EP2053573A1 - Locating portable devices - Google Patents

Locating portable devices Download PDF

Info

Publication number
EP2053573A1
EP2053573A1 EP07254191A EP07254191A EP2053573A1 EP 2053573 A1 EP2053573 A1 EP 2053573A1 EP 07254191 A EP07254191 A EP 07254191A EP 07254191 A EP07254191 A EP 07254191A EP 2053573 A1 EP2053573 A1 EP 2053573A1
Authority
EP
European Patent Office
Prior art keywords
transceiver
lost
portable
communication device
agent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP07254191A
Other languages
German (de)
French (fr)
Inventor
designation of the inventor has not yet been filed The
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
British Telecommunications PLC
Original Assignee
British Telecommunications PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by British Telecommunications PLC filed Critical British Telecommunications PLC
Priority to EP07254191A priority Critical patent/EP2053573A1/en
Publication of EP2053573A1 publication Critical patent/EP2053573A1/en
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1427Mechanical actuation by lifting or attempted removal of hand-portable articles with transmitter-receiver for distance detection
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0219Circuit arrangements
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0241Data exchange details, e.g. data protocol
    • G08B21/0255System arrangements wherein the parent unit emits, i.e. the parent unit incorporates the emitter
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0241Data exchange details, e.g. data protocol
    • G08B21/0258System arrangements wherein both parent and child units can emit and receive
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0275Electronic Article Surveillance [EAS] tag technology used for parent or child unit, e.g. same transmission technology, magnetic tag, RF tag, RFID
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/028Communication between parent and child units via remote transmission means, e.g. satellite network

Definitions

  • GSM Global System for Mobile Communications
  • UMTS Universal Mobile Telecommunications System
  • IMEI International Mobile Equipment Identity
  • SIM Subscriber Identity Module
  • IMSI International Mobile Subscriber Identity
  • RFID Radio Frequency Identification
  • RFID has become popular as its range has increased significantly over the years. Passive RFID tags can be read from a distance of about 3 to 6 feet.
  • RFID has been proposed by many for product tracking and monitoring, lost pet notification, and lost article tracking.
  • Such systems are separately described in various patents such as US Patent 5570081 , US Patent 6067018 , US Patent 6940407 , European Patent 1630757 and Japan Patent 2006092128 . Although such systems provide a useful mechanism to track the lost or stolen item at close proximity through the use of static or mobile RFID readers, these systems do not provide precise location indication in identifying the particular lost article which is important to small size articles such as mobile handheld electronic equipment.
  • Auxiliary means such as providing the lost item's pictures to the third party human agent in order to identify the lost article are typically deployed. Foreseeing that the RFID tag and reader will become more common in future mobile handheld devices such as mobile phones, various methods involving the exchange of information with a server through the mobile network to compare the targeted lost device's attributes with those recorded in the server in order for third party human agent to exactly identify the respective article have been proposed. However, such systems do not provide sufficient privacy and security measures as the lost device's information is broadcast to a large crowd of human agents in the proximity. Existing methods also risk a large crowd of users going after the same lost device. In addition, the risk of disclosing device's information to unwanted third parties is high as the lost device has no control in determining the respective third party. Thus there is a need in the art for a secured system that can precisely indicate its location once the lost item is being located by third party.
  • European Patent 1630757 and Japanese Patent 2006092128 describe a mechanism to track stolen/lost articles with RFID tag.
  • the defined tracking systems involve the use of multiple static or mobile RFID readers to locate the lost device. Once the device is located through the readers, a notification will be send to the device owner.
  • Japanese Patent 2006092128 also depicts the use of camera functionality of mobile readers to help third party human agent to identify the lost stolen article.
  • the lost device is a cellphone, i.e. a portable telephone usable with a cellular radio network such as GSM, but it could equally well be a laptop computer, personal digital assistant (PDA), or other intelligent device such as perhaps a Wi-fi enabled MP3 player.
  • a cellphone i.e. a portable telephone usable with a cellular radio network such as GSM
  • PDA personal digital assistant
  • other intelligent device such as perhaps a Wi-fi enabled MP3 player.
  • This recovery mechanism assumes that the lost device has a near field wireless link capability of the Radio Frequency Identification (RFID) type, but other near field wireless link communication technology such as Bluetooth or infra-red could also be used.
  • RFID Radio Frequency Identification
  • the outline diagram of the system in Figure 1 shows a lost device 1, in the form of a cellular telephone 1.
  • the device 1 also has RFID capability as will be described in more detail below.
  • Human agents who may be entrusted with the task of finding the lost device 1 are shown at 2, 2a, 2b.
  • Each carries a mobile communication device 3, 3a, 3b, in this example also a cellular telephone, again with RFID capability.
  • the agents' devices be of the same type as the lost device and/or as the devices of other agents; it is however essential that the near-field capability be the same as that of the lost device.
  • the agent's device should have reader functionality able to read the tag, and where a tag on the agent's device is to be read, the lost device should have reader functionality able to read that tag.
  • the most convenient implementation is to make the lost device capable of acting as agent device and vice versa, so that the two have the same construction.
  • a server 4 has the function of liaising with the lost device and the agent devices; it can be a general purpose computer, suitably programmed, with an interface to the cellular radio network 5 to which the lost device 1 and agent devices 3, 3a, 3b also belong, so that it may exchange messages with them.
  • This implementation of the invention makes use of the lost device's near field wireless link capability to identify a possible third party human agent upon the declaration of item lost by the owner if the lost device is on power on mode. Otherwise, server will locate a trusted potential agent on behalf of the lost device.
  • the system consists of several aspects as listed below:
  • FIG. 1A is a block diagram of a cellular telephone, which can be the lost device 1 or the agent device 3.
  • each mobile handheld device is equipped with one or more near field wireless links interface such as a standard mobile RFID reader 103 and an embedded RFID tag 104.
  • a dedicated "RFID TAG to Mobile Devices Interface" module 105 is added to the standard RFID tag and a beeper circuit 106 is added to the handheld device as shown in Figure 1A .
  • the main functionality of the additional interface is that when a special command is receiver by the tag, this is recognised and acted upon to draw power from the device's battery in order either to activate the synchronous beeping functionality of the lost device or to power up the device for the ringing of a customized ring tone through the lost device.
  • close proximity is defined as the location within the base station or access point where the server has found the lost device.
  • Neighbouring proximity is referring to location within next base station or access point where the server has found the lost device.
  • FIG 2 shows the flow process of embodiment 1. Some of the messages that are sent during this process are shown in Figure 6 .
  • the process is initiated at Step 200 by the owner of the lost device 1 reporting its loss to the server 4. This can be by any convenient means: by telephone to a human operator who keys the information into the server, or directly, perhaps via an internet connection to the server. Either way, the server receives a message to the effect that the device is lost, together with an identifier.
  • the identifier can be but not limited to telephone number of the lost device, IMEI or RFID tag number of the lost device. In the present example, of a lost phone, this is the telephone number.
  • the server 4 interrogates the network 5 at Step 201 to determine whether the respective device 1 is still connected to the network. If not, it is then (202) treated as a device that is in the "power off" state, as will be described later with reference to Figure 4 .
  • the server sends (203) a message via the network 5 to the lost device 1 to activate its RFID reader 103 if the reader is in off state in order to scan (204) for a legitimate agent.
  • this message does not trigger ringing or any other audible or visual indication by the device.
  • stealthy message This requires only minor modification of the device's software to recognise and act upon the signal.
  • control is passed (205, 206) to a neighbouring agent detection mechanism (refer to Figure 3 for more detailed description). If there is at least one agent within RFID range of the lost device, then the RFID tag on (for example) the agent device 2 transmits a response message that is then received by the RFID reader 103 of the lost device 1. This message contains a tag identifier. If two or more agent devices respond, then only the agent with strongest link is captured. If two or more agents have the same or similar signal strength then if desired these agents' information can be sent to the owner, who then decides which agent to choose at step 209, but other strategies for dealing with this situation could also be employed. Details of the agent device(s) not chosen could be held for later use.
  • the lost device informs the server 4, via the network 5, of the tag information of the potential agent device.
  • the server 4 validates the agent (e.g. by reference to a database held at the server containing tag information on authorised agents) to prevent connection to a bogus agent.
  • the server may contact the owner at 208, giving the credentials of the agent device and asking for confirmation that the owner agrees to use of this agent. If the validation or confirmation fails then the process returns via 209 to Step 204 to scan for another agent device (or choose the second agent in the proximity list).
  • the server sends at Step 209 a request to the agent device 2 to check whether the agent is willing to help in locating the lost device, and if not the process returns via 211 to 204.
  • the server sends (Step 212) a customized ring tone such as "John Thomson, Please pick me UP" to the lost device for the lost device to auto play the ring tone (Step 213) in order to attract the agent's attention.
  • This "auto play” requires modifications to the phone, in that software needs to be installed in order for the lost device to ,download or receive the customized ringtone and then play it automatically, and then automatically delete it.
  • the custom ring tone could be downloaded in conventional manner and then followed by an ordinary phone call from the server to the phone to cause it to ring. In the latter case, a further command needs to be sent afterwards in order to revert to the original ring tone.
  • the agent then needs to send a RFID command to the lost device to stop the ring tone and the credential of the agent is captured by the lost device and send back to server. This is done so as to provide non-repudiation protection to the lost device owner as the agent cannot deny picking up the lost device.
  • a confirmation message coupled with the agent's RFID credentials is sent to the server by the agent for confirmation (216). The process is then complete.
  • the agent device needs to stop the customer ring tone by issuing a stop command through its RFID thus confirming that agent is picking up the lost device. This command is also used as a signature to confirm that the lost device has been picked up.
  • the server will served as a middle-man to locate another trusted agent that is in neighbouring proximity.
  • the flow process of this implementation is illustrated in Figure 3 .
  • a lost device that is unable to find a potential trusted agent informs the server, and 301: the server searches for the trusted agent on behalf of the lost device.
  • the server interrogates the network to determine which cell of the network the lost device is located in (or of course this information could be obtained at Step 201). Then the server sends, via the network 5, a message to one or more of its agents known to be within close or neighbouring proximity. With the aid of the HLR and VLR of the network, the server can determine the identity of the trusted agent(s) within close or neighbouring proximity.
  • the server Upon failing to locate an agent, at 301/302 the server sends a notification to the owner.
  • the server may contact the owner at 303, giving the credentials of the agent and asking for confirmation that the owner agrees to use of this agent. If confirmation fails then the process returns via 304 to Step 301 to scan for another agent device.
  • a notification is sent (304A) to the agent device to ensure that the agent is willing to help in searching the lost device, and if not the process returns via 305 to 301 to look for another agent.
  • the server sends, to the agent device, the location information of the lost device, based on the identity of the base station serving the cell that the lost device is in.
  • the agent device displays the information on a screen for the agent to read (for example it could be sent as a text message). Only location information is sent. The granularity or accuracy of the location information depends very much on the technology used by the mobile network.
  • server sends via the network 5 (Steps 307, 308) the agent's near field wireless link interface credentials such as RFID tag information, and customized ring tone, to the lost device.
  • the near field wireless link interface credentials are used (Step 309) by the RFID reader 103 of the lost device to scan for the agent device.
  • the customized ring tone is played automatically to attract the agent's attention.
  • the agent picks up the device by stopping the ring tone a confirmation message coupled with the agent's RFID credentials is sent to the server, as in the case of step 216, described above.
  • Figure 4 shows the steps to be taken when the lost device is in a "power off” state. Some of the messages that are sent during this process are shown in Figure 7.
  • the server 4 retrieves from the network 5 the last active information on the lost device to gauge the current location of the device (Step 400).
  • the server searches (402) for a potential close proximity agent; if it fails to do so, it searches (403) for a neighbouring proximity agent. The details of this kind of search have already been explained in relation to Step 301 of Figure 3 . If an agent device is found, then at Step 404 a notification is sent to the respective agent.
  • the server sends (Step 406) the respective lost device's RFID tag information and location information to the agent device.
  • the agent device uses its RFID reader to scan for the lost device (Step 407). If the lost device is found, a n-bit string command from the agent device will be sent to the lost device's RFID tag 104 to wake up the lost device (Step 410). If the lost device has sufficient reserved battery power, the n-bit string RFID command is used to auto power on the lost device (415). Once powered on, the device can communicate with the server to download customized ring tone to the lost device or doing other task such as back up.
  • Steps 416 to 419 are identical to steps 311, 314, 315 of Figure 3 . If, at Step 411, the battery power of the particular device is deemed low, a minimum amount of power from the battery is drawn to power on the synchronous beeping circuits 106. The purpose of the beeping circuits is to help agent to identify the lost device.
  • a confirmation message coupled with the agent's RFID credentials is sent to the server. For the synchronous beeping implementation, this occurs once the agent has stopped the beeping functionality (413). At 414, the agent's credentials are recorded in the lost device through RFID.
  • the synchronous beeping feature is realized through the exchanging of bit strings through RFID front ends between the lost device and the agent device.
  • Special software/instruction code is added to the RFID TAG to Mobile Devices Interface 105 and Synchronous Beeper Circuits 106 in order to perform the synchronous beeping features.
  • One possible sequence is as follows, where it is understood that each time a bitstring is sent, it is transmitted by the RFID reader 103 of the one device to the RFID tag 104 of the other device, and the interface 105 passes an appropriate instruction to the beeper circuits 106.
  • agent device responds by beeping once
  • Step 313, Figure 4 The sequence continues until terminated by Step 313, Figure 4 .
  • the lost device When the lost device is on power on mode, the systems we have described involve the use of the lost device's near field wireless link such as an RFID reader to identify a trusted human agent in the vicinity. This implementation can greatly reduce security or privacy concerns as this implementation does not need to broadcast the lost items tag information to a large number of mobile RFID readers around the vicinity.
  • the lost device has control over which third party human agent to choose in locating itself.
  • the tracking and seeking mechanism can start immediately after the authorized user reports loss of the device to the server, thus speeding the time to locate devices that are being switched off deliberately or because of running low of battery. It will be noted that, as described, the system also prevents the lost device from producing any audio alerts before a trusted human agent is identified.

Landscapes

  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A lost telephone or other portable device with a long-range transceiver and also a RF or other short-range scanning device is located with the aid of a second such device that has a matching tag. A server instructs 203 the lost device to scan 204 for a second device: when a second device is found a message is set to the user of the second device. If no second device can be found, the server may contact potential second devices directly and instruct them to scan for the lost device (this requiring that the lost device has a tag and the potential second devices have scanners). In either case the lost device is triggered to give audible warning for the user of the second device. In the event that this is not possible because the lost device is switched off, a third modus operandi provides that the second device can send a power-on signal via the lost device's tag circuits.

Description

  • Due to the increasing usage of personal mobile gadgets such as laptops, Personal Digital Assistants (PDA), and cellphones, numerous methods have been developed to track these devices. Current tracking technologies for most of the mobile handheld devices focus on a software-based approach. Tracking software is installed on the mobile handheld device's memory. On the other hand the tracking of mobile devices using Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS) requires the use of the device's number, the handset's International Mobile Equipment Identity (IMEI) number or the Subscriber Identity Module (SIM) card's International Mobile Subscriber Identity (IMSI) in order to identify the lost device. The tracking systems described above require the mobile devices to be power on and connected to their respective network in order for the tracking mechanism to take place. Furthermore, GSM can only offer limited accuracy in term of location. It is therefore difficult to locate an individual device especially when there are a large number of other mobile devices in the vicinity.
  • Radio Frequency Identification (RFID) has become popular as its range has increased significantly over the years. Passive RFID tags can be read from a distance of about 3 to 6 feet. RFID has been proposed by many for product tracking and monitoring, lost pet notification, and lost article tracking. Such systems are separately described in various patents such as US Patent 5570081 , US Patent 6067018 , US Patent 6940407 , European Patent 1630757 and Japan Patent 2006092128 . Although such systems provide a useful mechanism to track the lost or stolen item at close proximity through the use of static or mobile RFID readers, these systems do not provide precise location indication in identifying the particular lost article which is important to small size articles such as mobile handheld electronic equipment. Auxiliary means such as providing the lost item's pictures to the third party human agent in order to identify the lost article are typically deployed. Foreseeing that the RFID tag and reader will become more common in future mobile handheld devices such as mobile phones, various methods involving the exchange of information with a server through the mobile network to compare the targeted lost device's attributes with those recorded in the server in order for third party human agent to exactly identify the respective article have been proposed. However, such systems do not provide sufficient privacy and security measures as the lost device's information is broadcast to a large crowd of human agents in the proximity. Existing methods also risk a large crowd of users going after the same lost device. In addition, the risk of disclosing device's information to unwanted third parties is high as the lost device has no control in determining the respective third party. Thus there is a need in the art for a secured system that can precisely indicate its location once the lost item is being located by third party.
  • European Patent 1630757 and Japanese Patent 2006092128 describe a mechanism to track stolen/lost articles with RFID tag. The defined tracking systems involve the use of multiple static or mobile RFID readers to locate the lost device. Once the device is located through the readers, a notification will be send to the device owner. Japanese Patent 2006092128 also depicts the use of camera functionality of mobile readers to help third party human agent to identify the lost stolen article. These technologies are considered to be of relevance with this invention because this invention also seeks to use the RFID technology in finding or locating lost devices.
  • Aspects of the invention are defined in the claims.
  • Some embodiments of the invention will now be described, by way of example, with reference to the accompanying drawings.
  • We now describe a tracking and recovery mechanism for lost or misplaced mobile handheld devices. For the purposes of description, it will be assumed that the lost device is a cellphone, i.e. a portable telephone usable with a cellular radio network such as GSM, but it could equally well be a laptop computer, personal digital assistant (PDA), or other intelligent device such as perhaps a Wi-fi enabled MP3 player.
  • This recovery mechanism assumes that the lost device has a near field wireless link capability of the Radio Frequency Identification (RFID) type, but other near field wireless link communication technology such as Bluetooth or infra-red could also be used. We will describe implementations applicable when the lost device is in the power on and in the power off state although is not essential that all implementations of the invention incorporate both functionalities.
  • The outline diagram of the system in Figure 1 shows a lost device 1, in the form of a cellular telephone 1. The device 1 also has RFID capability as will be described in more detail below. Human agents who may be entrusted with the task of finding the lost device 1 are shown at 2, 2a, 2b. Each carries a mobile communication device 3, 3a, 3b, in this example also a cellular telephone, again with RFID capability. It is convenient, but not actually essential, that the agents' devices be of the same type as the lost device and/or as the devices of other agents; it is however essential that the near-field capability be the same as that of the lost device. More specifically, where a tag on the lost device is to be read, the agent's device should have reader functionality able to read the tag, and where a tag on the agent's device is to be read, the lost device should have reader functionality able to read that tag. The most convenient implementation is to make the lost device capable of acting as agent device and vice versa, so that the two have the same construction.
  • A server 4 has the function of liaising with the lost device and the agent devices; it can be a general purpose computer, suitably programmed, with an interface to the cellular radio network 5 to which the lost device 1 and agent devices 3, 3a, 3b also belong, so that it may exchange messages with them.
  • This implementation of the invention makes use of the lost device's near field wireless link capability to identify a possible third party human agent upon the declaration of item lost by the owner if the lost device is on power on mode. Otherwise, server will locate a trusted potential agent on behalf of the lost device.
  • The system consists of several aspects as listed below:
    1. 1. Locating a close proximity agent using the lost device's near field wireless links
    2. 2. Locating a neighbouring proximity agent using the lost device's near field wireless links
    3. 3. Locating the lost device using RFID through trusted agents identified by the server.
  • Figure 1A is a block diagram of a cellular telephone, which can be the lost device 1 or the agent device 3. As well as the usual battery 100, transceiver 101 and input/output systems 102 each mobile handheld device is equipped with one or more near field wireless links interface such as a standard mobile RFID reader 103 and an embedded RFID tag 104. For the implementation of embodiment 3, a dedicated "RFID TAG to Mobile Devices Interface" module 105 is added to the standard RFID tag and a beeper circuit 106 is added to the handheld device as shown in Figure 1A. The main functionality of the additional interface is that when a special command is receiver by the tag, this is recognised and acted upon to draw power from the device's battery in order either to activate the synchronous beeping functionality of the lost device or to power up the device for the ringing of a customized ring tone through the lost device.
  • In this description, close proximity is defined as the location within the base station or access point where the server has found the lost device. Neighbouring proximity is referring to location within next base station or access point where the server has found the lost device.
  • Figure 2 shows the flow process of embodiment 1. Some of the messages that are sent during this process are shown in Figure 6. The process is initiated at Step 200 by the owner of the lost device 1 reporting its loss to the server 4. This can be by any convenient means: by telephone to a human operator who keys the information into the server, or directly, perhaps via an internet connection to the server. Either way, the server receives a message to the effect that the device is lost, together with an identifier. The identifier can be but not limited to telephone number of the lost device, IMEI or RFID tag number of the lost device. In the present example, of a lost phone, this is the telephone number. Once the mobile handheld device is reported lost by the owner, the server 4 interrogates the network 5 at Step 201 to determine whether the respective device 1 is still connected to the network. If not, it is then (202) treated as a device that is in the "power off" state, as will be described later with reference to Figure 4.
  • Assuming that the lost device's location is detected, the server sends (203) a message via the network 5 to the lost device 1 to activate its RFID reader 103 if the reader is in off state in order to scan (204) for a legitimate agent. Preferably this message does not trigger ringing or any other audible or visual indication by the device. In this description we refer to such messages as "stealthy message". This requires only minor modification of the device's software to recognise and act upon the signal.
  • If no active agent is detected during this stage, control is passed (205, 206) to a neighbouring agent detection mechanism (refer to Figure 3 for more detailed description). If there is at least one agent within RFID range of the lost device, then the RFID tag on (for example) the agent device 2 transmits a response message that is then received by the RFID reader 103 of the lost device 1. This message contains a tag identifier. If two or more agent devices respond, then only the agent with strongest link is captured. If two or more agents have the same or similar signal strength then if desired these agents' information can be sent to the owner, who then decides which agent to choose at step 209, but other strategies for dealing with this situation could also be employed. Details of the agent device(s) not chosen could be held for later use.
  • Then, at Step 207, the lost device informs the server 4, via the network 5, of the tag information of the potential agent device. The server 4 validates the agent (e.g. by reference to a database held at the server containing tag information on authorised agents) to prevent connection to a bogus agent. Alternatively, or in addition, the server may contact the owner at 208, giving the credentials of the agent device and asking for confirmation that the owner agrees to use of this agent. If the validation or confirmation fails then the process returns via 209 to Step 204 to scan for another agent device (or choose the second agent in the proximity list).
  • Once the agent device is validated, the server sends at Step 209 a request to the agent device 2 to check whether the agent is willing to help in locating the lost device, and if not the process returns via 211 to 204. Upon the agent device sending a message of confirmation back to the server, the server sends (Step 212) a customized ring tone such as "John Thomson, Please pick me UP" to the lost device for the lost device to auto play the ring tone (Step 213) in order to attract the agent's attention.
  • This "auto play" requires modifications to the phone, in that software needs to be installed in order for the lost device to ,download or receive the customized ringtone and then play it automatically, and then automatically delete it. Alternatively, the custom ring tone could be downloaded in conventional manner and then followed by an ordinary phone call from the server to the phone to cause it to ring. In the latter case, a further command needs to be sent afterwards in order to revert to the original ring tone.
  • Once the agent picks up the lost device, (215) the agent then needs to send a RFID command to the lost device to stop the ring tone and the credential of the agent is captured by the lost device and send back to server. This is done so as to provide non-repudiation protection to the lost device owner as the agent cannot deny picking up the lost device. A confirmation message coupled with the agent's RFID credentials is sent to the server by the agent for confirmation (216). The process is then complete.
  • The agent device needs to stop the customer ring tone by issuing a stop command through its RFID thus confirming that agent is picking up the lost device. This command is also used as a signature to confirm that the lost device has been picked up.
  • In the event that no trusted agent is found in close proximity, the server will served as a middle-man to locate another trusted agent that is in neighbouring proximity. The flow process of this implementation is illustrated in Figure 3.
  • 300: A lost device that is unable to find a potential trusted agent informs the server, and 301: the server searches for the trusted agent on behalf of the lost device. In order to perform this search, the server interrogates the network to determine which cell of the network the lost device is located in (or of course this information could be obtained at Step 201). Then the server sends, via the network 5, a message to one or more of its agents known to be within close or neighbouring proximity. With the aid of the HLR and VLR of the network, the server can determine the identity of the trusted agent(s) within close or neighbouring proximity.
  • Upon failing to locate an agent, at 301/302 the server sends a notification to the owner.
  • If an agent device is found, then if desired, the server may contact the owner at 303, giving the credentials of the agent and asking for confirmation that the owner agrees to use of this agent. If confirmation fails then the process returns via 304 to Step 301 to scan for another agent device.
  • Assuming all is well, a notification is sent (304A) to the agent device to ensure that the agent is willing to help in searching the lost device, and if not the process returns via 305 to 301 to look for another agent. Once the agent agrees to locate the lost device, then at 306 the server sends, to the agent device, the location information of the lost device, based on the identity of the base station serving the cell that the lost device is in. The agent device displays the information on a screen for the agent to read (for example it could be sent as a text message). Only location information is sent. The granularity or accuracy of the location information depends very much on the technology used by the mobile network.
  • At the same time, server sends via the network 5 (Steps 307, 308) the agent's near field wireless link interface credentials such as RFID tag information, and customized ring tone, to the lost device. The near field wireless link interface credentials are used (Step 309) by the RFID reader 103 of the lost device to scan for the agent device. Once the lost device identifies the agent device's RFID tag 104, the customized ring tone is played automatically to attract the agent's attention. Once the agent picks up the device by stopping the ring tone a confirmation message coupled with the agent's RFID credentials is sent to the server, as in the case of step 216, described above.
  • Figure 4 shows the steps to be taken when the lost device is in a "power off" state. Some of the messages that are sent during this process are shown in Figure 7. Once the lost device 1 is confirmed to be power off or disconnected from the network, the server 4 retrieves from the network 5 the last active information on the lost device to gauge the current location of the device (Step 400). In order to find the lost device, the server searches (402) for a potential close proximity agent; if it fails to do so, it searches (403) for a neighbouring proximity agent. The details of this kind of search have already been explained in relation to Step 301 of Figure 3. If an agent device is found, then at Step 404 a notification is sent to the respective agent. Once the agent has agreed (405) to participate in locating the lost device, the server sends (Step 406) the respective lost device's RFID tag information and location information to the agent device. Using the tag information sent by the server, the agent device uses its RFID reader to scan for the lost device (Step 407). If the lost device is found, a n-bit string command from the agent device will be sent to the lost device's RFID tag 104 to wake up the lost device (Step 410). If the lost device has sufficient reserved battery power, the n-bit string RFID command is used to auto power on the lost device (415). Once powered on, the device can communicate with the server to download customized ring tone to the lost device or doing other task such as back up. Thus the process continues with Steps 416 to 419 which are identical to steps 311, 314, 315 of Figure 3. If, at Step 411, the battery power of the particular device is deemed low, a minimum amount of power from the battery is drawn to power on the synchronous beeping circuits 106. The purpose of the beeping circuits is to help agent to identify the lost device.
  • Once the agent picks up the lost device by stopping the ring tone a confirmation message coupled with the agent's RFID credentials is sent to the server. For the synchronous beeping implementation, this occurs once the agent has stopped the beeping functionality (413). At 414, the agent's credentials are recorded in the lost device through RFID.
  • The synchronous beeping feature is realized through the exchanging of bit strings through RFID front ends between the lost device and the agent device. Special software/instruction code is added to the RFID TAG to Mobile Devices Interface 105 and Synchronous Beeper Circuits 106 in order to perform the synchronous beeping features. One possible sequence is as follows, where it is understood that each time a bitstring is sent, it is transmitted by the RFID reader 103 of the one device to the RFID tag 104 of the other device, and the interface 105 passes an appropriate instruction to the beeper circuits 106.
    1. 1. Agent device send n bits to wake up lost device;
    2. 2. Lost device wakes up, beeps once. Lost device sends the corresponding beeping bit string to agent to execute the same number of beeps;
    3. 3. On receiving the bit string instruction from the lost device, the agent device beeps once. The agent device then triggers a new self beep sequence which is the number of previous beeping plus 1 new beep:, next, the agent device sends the corresponding beeping bit string to the lost device.
    4. 4. On receiving the bit string instruction from the agent device, the lost device beeps twice. The lost device then triggers a new self beep sequence which is the number of previous beeping plus 1 new beep: next, the lost devices sends the corresponding beeping bit string to the agent device.
    5. 5. Steps 3 and 4 repeat until process ends.
    Resulting in the following sequence:
  • Lost device beeps once, agent device responds by beeping once
  • Agent device beeps twice, lost device beeps twice in response to the agent's beeping.
  • The sequence continues until terminated by Step 313, Figure 4. It will be understood that previous tracking technologies for mobile handheld devices required the devices to be power on before the tracking can take place. When the lost device is on power on mode, the systems we have described involve the use of the lost device's near field wireless link such as an RFID reader to identify a trusted human agent in the vicinity. This implementation can greatly reduce security or privacy concerns as this implementation does not need to broadcast the lost items tag information to a large number of mobile RFID readers around the vicinity. The lost device has control over which third party human agent to choose in locating itself. The tracking and seeking mechanism can start immediately after the authorized user reports loss of the device to the server, thus speeding the time to locate devices that are being switched off deliberately or because of running low of battery. It will be noted that, as described, the system also prevents the lost device from producing any audio alerts before a trusted human agent is identified.

Claims (14)

  1. A method of locating a lost portable communication device (1) with the aid of a second portable device (2), wherein
    the lost portable communication device (1) has a first, relatively long range, transceiver (101) for user communication and a second, relatively short range transceiver (103) operable to scan for a tagged second portable device (2) in the vicinity; the method comprising
    (a) transmitting (203) a command from a remote station (4) to the first transceiver (101) of the lost device (1);
    (b) upon receipt of the command at the lost device, triggering scanning (204) by the second transceiver (103);
    (c) following the identification of a tagged second portable communication device (2), sending (210) to the second portable device (2) a request for a user thereof to search for the lost communication device.
  2. A method according to claim 1 in which first transceiver acts upon the command without generating any audible or visible indication.
  3. A method according to claim 1 or 2 in which the second portable device (2) also has a relatively long range transceiver and following the identification of a tagged second portable communication device (2) the lost device sends (207) from its first transceiver a message to the remote station which then sends (210) to the relatively long range transceiver of the second portable device (2) the request for a user thereof to search for the lost communication device.
  4. A method according to claim 3 in which the remote station, upon receipt of the message, also sends (212) to the first transceiver (101) of the lost portable communication device (1) a customised encoded audio signal which the lost portable communication device (1) then plays (213) as an audible indication for the user of the second portable communication device.
  5. A method according to any one of claims 1 to 4 in which the second portable device (2) also has a relatively long range transceiver and in which, in the event that the scanning of step (b) fails to find a second portable device:
    (i) the first transceiver of the lost device (1) notifies (300) the remote station (4);
    (ii) the remote station (4) transmits (301) at least one invitation to which the relatively long range transceiver of a second portable device (2) may respond;
    (iii) upon receiving such a response, the remote station (4) sends to the relatively long range transceiver of the second portable device (2) a request for a user thereof to search for the lost communication device (1) and (306) information as to the location of the lost communication device (1).
  6. A method according to claim 5 in which the relatively long range transceivers are transceivers of a cellular radio network (5) and the remote station (4) determines, from the network, said information as to the location of the lost communication device.
  7. A method according to claim 5 or 6 in which the relatively long range transceivers are transceivers of a cellular radio network (5) and the remote station (4) uses information from the network as to the location of the lost communication device and of second portable devices to determine the identity of second portable devices to which it is to send an invitation in step (ii).
  8. A portable communication device comprising:
    a first, relatively long range, transceiver for user communication;
    a second, relatively short range transceiver operable to scan for a tagged device in the vicinity;
    control means operable upon receipt by the first transceiver of a command from a remote station to trigger scanning by the second transceiver.
  9. A method of locating a lost portable communication device (1) with the aid of a second portable device (2), wherein
    the lost portable communication device (1) has a first, relatively long range, transceiver (101) for user communication and a second, relatively short range tag transceiver (104) operable to respond to interrogation signals from a scanning device (2) in the vicinity;
    the second portable communication device (2) has a first, relatively long range, transceiver (101) for user communication and a second, relatively short range transceiver (103) operable to scan for a tagged portable device (1) in the vicinity; the method comprising
    (a) transmitting (406) a command from a remote station (4) to the first transceiver (101) of the second device (1), said command containing data identifying the lost device;
    (b) upon receipt of the command at the second device, triggering scanning (407) by the second transceiver (103) for a device matching the identifying data;
    (c) following the identification of a matching tagged portable communication device (1), sending (410) to the tag transceiver of the matching portable device (1) a command to switch the first transceiver of the device from a power-off state to a power-on state.
  10. A method according to claim 9 in which the remote station sends (416) to the powered-on first transceiver (101) of the lost portable communication device (1) a customised encoded audio signal which the lost portable communication device (1) then plays (417) as an audible indication for the user of the second portable communication device.
  11. A method according to claim 9 or 10 in which, in the event that the first transceiver of the matching portable device cannot assume a power-on state owing to insufficient power, an auxiliary warning device in the matching portable device is actuated.
  12. A method according to claim 11 in which the auxiliary warning device cooperates with an auxiliary warning device of the second portable device in a procedure in which one auxiliary device generates an audible warning and sends to the other auxiliary warning device a command to generate a like audible warning.
  13. A method according to claim 12 in which further pairs of like audible warnings, each different from the preceding pair, are generated.
  14. A portable communication device comprising:
    a first, relatively long range, transceiver for user communication;
    a relatively short range tag transceiver operable to respond to interrogation signals from a scanning device in the vicinity;
    control means operable upon receipt by the tag transceiver of a command from a device in the vicinity to switch the first transceiver from a power-off state to a power-on state.
EP07254191A 2007-10-23 2007-10-23 Locating portable devices Ceased EP2053573A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP07254191A EP2053573A1 (en) 2007-10-23 2007-10-23 Locating portable devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP07254191A EP2053573A1 (en) 2007-10-23 2007-10-23 Locating portable devices

Publications (1)

Publication Number Publication Date
EP2053573A1 true EP2053573A1 (en) 2009-04-29

Family

ID=39232280

Family Applications (1)

Application Number Title Priority Date Filing Date
EP07254191A Ceased EP2053573A1 (en) 2007-10-23 2007-10-23 Locating portable devices

Country Status (1)

Country Link
EP (1) EP2053573A1 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013091133A1 (en) 2011-12-20 2013-06-27 Telefonaktiebolaget L M Ericsson (Publ) Methods, user equipment, property device, and computer program products for detecting movement of the property device and of indicating such movement at the user device
WO2013154281A1 (en) * 2012-04-13 2013-10-17 Kim Dong-Yeon Location management system
WO2014042507A1 (en) * 2012-09-13 2014-03-20 Balda Solutions Malaysia Sdn Bhd A wireless pairing and/or tracking system for locating lost items
WO2014051978A1 (en) * 2012-09-28 2014-04-03 Google Inc. System and method for managing a power mode of a designated electronic device
TWI469071B (en) * 2010-06-29 2015-01-11 Wen Kai Tsai Task-messaging device
US9191775B2 (en) 2013-12-19 2015-11-17 International Business Machines Corporation Electronically binding to a lost mobile device
EP3144910A1 (en) * 2015-09-16 2017-03-22 Xiaomi Inc. Method and device for locating a wearable device
EP3091518A3 (en) * 2015-04-14 2017-04-26 Hänggi, Daniel A tracking device and a system for finding objects
EP3200482A1 (en) * 2016-01-22 2017-08-02 The Raymond Corporation Systems and methods for a material handling vehicle network
CN107172602A (en) * 2017-06-27 2017-09-15 上海展扬通信技术有限公司 The data security protection method and device of mobile terminal
IT201600078786A1 (en) * 2016-07-29 2018-01-29 Blu Oberon Srls System for the remote detection of the position of things, people and animals
US9881481B2 (en) 2013-12-20 2018-01-30 International Business Machines Corporation Mobile device loss prevention
US9903940B2 (en) 2013-12-30 2018-02-27 Qualcomm Incorporated Entrusted device localization scheme using ultrasound signatures
US10068456B2 (en) 2016-06-22 2018-09-04 International Business Machines Corporation Locating a lost device
CN112437401A (en) * 2020-11-25 2021-03-02 维沃移动通信有限公司 Operation control method and device and electronic equipment
WO2023274026A1 (en) * 2021-07-01 2023-01-05 华为技术有限公司 Interaction method and apparatus for electronic device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5570081A (en) 1994-11-02 1996-10-29 Holstrom; Stephen L. Lost article tracking system
US6067018A (en) 1998-12-22 2000-05-23 Joan M. Skelton Lost pet notification system
WO2005008914A1 (en) * 2003-07-10 2005-01-27 University Of Florida Research Foundation, Inc. Mobile care-giving and intelligent assistance device
US6940407B2 (en) 2003-08-28 2005-09-06 Motorola, Inc. Method and apparatus for detecting loss and location of a portable communications device
EP1630757A1 (en) 2004-08-26 2006-03-01 Swisscom Mobile AG Method and system for detecting lost or found objects
US20060055537A1 (en) * 2004-09-15 2006-03-16 Radarfind Corporation Methods, identification tags and computer program products for automated location and monitoring of mobile devices
JP2006092128A (en) 2004-09-22 2006-04-06 Sharp Corp Communication terminal equipment, article management system and article management method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5570081A (en) 1994-11-02 1996-10-29 Holstrom; Stephen L. Lost article tracking system
US6067018A (en) 1998-12-22 2000-05-23 Joan M. Skelton Lost pet notification system
WO2005008914A1 (en) * 2003-07-10 2005-01-27 University Of Florida Research Foundation, Inc. Mobile care-giving and intelligent assistance device
US6940407B2 (en) 2003-08-28 2005-09-06 Motorola, Inc. Method and apparatus for detecting loss and location of a portable communications device
EP1630757A1 (en) 2004-08-26 2006-03-01 Swisscom Mobile AG Method and system for detecting lost or found objects
US20060055537A1 (en) * 2004-09-15 2006-03-16 Radarfind Corporation Methods, identification tags and computer program products for automated location and monitoring of mobile devices
JP2006092128A (en) 2004-09-22 2006-04-06 Sharp Corp Communication terminal equipment, article management system and article management method

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI469071B (en) * 2010-06-29 2015-01-11 Wen Kai Tsai Task-messaging device
US9349271B2 (en) 2011-12-20 2016-05-24 Telefonaktiebolaget Lm Ericsson (Publ) Methods, user equipment, property device, and computer program products for detecting movement of the property device and of indicating such movement at the user device
WO2013091133A1 (en) 2011-12-20 2013-06-27 Telefonaktiebolaget L M Ericsson (Publ) Methods, user equipment, property device, and computer program products for detecting movement of the property device and of indicating such movement at the user device
EP2795803A4 (en) * 2011-12-20 2015-09-09 Ericsson Telefon Ab L M Methods, user equipment, property device, and computer program products for detecting movement of the property device and of indicating such movement at the user device
WO2013154281A1 (en) * 2012-04-13 2013-10-17 Kim Dong-Yeon Location management system
US9532178B2 (en) 2012-04-13 2016-12-27 Dong-Yeon Kim Location management system
WO2014042507A1 (en) * 2012-09-13 2014-03-20 Balda Solutions Malaysia Sdn Bhd A wireless pairing and/or tracking system for locating lost items
US9485613B2 (en) 2012-09-13 2016-11-01 Salutica Allied Solutions Sdn. Bhd. Wireless pairing and tracking system for locating lost items
US9939871B2 (en) 2012-09-28 2018-04-10 Google Llc System and method for managing a power mode of a designated electronic device
US9304572B2 (en) 2012-09-28 2016-04-05 Google Inc. System and method for managing a power mode of a designated electronic device
WO2014051978A1 (en) * 2012-09-28 2014-04-03 Google Inc. System and method for managing a power mode of a designated electronic device
US9867028B2 (en) 2013-12-19 2018-01-09 International Business Machines Corporation Electronically binding to a lost mobile device
US9191775B2 (en) 2013-12-19 2015-11-17 International Business Machines Corporation Electronically binding to a lost mobile device
US9451465B2 (en) 2013-12-19 2016-09-20 International Business Machines Corporation Electronically binding to a lost mobile device
US10276027B2 (en) 2013-12-20 2019-04-30 International Business Machines Corporation Mobile device loss prevention
US9881480B2 (en) 2013-12-20 2018-01-30 International Business Machines Corporation Mobile device loss prevention
US10282970B2 (en) 2013-12-20 2019-05-07 International Business Machines Corporation Mobile device loss prevention
US9881481B2 (en) 2013-12-20 2018-01-30 International Business Machines Corporation Mobile device loss prevention
US9903940B2 (en) 2013-12-30 2018-02-27 Qualcomm Incorporated Entrusted device localization scheme using ultrasound signatures
EP3091518A3 (en) * 2015-04-14 2017-04-26 Hänggi, Daniel A tracking device and a system for finding objects
EP3144910A1 (en) * 2015-09-16 2017-03-22 Xiaomi Inc. Method and device for locating a wearable device
EP3200482A1 (en) * 2016-01-22 2017-08-02 The Raymond Corporation Systems and methods for a material handling vehicle network
US10338603B2 (en) 2016-01-22 2019-07-02 The Raymond Corporation Systems and methods for a material handling vehicle network
US11048270B2 (en) 2016-01-22 2021-06-29 The Raymond Corporation Systems and methods for a material handling vehicle network
US10068456B2 (en) 2016-06-22 2018-09-04 International Business Machines Corporation Locating a lost device
US10229582B2 (en) 2016-06-22 2019-03-12 International Business Machines Corporation Locating a lost device
IT201600078786A1 (en) * 2016-07-29 2018-01-29 Blu Oberon Srls System for the remote detection of the position of things, people and animals
CN107172602A (en) * 2017-06-27 2017-09-15 上海展扬通信技术有限公司 The data security protection method and device of mobile terminal
CN112437401A (en) * 2020-11-25 2021-03-02 维沃移动通信有限公司 Operation control method and device and electronic equipment
WO2023274026A1 (en) * 2021-07-01 2023-01-05 华为技术有限公司 Interaction method and apparatus for electronic device

Similar Documents

Publication Publication Date Title
EP2053573A1 (en) Locating portable devices
EP1589778B1 (en) Mobile communication terminal
US6987975B1 (en) Method of generating control signals based on location of radio terminals
KR100800722B1 (en) Method and system for searching lost mobile in a wireless mobile
US9014758B2 (en) Security for wireless communication
CN101796533B (en) Methods, computer program products, terminals and systems for providing location reporting of RFID enabled moveable objects
US8320881B2 (en) Proximity based security protocol for processor-based systems
EP2700211B1 (en) Methods, systems and computer program products for registration of and anonymous communications related to tagged objects
EP1455467A1 (en) Portable terminal having function of detecting approach of person by using proximity wireless communication means, recorded medium used for the same, and server
US8401567B2 (en) Method and system to locate an object
US20010052846A1 (en) Electronic apparatus including a device for preventing loss or theft
US20060232437A1 (en) Method and system for operating a wireless device with a radio frequency identification tag
JP2006203902A (en) Mobile device including rfid tag reader
JP2006148848A (en) System device applying radio frequency identification system to mobile phone for entry/exit management and security report
CN101510323A (en) Gate inhibition system and method for employing wireless radio frequency discrimination
US20080161044A1 (en) Image Capture Reporting Based On Content-Associated Wireless Identification
US20120171995A1 (en) System for Authorizing the Use of Communication Devices by Proximity
US20100194528A1 (en) Control device, control system, control method and storage medium
CN106572488B (en) WIFI hotspot sharing method of terminal equipment and terminal equipment
JP2007281861A (en) Terminal authentication method and mobile terminal device
US20080278286A1 (en) Communication Method, System and User Terminal
US8050654B2 (en) Method for locking function and mobile communication terminal
CN103167413A (en) Cell phone tracking method
CN102196464A (en) Method, device and system for controlling safe use of machine-to-machine (M2M) terminal
US20050288043A1 (en) Method for preventing PHS mobile phones from being stolen by using remote control function of short message service

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR MK RS

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 20090521