EP2053573A1 - Localisation de dispositifs portables - Google Patents

Localisation de dispositifs portables Download PDF

Info

Publication number
EP2053573A1
EP2053573A1 EP07254191A EP07254191A EP2053573A1 EP 2053573 A1 EP2053573 A1 EP 2053573A1 EP 07254191 A EP07254191 A EP 07254191A EP 07254191 A EP07254191 A EP 07254191A EP 2053573 A1 EP2053573 A1 EP 2053573A1
Authority
EP
European Patent Office
Prior art keywords
transceiver
lost
portable
communication device
agent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP07254191A
Other languages
German (de)
English (en)
Inventor
designation of the inventor has not yet been filed The
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
British Telecommunications PLC
Original Assignee
British Telecommunications PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by British Telecommunications PLC filed Critical British Telecommunications PLC
Priority to EP07254191A priority Critical patent/EP2053573A1/fr
Publication of EP2053573A1 publication Critical patent/EP2053573A1/fr
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1427Mechanical actuation by lifting or attempted removal of hand-portable articles with transmitter-receiver for distance detection
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0219Circuit arrangements
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0241Data exchange details, e.g. data protocol
    • G08B21/0255System arrangements wherein the parent unit emits, i.e. the parent unit incorporates the emitter
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0241Data exchange details, e.g. data protocol
    • G08B21/0258System arrangements wherein both parent and child units can emit and receive
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0275Electronic Article Surveillance [EAS] tag technology used for parent or child unit, e.g. same transmission technology, magnetic tag, RF tag, RFID
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/028Communication between parent and child units via remote transmission means, e.g. satellite network

Definitions

  • GSM Global System for Mobile Communications
  • UMTS Universal Mobile Telecommunications System
  • IMEI International Mobile Equipment Identity
  • SIM Subscriber Identity Module
  • IMSI International Mobile Subscriber Identity
  • RFID Radio Frequency Identification
  • RFID has become popular as its range has increased significantly over the years. Passive RFID tags can be read from a distance of about 3 to 6 feet.
  • RFID has been proposed by many for product tracking and monitoring, lost pet notification, and lost article tracking.
  • Such systems are separately described in various patents such as US Patent 5570081 , US Patent 6067018 , US Patent 6940407 , European Patent 1630757 and Japan Patent 2006092128 . Although such systems provide a useful mechanism to track the lost or stolen item at close proximity through the use of static or mobile RFID readers, these systems do not provide precise location indication in identifying the particular lost article which is important to small size articles such as mobile handheld electronic equipment.
  • Auxiliary means such as providing the lost item's pictures to the third party human agent in order to identify the lost article are typically deployed. Foreseeing that the RFID tag and reader will become more common in future mobile handheld devices such as mobile phones, various methods involving the exchange of information with a server through the mobile network to compare the targeted lost device's attributes with those recorded in the server in order for third party human agent to exactly identify the respective article have been proposed. However, such systems do not provide sufficient privacy and security measures as the lost device's information is broadcast to a large crowd of human agents in the proximity. Existing methods also risk a large crowd of users going after the same lost device. In addition, the risk of disclosing device's information to unwanted third parties is high as the lost device has no control in determining the respective third party. Thus there is a need in the art for a secured system that can precisely indicate its location once the lost item is being located by third party.
  • European Patent 1630757 and Japanese Patent 2006092128 describe a mechanism to track stolen/lost articles with RFID tag.
  • the defined tracking systems involve the use of multiple static or mobile RFID readers to locate the lost device. Once the device is located through the readers, a notification will be send to the device owner.
  • Japanese Patent 2006092128 also depicts the use of camera functionality of mobile readers to help third party human agent to identify the lost stolen article.
  • the lost device is a cellphone, i.e. a portable telephone usable with a cellular radio network such as GSM, but it could equally well be a laptop computer, personal digital assistant (PDA), or other intelligent device such as perhaps a Wi-fi enabled MP3 player.
  • a cellphone i.e. a portable telephone usable with a cellular radio network such as GSM
  • PDA personal digital assistant
  • other intelligent device such as perhaps a Wi-fi enabled MP3 player.
  • This recovery mechanism assumes that the lost device has a near field wireless link capability of the Radio Frequency Identification (RFID) type, but other near field wireless link communication technology such as Bluetooth or infra-red could also be used.
  • RFID Radio Frequency Identification
  • the outline diagram of the system in Figure 1 shows a lost device 1, in the form of a cellular telephone 1.
  • the device 1 also has RFID capability as will be described in more detail below.
  • Human agents who may be entrusted with the task of finding the lost device 1 are shown at 2, 2a, 2b.
  • Each carries a mobile communication device 3, 3a, 3b, in this example also a cellular telephone, again with RFID capability.
  • the agents' devices be of the same type as the lost device and/or as the devices of other agents; it is however essential that the near-field capability be the same as that of the lost device.
  • the agent's device should have reader functionality able to read the tag, and where a tag on the agent's device is to be read, the lost device should have reader functionality able to read that tag.
  • the most convenient implementation is to make the lost device capable of acting as agent device and vice versa, so that the two have the same construction.
  • a server 4 has the function of liaising with the lost device and the agent devices; it can be a general purpose computer, suitably programmed, with an interface to the cellular radio network 5 to which the lost device 1 and agent devices 3, 3a, 3b also belong, so that it may exchange messages with them.
  • This implementation of the invention makes use of the lost device's near field wireless link capability to identify a possible third party human agent upon the declaration of item lost by the owner if the lost device is on power on mode. Otherwise, server will locate a trusted potential agent on behalf of the lost device.
  • the system consists of several aspects as listed below:
  • FIG. 1A is a block diagram of a cellular telephone, which can be the lost device 1 or the agent device 3.
  • each mobile handheld device is equipped with one or more near field wireless links interface such as a standard mobile RFID reader 103 and an embedded RFID tag 104.
  • a dedicated "RFID TAG to Mobile Devices Interface" module 105 is added to the standard RFID tag and a beeper circuit 106 is added to the handheld device as shown in Figure 1A .
  • the main functionality of the additional interface is that when a special command is receiver by the tag, this is recognised and acted upon to draw power from the device's battery in order either to activate the synchronous beeping functionality of the lost device or to power up the device for the ringing of a customized ring tone through the lost device.
  • close proximity is defined as the location within the base station or access point where the server has found the lost device.
  • Neighbouring proximity is referring to location within next base station or access point where the server has found the lost device.
  • FIG 2 shows the flow process of embodiment 1. Some of the messages that are sent during this process are shown in Figure 6 .
  • the process is initiated at Step 200 by the owner of the lost device 1 reporting its loss to the server 4. This can be by any convenient means: by telephone to a human operator who keys the information into the server, or directly, perhaps via an internet connection to the server. Either way, the server receives a message to the effect that the device is lost, together with an identifier.
  • the identifier can be but not limited to telephone number of the lost device, IMEI or RFID tag number of the lost device. In the present example, of a lost phone, this is the telephone number.
  • the server 4 interrogates the network 5 at Step 201 to determine whether the respective device 1 is still connected to the network. If not, it is then (202) treated as a device that is in the "power off" state, as will be described later with reference to Figure 4 .
  • the server sends (203) a message via the network 5 to the lost device 1 to activate its RFID reader 103 if the reader is in off state in order to scan (204) for a legitimate agent.
  • this message does not trigger ringing or any other audible or visual indication by the device.
  • stealthy message This requires only minor modification of the device's software to recognise and act upon the signal.
  • control is passed (205, 206) to a neighbouring agent detection mechanism (refer to Figure 3 for more detailed description). If there is at least one agent within RFID range of the lost device, then the RFID tag on (for example) the agent device 2 transmits a response message that is then received by the RFID reader 103 of the lost device 1. This message contains a tag identifier. If two or more agent devices respond, then only the agent with strongest link is captured. If two or more agents have the same or similar signal strength then if desired these agents' information can be sent to the owner, who then decides which agent to choose at step 209, but other strategies for dealing with this situation could also be employed. Details of the agent device(s) not chosen could be held for later use.
  • the lost device informs the server 4, via the network 5, of the tag information of the potential agent device.
  • the server 4 validates the agent (e.g. by reference to a database held at the server containing tag information on authorised agents) to prevent connection to a bogus agent.
  • the server may contact the owner at 208, giving the credentials of the agent device and asking for confirmation that the owner agrees to use of this agent. If the validation or confirmation fails then the process returns via 209 to Step 204 to scan for another agent device (or choose the second agent in the proximity list).
  • the server sends at Step 209 a request to the agent device 2 to check whether the agent is willing to help in locating the lost device, and if not the process returns via 211 to 204.
  • the server sends (Step 212) a customized ring tone such as "John Thomson, Please pick me UP" to the lost device for the lost device to auto play the ring tone (Step 213) in order to attract the agent's attention.
  • This "auto play” requires modifications to the phone, in that software needs to be installed in order for the lost device to ,download or receive the customized ringtone and then play it automatically, and then automatically delete it.
  • the custom ring tone could be downloaded in conventional manner and then followed by an ordinary phone call from the server to the phone to cause it to ring. In the latter case, a further command needs to be sent afterwards in order to revert to the original ring tone.
  • the agent then needs to send a RFID command to the lost device to stop the ring tone and the credential of the agent is captured by the lost device and send back to server. This is done so as to provide non-repudiation protection to the lost device owner as the agent cannot deny picking up the lost device.
  • a confirmation message coupled with the agent's RFID credentials is sent to the server by the agent for confirmation (216). The process is then complete.
  • the agent device needs to stop the customer ring tone by issuing a stop command through its RFID thus confirming that agent is picking up the lost device. This command is also used as a signature to confirm that the lost device has been picked up.
  • the server will served as a middle-man to locate another trusted agent that is in neighbouring proximity.
  • the flow process of this implementation is illustrated in Figure 3 .
  • a lost device that is unable to find a potential trusted agent informs the server, and 301: the server searches for the trusted agent on behalf of the lost device.
  • the server interrogates the network to determine which cell of the network the lost device is located in (or of course this information could be obtained at Step 201). Then the server sends, via the network 5, a message to one or more of its agents known to be within close or neighbouring proximity. With the aid of the HLR and VLR of the network, the server can determine the identity of the trusted agent(s) within close or neighbouring proximity.
  • the server Upon failing to locate an agent, at 301/302 the server sends a notification to the owner.
  • the server may contact the owner at 303, giving the credentials of the agent and asking for confirmation that the owner agrees to use of this agent. If confirmation fails then the process returns via 304 to Step 301 to scan for another agent device.
  • a notification is sent (304A) to the agent device to ensure that the agent is willing to help in searching the lost device, and if not the process returns via 305 to 301 to look for another agent.
  • the server sends, to the agent device, the location information of the lost device, based on the identity of the base station serving the cell that the lost device is in.
  • the agent device displays the information on a screen for the agent to read (for example it could be sent as a text message). Only location information is sent. The granularity or accuracy of the location information depends very much on the technology used by the mobile network.
  • server sends via the network 5 (Steps 307, 308) the agent's near field wireless link interface credentials such as RFID tag information, and customized ring tone, to the lost device.
  • the near field wireless link interface credentials are used (Step 309) by the RFID reader 103 of the lost device to scan for the agent device.
  • the customized ring tone is played automatically to attract the agent's attention.
  • the agent picks up the device by stopping the ring tone a confirmation message coupled with the agent's RFID credentials is sent to the server, as in the case of step 216, described above.
  • Figure 4 shows the steps to be taken when the lost device is in a "power off” state. Some of the messages that are sent during this process are shown in Figure 7.
  • the server 4 retrieves from the network 5 the last active information on the lost device to gauge the current location of the device (Step 400).
  • the server searches (402) for a potential close proximity agent; if it fails to do so, it searches (403) for a neighbouring proximity agent. The details of this kind of search have already been explained in relation to Step 301 of Figure 3 . If an agent device is found, then at Step 404 a notification is sent to the respective agent.
  • the server sends (Step 406) the respective lost device's RFID tag information and location information to the agent device.
  • the agent device uses its RFID reader to scan for the lost device (Step 407). If the lost device is found, a n-bit string command from the agent device will be sent to the lost device's RFID tag 104 to wake up the lost device (Step 410). If the lost device has sufficient reserved battery power, the n-bit string RFID command is used to auto power on the lost device (415). Once powered on, the device can communicate with the server to download customized ring tone to the lost device or doing other task such as back up.
  • Steps 416 to 419 are identical to steps 311, 314, 315 of Figure 3 . If, at Step 411, the battery power of the particular device is deemed low, a minimum amount of power from the battery is drawn to power on the synchronous beeping circuits 106. The purpose of the beeping circuits is to help agent to identify the lost device.
  • a confirmation message coupled with the agent's RFID credentials is sent to the server. For the synchronous beeping implementation, this occurs once the agent has stopped the beeping functionality (413). At 414, the agent's credentials are recorded in the lost device through RFID.
  • the synchronous beeping feature is realized through the exchanging of bit strings through RFID front ends between the lost device and the agent device.
  • Special software/instruction code is added to the RFID TAG to Mobile Devices Interface 105 and Synchronous Beeper Circuits 106 in order to perform the synchronous beeping features.
  • One possible sequence is as follows, where it is understood that each time a bitstring is sent, it is transmitted by the RFID reader 103 of the one device to the RFID tag 104 of the other device, and the interface 105 passes an appropriate instruction to the beeper circuits 106.
  • agent device responds by beeping once
  • Step 313, Figure 4 The sequence continues until terminated by Step 313, Figure 4 .
  • the lost device When the lost device is on power on mode, the systems we have described involve the use of the lost device's near field wireless link such as an RFID reader to identify a trusted human agent in the vicinity. This implementation can greatly reduce security or privacy concerns as this implementation does not need to broadcast the lost items tag information to a large number of mobile RFID readers around the vicinity.
  • the lost device has control over which third party human agent to choose in locating itself.
  • the tracking and seeking mechanism can start immediately after the authorized user reports loss of the device to the server, thus speeding the time to locate devices that are being switched off deliberately or because of running low of battery. It will be noted that, as described, the system also prevents the lost device from producing any audio alerts before a trusted human agent is identified.

Landscapes

  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
EP07254191A 2007-10-23 2007-10-23 Localisation de dispositifs portables Ceased EP2053573A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP07254191A EP2053573A1 (fr) 2007-10-23 2007-10-23 Localisation de dispositifs portables

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP07254191A EP2053573A1 (fr) 2007-10-23 2007-10-23 Localisation de dispositifs portables

Publications (1)

Publication Number Publication Date
EP2053573A1 true EP2053573A1 (fr) 2009-04-29

Family

ID=39232280

Family Applications (1)

Application Number Title Priority Date Filing Date
EP07254191A Ceased EP2053573A1 (fr) 2007-10-23 2007-10-23 Localisation de dispositifs portables

Country Status (1)

Country Link
EP (1) EP2053573A1 (fr)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013091133A1 (fr) 2011-12-20 2013-06-27 Telefonaktiebolaget L M Ericsson (Publ) Procédés, équipement d'utilisateur, dispositif de propriété et produits-programmes informatiques pour détecter un mouvement du dispositif de propriété et indiquer un tel mouvement au dispositif d'utilisateur
WO2013154281A1 (fr) * 2012-04-13 2013-10-17 Kim Dong-Yeon Système de gestion de localisation
WO2014042507A1 (fr) * 2012-09-13 2014-03-20 Balda Solutions Malaysia Sdn Bhd Système d'appariement et/ou de repérage sans fil pour la localisation d'objets perdus
WO2014051978A1 (fr) * 2012-09-28 2014-04-03 Google Inc. Système et procédé pour gérer un mode de puissance d'un dispositif électronique désigné
TWI469071B (zh) * 2010-06-29 2015-01-11 Wen Kai Tsai 人身派遣事務機
US9191775B2 (en) 2013-12-19 2015-11-17 International Business Machines Corporation Electronically binding to a lost mobile device
EP3144910A1 (fr) * 2015-09-16 2017-03-22 Xiaomi Inc. Procédé et dispositif de localisation d'un dispositif vestimentaire
EP3091518A3 (fr) * 2015-04-14 2017-04-26 Hänggi, Daniel Dispositif de suivi et système de recherche d'objets
EP3200482A1 (fr) * 2016-01-22 2017-08-02 The Raymond Corporation Systèmes et procédés pour un réseau de véhicule de manipulation de matériau
CN107172602A (zh) * 2017-06-27 2017-09-15 上海展扬通信技术有限公司 移动终端的数据安全防护方法和装置
IT201600078786A1 (it) * 2016-07-29 2018-01-29 Blu Oberon Srls Sistema per il rilevamento a distanza della posizione di cose, persone e animali
US9881480B2 (en) 2013-12-20 2018-01-30 International Business Machines Corporation Mobile device loss prevention
US9903940B2 (en) 2013-12-30 2018-02-27 Qualcomm Incorporated Entrusted device localization scheme using ultrasound signatures
US10068456B2 (en) 2016-06-22 2018-09-04 International Business Machines Corporation Locating a lost device
CN112437401A (zh) * 2020-11-25 2021-03-02 维沃移动通信有限公司 操作控制方法、装置以及电子设备
WO2023274026A1 (fr) * 2021-07-01 2023-01-05 华为技术有限公司 Procédé et appareil d'interaction pour dispositif électronique

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5570081A (en) 1994-11-02 1996-10-29 Holstrom; Stephen L. Lost article tracking system
US6067018A (en) 1998-12-22 2000-05-23 Joan M. Skelton Lost pet notification system
WO2005008914A1 (fr) * 2003-07-10 2005-01-27 University Of Florida Research Foundation, Inc. Dispositif de soins et d'assistance intelligent mobile
US6940407B2 (en) 2003-08-28 2005-09-06 Motorola, Inc. Method and apparatus for detecting loss and location of a portable communications device
EP1630757A1 (fr) 2004-08-26 2006-03-01 Swisscom Mobile AG Méthode et système pour détecter des objets perdus ou trouvés
US20060055537A1 (en) * 2004-09-15 2006-03-16 Radarfind Corporation Methods, identification tags and computer program products for automated location and monitoring of mobile devices
JP2006092128A (ja) 2004-09-22 2006-04-06 Sharp Corp 通信端末装置、物品管理システム及び物品管理方法

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5570081A (en) 1994-11-02 1996-10-29 Holstrom; Stephen L. Lost article tracking system
US6067018A (en) 1998-12-22 2000-05-23 Joan M. Skelton Lost pet notification system
WO2005008914A1 (fr) * 2003-07-10 2005-01-27 University Of Florida Research Foundation, Inc. Dispositif de soins et d'assistance intelligent mobile
US6940407B2 (en) 2003-08-28 2005-09-06 Motorola, Inc. Method and apparatus for detecting loss and location of a portable communications device
EP1630757A1 (fr) 2004-08-26 2006-03-01 Swisscom Mobile AG Méthode et système pour détecter des objets perdus ou trouvés
US20060055537A1 (en) * 2004-09-15 2006-03-16 Radarfind Corporation Methods, identification tags and computer program products for automated location and monitoring of mobile devices
JP2006092128A (ja) 2004-09-22 2006-04-06 Sharp Corp 通信端末装置、物品管理システム及び物品管理方法

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI469071B (zh) * 2010-06-29 2015-01-11 Wen Kai Tsai 人身派遣事務機
US9349271B2 (en) 2011-12-20 2016-05-24 Telefonaktiebolaget Lm Ericsson (Publ) Methods, user equipment, property device, and computer program products for detecting movement of the property device and of indicating such movement at the user device
WO2013091133A1 (fr) 2011-12-20 2013-06-27 Telefonaktiebolaget L M Ericsson (Publ) Procédés, équipement d'utilisateur, dispositif de propriété et produits-programmes informatiques pour détecter un mouvement du dispositif de propriété et indiquer un tel mouvement au dispositif d'utilisateur
EP2795803A4 (fr) * 2011-12-20 2015-09-09 Ericsson Telefon Ab L M Procédés, équipement d'utilisateur, dispositif de propriété et produits-programmes informatiques pour détecter un mouvement du dispositif de propriété et indiquer un tel mouvement au dispositif d'utilisateur
WO2013154281A1 (fr) * 2012-04-13 2013-10-17 Kim Dong-Yeon Système de gestion de localisation
US9532178B2 (en) 2012-04-13 2016-12-27 Dong-Yeon Kim Location management system
WO2014042507A1 (fr) * 2012-09-13 2014-03-20 Balda Solutions Malaysia Sdn Bhd Système d'appariement et/ou de repérage sans fil pour la localisation d'objets perdus
US9485613B2 (en) 2012-09-13 2016-11-01 Salutica Allied Solutions Sdn. Bhd. Wireless pairing and tracking system for locating lost items
US9939871B2 (en) 2012-09-28 2018-04-10 Google Llc System and method for managing a power mode of a designated electronic device
US9304572B2 (en) 2012-09-28 2016-04-05 Google Inc. System and method for managing a power mode of a designated electronic device
WO2014051978A1 (fr) * 2012-09-28 2014-04-03 Google Inc. Système et procédé pour gérer un mode de puissance d'un dispositif électronique désigné
US9867028B2 (en) 2013-12-19 2018-01-09 International Business Machines Corporation Electronically binding to a lost mobile device
US9191775B2 (en) 2013-12-19 2015-11-17 International Business Machines Corporation Electronically binding to a lost mobile device
US9451465B2 (en) 2013-12-19 2016-09-20 International Business Machines Corporation Electronically binding to a lost mobile device
US10276027B2 (en) 2013-12-20 2019-04-30 International Business Machines Corporation Mobile device loss prevention
US9881481B2 (en) 2013-12-20 2018-01-30 International Business Machines Corporation Mobile device loss prevention
US10282970B2 (en) 2013-12-20 2019-05-07 International Business Machines Corporation Mobile device loss prevention
US9881480B2 (en) 2013-12-20 2018-01-30 International Business Machines Corporation Mobile device loss prevention
US9903940B2 (en) 2013-12-30 2018-02-27 Qualcomm Incorporated Entrusted device localization scheme using ultrasound signatures
EP3091518A3 (fr) * 2015-04-14 2017-04-26 Hänggi, Daniel Dispositif de suivi et système de recherche d'objets
EP3144910A1 (fr) * 2015-09-16 2017-03-22 Xiaomi Inc. Procédé et dispositif de localisation d'un dispositif vestimentaire
EP3200482A1 (fr) * 2016-01-22 2017-08-02 The Raymond Corporation Systèmes et procédés pour un réseau de véhicule de manipulation de matériau
US10338603B2 (en) 2016-01-22 2019-07-02 The Raymond Corporation Systems and methods for a material handling vehicle network
US11048270B2 (en) 2016-01-22 2021-06-29 The Raymond Corporation Systems and methods for a material handling vehicle network
US10068456B2 (en) 2016-06-22 2018-09-04 International Business Machines Corporation Locating a lost device
US10229582B2 (en) 2016-06-22 2019-03-12 International Business Machines Corporation Locating a lost device
IT201600078786A1 (it) * 2016-07-29 2018-01-29 Blu Oberon Srls Sistema per il rilevamento a distanza della posizione di cose, persone e animali
CN107172602A (zh) * 2017-06-27 2017-09-15 上海展扬通信技术有限公司 移动终端的数据安全防护方法和装置
CN112437401A (zh) * 2020-11-25 2021-03-02 维沃移动通信有限公司 操作控制方法、装置以及电子设备
WO2023274026A1 (fr) * 2021-07-01 2023-01-05 华为技术有限公司 Procédé et appareil d'interaction pour dispositif électronique

Similar Documents

Publication Publication Date Title
EP2053573A1 (fr) Localisation de dispositifs portables
EP1589778B1 (fr) Terminal de communication mobile
US6987975B1 (en) Method of generating control signals based on location of radio terminals
KR100800722B1 (ko) 분실 휴대단말기의 위치 확인 방법 및 시스템
US9014758B2 (en) Security for wireless communication
CN101796533B (zh) 提供支持rfid的可移动对象的位置报告的方法、计算机程序产品、终端以及系统
US8320881B2 (en) Proximity based security protocol for processor-based systems
US20040248569A1 (en) Portable terminal having function of detecting other person's approach utilizing short distance wireless communication means, and storage medium and server that are used for the detection
US8401567B2 (en) Method and system to locate an object
US20010052846A1 (en) Electronic apparatus including a device for preventing loss or theft
US20060232437A1 (en) Method and system for operating a wireless device with a radio frequency identification tag
JP2006203902A (ja) Rfidタグ・リーダーを含むモバイル・デバイス
JP2006148848A (ja) 無線周波認識システムを携帯電話に応用して出入管理と安全報告を行なうシステム装置
CN101510323A (zh) 运用无线射频识别的门禁系统及其方法
US20080161044A1 (en) Image Capture Reporting Based On Content-Associated Wireless Identification
US20120171995A1 (en) System for Authorizing the Use of Communication Devices by Proximity
US20100194528A1 (en) Control device, control system, control method and storage medium
CN106572488B (zh) 一种终端设备的wifi热点共享方法以及终端设备
JP2007281861A (ja) 端末認証方法及び携帯端末装置
US20080278286A1 (en) Communication Method, System and User Terminal
US8050654B2 (en) Method for locking function and mobile communication terminal
CN103167413A (zh) 一种手机追踪方法
CN102196464A (zh) 控制m2m终端安全使用的方法、装置和系统
US20050288043A1 (en) Method for preventing PHS mobile phones from being stolen by using remote control function of short message service
KR101620934B1 (ko) 시스템에서의 사용자의 신원의 관리

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR MK RS

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 20090521