device. In this manner the device 10 is deactivated.
  • the electronic request is able to uniquely identify the mobile electronic device.
  • the step of receiving 22 the request generally includes receiving 22 the request via an electronic network.
  • the network may include a mobile telephone network, a computer network, a radio network, a land-based telephone network, and/or the like. It is to be appreciated that the network can include any type of electronic communications network.
  • the request generally uniquely identifies the mobile device by including a specific identity code of said device, e.g. an International Mobile Equipment Identification (IMEI) number, or the like. Otherwise, the request may uniquely identify the device by a predetermined code which has been previously assigned to that device in a registration process, or the like. Accordingly, the method 18 then includes the further step of first registering 20 a unique identifier of the device.
  • IMEI International Mobile Equipment Identification
  • the step of transmitting 24 the deactivation signal may include transmitting a general deactivation code over an electronic network which signal is configured to only deactivate the identified device. Otherwise, the step of transmitting 24 the signal may include first locating the device before transmitting a specific deactivation signal to that specific device, e.g. first locating a mobile telephone and then sending the deactivation signal to a specific transmitter servicing a cell of that particular phone.
  • the deactivation signal temporarily deactivates the device, e.g. the device is reactivated after a predetermined time delay, upon receipt of a further activation signal, and/or the like. Otherwise, the deactivation signal permanently deactivates the device by facilitating in rendering a crucial element of said device inoperable, e.g. destroying a central processor, or the like.
  • the deactivation signal may also include an alarm signal which activates an alarm in the electronic device upon reception of the signal.
  • the method 18 includes the further step of receiving 26 a location signal from the device which location signal includes a geographical location of the device so that the device is able to be tracked.
  • deactivating signal In use, once a person realizes that his/her mobile telephone, for example, has been stolen, he/she is able to transmit the deactivating signal to the security module in order to deactivate the phone. Such deactivation may be temporary or permanent, as described above. Temporary deactivation will typically involve locating the telephone handset to retrieve it, as described above. Else, in other embodiments, the mobile handset is completely destroyed to render it useless to the thief.
  • the invention includes a variety of ways to transmit the deactivating signal.
  • the deactivating signal is sent via the telecommunications network of the mobile handset, i.e. the network of the mobile service provider. This signal uniquely identifies the handset and deactivates it using the security module 14. It is also envisaged that a person is able to transmit the deactivating signal via a computer network.
  • a person is able to request deactivation via a specific website, where the IMEl number of the phone is entered and the deactivation signal is sent via the mobile network. It is also possible to transmit the deactivating signal via a separate radio network, or the like. As such, the deactivating signal may also be sent via a remote control device over a radio frequency, or the like.
  • the Inventor regards it as an advantage that the invention provides a means whereby a stolen electronic device can be deactivated to serve as a deterrent to thieves.
  • the Inventor regards it as a further advantage that the device is able to be tracked if stolen in order to retrieve the device.

Abstract

A mobile electronic device 10 includes a receiver 12 for receiving a deactivation signal from a remote transmitter, and a security module 14 for deactivating the device 10 upon receipt of such signal. One embodiment also provides for an alarm 16 for alerting that the phone has been deactivated. The invention also includes a security method associated with the device 10.

Description

MOBILE ELECTRONIC DEVICE
FIELD OF THE INVENTION
This invention relates to a mobile electronic device, and a security method for a mobile electronic device.
BACKGROUND TO THE INVENTION
The theft of mobile electronic devices, such as mobile telephones,
Portable Digital Assistants (PDA's), palmtops, and the like, is a widespread problem.
The relative small size and portability of these devices make them an easy and profitable target for criminals. It is quite simple to steal such a device and sell it, as these devices are able to be used by another person with minor modifications and/or retrofitting of a new identity module like a Security Identity Module (SIM), or the like.
This invention proposes a possible solution to this problem.
SUMMARY OF THE INVENTION
According to one aspect of the invention there is provided a mobile electronic device which includes a receiver which is configured to receive a deactivation signal from a remote transmitter; and a security module arranged in communication with the receiver, which module is configured to deactivate said electronic device when the receiver receives the deactivation signal, in use.
The electronic device may include a mobile telephone. The electronic device may include a handheld computer. The electronic device may include a portable digital assistant (PDA). The electronic device may include a digital camera. It is to be appreciated that the electronic device may include any type of portable electronic equipment. The receiver may be a receiver of the electronic device. Otherwise, the receiver may be a dedicated receiver of the security module.
The security module may be configured to temporarily deactivate the device, e.g. the device is reactivated after a predetermined time delay, upon receipt of a further activation signal, and/or the like. Otherwise, the module may be configured to permanently deactivate the device by rendering a crucial element of said device inoperable, e.g. destroy a central processor, destroy all the electronic components with an electrical surge, or the like.
The device may include an alarm which is activated when the security module deactivates the mobile device, e.g. an audio alarm, or the like. Otherwise, the security module may include an alarm which is activated when the receiver receives the deactivation signal.
The device may include a transmitter which is configured to transmit the geographical location of the device to a remote receiver upon instruction from the module so that the device is able to be located. Otherwise, the security module may include a transmitter which is configured to transmit the geographical location of the device to a remote receiver so that the device is able to be tracked.
The remote transmitter may include a remote control device, a computer interfaced with a network, a telephone, and/or the like.
According to a second aspect of the invention there is provided a security method for a mobile electronic device which method includes the steps of receiving an electronic deactivation request from a requester which request uniquely identifies a specific mobile electronic device; and automatically transmitting a deactivation signal to the uniquely identified mobile electronic device in order to deactivate said device.
The step of receiving the request may include receiving the request via an electronic network. Accordingly, the network may include a mobile telephone network. The network may include a computer network, e.g. the Internet, or the like. The network may include a radio network. The network may include a land-based telephone network.
The request may uniquely identify the mobile device by including a specific identity code of said device, e.g. an International Mobile Equipment Identification (IMEI) number, or the like.
The request may uniquely identify the device by a predetermined code which has been previously assigned to that device in a registration process, or the like. Accordingly, the method may include the step of first registering a mobile device before receiving the deactivation request.
The step of transmitting the deactivation signal may include transmitting a general deactivation code over an electronic network which signal is configured to only deactivate the identified device. Otherwise, the step of transmitting the signal may include first locating the device before transmitting a specific deactivation signal to that specific device.
As such, the electronic device may include a mobile telephone. The electronic device may include a handheld computer. The electronic device may include a portable digital assistant (PDA). The electronic device may include a digital camera.
It is to be appreciated that the electronic device may include any type of portable electronic equipment.
The deactivation signal may be configured to temporarily deactivate the device, e.g. the device is reactivated after a predetermined time delay, upon receipt of a further activation signal, and/or the like. Otherwise, the deactivation signal may be configured to permanently deactivate the device by facilitating in rendering a crucial element of said device inoperable, e.g. destroying a central processor, or the like.
The deactivation signal may include an alarm signal which activates an alarm in the electronic device upon reception of the signal. The method may include the further step of receiving a location signal from the device which location signal includes a geographical location of the device so that the device is able to be tracked.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention is now described, by way of non-limiting example, with reference to the accompanying drawings wherein
Figure 1 shows, in perspective view, a mobile electronic device, in accordance with the invention; and
Figure 2 shows, in diagrammatic view, a security method for a mobile electronic device.
DETAILED DESCRIPTION OF THE INVENTION
With reference to the accompanying drawings, a mobile electronic device, in accordance with the invention, is generally indicated by reference numeral 10.
In the embodiment shown, the device 10 includes a receiver 12, a security module 14, and an alarm 16.
In the embodiment shown, the electronic device 10 is a mobile telephone. It is to be appreciated that, in further embodiments of the invention, the electronic device 10 may include a handheld computer, a portable digital assistant (PDA), a digital camera, or any other type of portable electronic equipment.
The receiver 12 is generally configured to receive a deactivation signal from a remote transmitter (not shown). In the embodiment shown, the receiver 12 is a receiver of the electronic device 10 itself, i.e. the receiver used by the mobile telephone. It is however to be appreciated that, in further embodiments, the receiver 12 may be a dedicated receiver of the security module 14. For example, a digital camera may not have a receiver to perform its function, and the security module 14 then has a dedicated receiver. The security module 14 is arranged in communication with the receiver 12, and the module 14 is configured to deactivate said electronic device 10 when the receiver 12 receives the deactivation signal from a remote transmitter.
In one embodiment of the invention, the security module 14 is configured to temporarily deactivate the device 10, e.g. the device 10 is reactivated after a predetermined time delay, upon receipt of a further activation signal, and/or the like.
In a further embodiment of the invention, the module 14 is configured to permanently deactivate the device 10 by rendering a crucial element of said device 10 inoperable, e.g. by destroying a central processor, or the like. It is to be appreciated that the crucial element is typically a component without which the device 10 cannot function, such as a processor, or the like.
In a yet further embodiment of the invention, the module 14 is configured to destroy the electronic device 10 completely, e.g. destroy all the electronic components with an electrical surge, or the like. It is to be appreciated that by destroying all the electronic components, it is not possible to salvage some of the components for spare parts. This provides further deterrence to would-be thieves.
In a preferred embodiment of the invention, the device 10 also includes an alarm 16 which is activated when the security module 14 deactivates the mobile device 10 upon receipt of the signal. The alarm 16 is typically an audio alarm, or the like. This audio alarm will generally be an inherent alarm of the device 10, e.g. a speaker, or the like of the mobile telephone.
Otherwise, the security module 14 may include the alarm 16 which is activated when the receiver receives the deactivation signal. This would be the case where the device 10 does not include an inherent alarm.
The remote transmitter is typically a remote control device which uses a satellite network to transmit the deactivation signal to the device. Otherwise, in further embodiments, the remote transmitter may be a computer connected to a network which sends the deactivation signal, e.g. across the Internet, or the like. The remote transmitter may also be a telephone whereby the deactivation signal is requested. Additionally, the device 10 or module 14 may include a transmitter (not shown) which is configured to transmit the geographical location of the device 10 to a remote receiver (not shown) so that the device 10 is able to be tracked. For example, a GPS (Global Positioning System), or the like.
It is to be appreciated that the invention also extends to the embodiment of the security module 14 and a remote activator (not shown) which is not fitted to an electronic device 10. In this embodiment, the module is typically configured to be retrofitted to an electronic device 10. For example, fitted between a battery and housing of such a device, or the like.
As shown in Figure 2, the security method 18 for a mobile electronic device 10 includes the steps of receiving 22 an electronic deactivation request from a requester, and automatically transmitting 24 a deactivation signal to the identified device. In this manner the device 10 is deactivated.
The electronic request is able to uniquely identify the mobile electronic device. As such, the step of receiving 22 the request generally includes receiving 22 the request via an electronic network. Accordingly, the network may include a mobile telephone network, a computer network, a radio network, a land-based telephone network, and/or the like. It is to be appreciated that the network can include any type of electronic communications network.
The request generally uniquely identifies the mobile device by including a specific identity code of said device, e.g. an International Mobile Equipment Identification (IMEI) number, or the like. Otherwise, the request may uniquely identify the device by a predetermined code which has been previously assigned to that device in a registration process, or the like. Accordingly, the method 18 then includes the further step of first registering 20 a unique identifier of the device.
The step of transmitting 24 the deactivation signal may include transmitting a general deactivation code over an electronic network which signal is configured to only deactivate the identified device. Otherwise, the step of transmitting 24 the signal may include first locating the device before transmitting a specific deactivation signal to that specific device, e.g. first locating a mobile telephone and then sending the deactivation signal to a specific transmitter servicing a cell of that particular phone.
In one embodiment, the deactivation signal temporarily deactivates the device, e.g. the device is reactivated after a predetermined time delay, upon receipt of a further activation signal, and/or the like. Otherwise, the deactivation signal permanently deactivates the device by facilitating in rendering a crucial element of said device inoperable, e.g. destroying a central processor, or the like.
In addition, the deactivation signal may also include an alarm signal which activates an alarm in the electronic device upon reception of the signal.
In a further embodiment, the method 18 includes the further step of receiving 26 a location signal from the device which location signal includes a geographical location of the device so that the device is able to be tracked.
In use, once a person realizes that his/her mobile telephone, for example, has been stolen, he/she is able to transmit the deactivating signal to the security module in order to deactivate the phone. Such deactivation may be temporary or permanent, as described above. Temporary deactivation will typically involve locating the telephone handset to retrieve it, as described above. Else, in other embodiments, the mobile handset is completely destroyed to render it useless to the thief.
It is to be appreciated that the invention includes a variety of ways to transmit the deactivating signal. In one embodiment, the deactivating signal is sent via the telecommunications network of the mobile handset, i.e. the network of the mobile service provider. This signal uniquely identifies the handset and deactivates it using the security module 14. It is also envisaged that a person is able to transmit the deactivating signal via a computer network.
For example, a person is able to request deactivation via a specific website, where the IMEl number of the phone is entered and the deactivation signal is sent via the mobile network. It is also possible to transmit the deactivating signal via a separate radio network, or the like. As such, the deactivating signal may also be sent via a remote control device over a radio frequency, or the like.
It shall be understood that the examples are provided for illustrating the invention further and to assist a person skilled in the art with understanding the invention and is not meant to be construed as unduly limiting the reasonable scope of the invention.
The Inventor regards it as an advantage that the invention provides a means whereby a stolen electronic device can be deactivated to serve as a deterrent to thieves. The Inventor regards it as a further advantage that the device is able to be tracked if stolen in order to retrieve the device.

Claims

1. A mobile electronic device which includes a receiver which is configured to receive a deactivation signal from a remote transmitter; and a security module arranged in communication with the receiver, which module is configured to deactivate said electronic device when the receiver receives the deactivation signal.
2. A mobile electronic device as claimed in claim 2, wherein the electronic device includes a mobile telephone.
3. A mobile electronic device as claimed in claim 2, wherein the electronic device includes a handheld computer.
4. A mobile electronic device as claimed in claim 2 wherein the electronic device includes a portable digital assistant (PDA).
5. A mobile electronic device as claimed in claim 2, wherein the electronic device includes a digital camera.
6. A mobile electronic device as claimed in any one of claims 1 to 5, wherein the security module is configured to temporarily deactivate the device.
7. A mobile electronic device as claimed in claim 6, wherein the security module is configured to activate the device upon receipt of a further instructing signal by the receiver.
8. A mobile electronic device as claimed in any one of claims 1 to 5, wherein the security module is configured to permanently deactivate the device by rendering a crucial element of said device inoperable.
9. A mobile electronic device as claimed in any one of claims 1 to 8, which includes an alarm which is configured to be activated when the security module deactivates the mobile device.
10. A mobile electronic device as claimed in any one of claims 1 to 9, which includes a transmitter configured to transmit the geographical location of the device to a remote receiver so that the device is able to be tracked when the security module has deactivated said device.
11. A mobile electronic device as claimed in any one of claims 1 to 10, wherein the remote transmitter includes a remote control device.
12. A mobile electronic device as claimed in any one of claims 1 to 11 , wherein the remote transmitter includes a computer interfaced with a communications network for transmitting the deactivation signal.
13. A mobile electronic device as claimed in any one of claims 1 to 12, wherein the remote transmitter includes a telephone handset transmitting the deactivation signal via a suitable communications network.
14. A security method for a mobile electronic device, which method includes the steps of receiving an electronic deactivation request from a requester which request uniquely identifies a specific mobile electronic device; and automatically transmitting a deactivation signal to the uniquely identified mobile electronic device in order to deactivate said device.
15. A security method as claimed in claim 14, wherein the step of receiving the request includes receiving the request via an electronic network.
16. A security method as claimed in claim 15, wherein the network includes a mobile telephone network.
17. A security method as claimed in either one of claims 15 or 16, wherein the network includes a computer network.
18. A security method as claimed in any one of claims 15 to 17, wherein the network includes a radio network.
19. A security method as claimed in any one of claims 15 to 18, wherein the network includes a land-based telephone network.
20. A security method as claimed in any one of claims 14 to 19, wherein the request uniquely identifies the mobile device by including a specific identity code of said device.
21. A security method as claimed in claim 20, wherein the identity code includes an International Mobile Equipment Identification (IMEI) number.
22. A security method as claimed in any one of claims 14 to 19, wherein the request uniquely identifies the device by a predetermined code which has been previously assigned to that device in a registration process.
23. A security method as claimed in claim 22, which includes the step of first registering a mobile device before receiving the deactivation request.
24. A security method as claimed in any one of claims 14 to 23, wherein the step of transmitting the deactivation signal includes transmitting a general deactivation code over an electronic network which signal is configured to only deactivate the identified device.
25. A security method as claimed in any one of claims 14 to 24, wherein the step of transmitting the signal includes first locating the device before transmitting a specific deactivation signal to that specific device.
26. A security method as claimed in any one of claims 14 to 25, wherein the electronic device includes a mobile telephone.
27. A security method as claimed in any one of claims 14 to 25, wherein the electronic device includes a handheld computer.
28. A security method as claimed in any one of claims 14 to 25, wherein the electronic device includes a portable digital assistant (PDA).
29. A security method as claimed in any one of claims 14 to 25, wherein the electronic device includes a digital camera.
30. A security method as claimed in any one of claims 14 to 29, wherein the deactivation signal is configured to temporarily deactivate the device.
31. A security method as claimed in any one of claims 14 to 29, wherein the deactivation signal is configured to permanently deactivate the device by facilitating in rendering a crucial element of said device inoperable.
32. A security method as claimed in any one of claims 14 to 31 , wherein the deactivation signal includes an alarm signal which activates an alarm in the electronic device upon reception of the signal.
33. A security method as claimed in any one of claims 14 to 32, which includes the further step of receiving a location signal from the device, which location signal includes a geographical location of the device so that the device is able to be located.
34. A mobile electronic device as claimed in claim 1 or a security method as claimed in claim or 14, substantially as herein described and illustrated.
35. A new mobile electronic device or a new security method, substantially as herein described.
PCT/ZA2006/000073 2005-06-03 2006-06-05 Mobile electronic device WO2006130885A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA2005/4554 2005-06-03
ZA200504554 2005-06-03

Publications (2)

Publication Number Publication Date
WO2006130885A2 true WO2006130885A2 (en) 2006-12-07
WO2006130885A3 WO2006130885A3 (en) 2012-08-30

Family

ID=37482382

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/ZA2006/000073 WO2006130885A2 (en) 2005-06-03 2006-06-05 Mobile electronic device

Country Status (1)

Country Link
WO (1) WO2006130885A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2488973A (en) * 2011-02-28 2012-09-19 Zulkarin Jahangir Remote client for securely accessing medical data and services

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5384564A (en) * 1992-01-23 1995-01-24 Keith H. Wycoff Battery saving arrangement for selectively addressable, portable receivers
US5459448A (en) * 1994-06-27 1995-10-17 Dortenzio; Christopher J. Automotive continuous protection anti-theft system
EP0891110A1 (en) * 1997-07-10 1999-01-13 Alcatel Method and system for preventing a mobile station from causing disturbance
FR2775862A1 (en) * 1998-03-05 1999-09-10 Rene Feghali REMOTE CONTROL SYSTEM FOR DEACTIVATION / REACTIVATION OF SIGNALS TRANSMITTED BY A PORTABLE TELEPHONE AND METHOD FOR IMPLEMENTING SAID SYSTEM
EP1441235A2 (en) * 2003-01-22 2004-07-28 Avon and Somerset Police Authority Location system
WO2005031544A2 (en) * 2003-09-26 2005-04-07 Disney Enterprises, Inc. Cell phone parental control

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5384564A (en) * 1992-01-23 1995-01-24 Keith H. Wycoff Battery saving arrangement for selectively addressable, portable receivers
US5459448A (en) * 1994-06-27 1995-10-17 Dortenzio; Christopher J. Automotive continuous protection anti-theft system
EP0891110A1 (en) * 1997-07-10 1999-01-13 Alcatel Method and system for preventing a mobile station from causing disturbance
FR2775862A1 (en) * 1998-03-05 1999-09-10 Rene Feghali REMOTE CONTROL SYSTEM FOR DEACTIVATION / REACTIVATION OF SIGNALS TRANSMITTED BY A PORTABLE TELEPHONE AND METHOD FOR IMPLEMENTING SAID SYSTEM
EP1441235A2 (en) * 2003-01-22 2004-07-28 Avon and Somerset Police Authority Location system
WO2005031544A2 (en) * 2003-09-26 2005-04-07 Disney Enterprises, Inc. Cell phone parental control

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2488973A (en) * 2011-02-28 2012-09-19 Zulkarin Jahangir Remote client for securely accessing medical data and services

Also Published As

Publication number Publication date
WO2006130885A3 (en) 2012-08-30

Similar Documents

Publication Publication Date Title
US6975222B2 (en) Asset tracking apparatus and method
US6987975B1 (en) Method of generating control signals based on location of radio terminals
US6813498B1 (en) Apparatus, method and system for detection and recovery of missing wireless devices in communication systems
RU2418387C2 (en) Method to disable mobile device
KR101140904B1 (en) Apparatus and methods for locating, tracking and/or recovering a wireless communication device
US20180072263A1 (en) Vehicle-disabling remote anti-theft system and method
JP2003296859A (en) Active assistance requesting antitheft system and method therefor
CN104838681A (en) Fake base station detection with core network support
JP2006203902A (en) Mobile device including rfid tag reader
US20110077051A1 (en) UICC Control Over Devices Used to Obtain Service
US20040198441A1 (en) Wireless communication device and method
EP1834472A2 (en) Triggering an emergency mode in a radio communication system and methods thereof
WO2015038312A1 (en) Method of and system for controlling communications over a public safety network
CN101445095B (en) Anti-theft alarming method of an on-line automobile and alarm system thereof
CN104219317A (en) Router, system and method for anti-theft tracking for mobile terminal on basis of location positioning
WO2006130885A2 (en) Mobile electronic device
EP1480856B1 (en) A method and system for identifying an unauthorized use of a telematic device
EP2780900B1 (en) Systems and methods for recovering low power devices
EP1329127A2 (en) Method and apparatus for securing a mobile electronic device based on location
CN104640075A (en) Mobile terminal security management method and mobile terminal
CN101519062B (en) Anti-theft alarm method for networked motor vehicle and alarm system thereof
EP1510831B1 (en) Two-way tracking system and method using an existing wireless network
CN104973011A (en) Method and apparatus for preventing vehicles from being stolen
JP4030338B2 (en) Communication terminal
Khimani et al. IoT Security and Hardware Implementation using DTMF 8870.

Legal Events

Date Code Title Description
NENP Non-entry into the national phase in:

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC DATED 22.04.2008.

122 Ep: pct application non-entry in european phase

Ref document number: 06760764

Country of ref document: EP

Kind code of ref document: A2