EP2764713A2 - Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobiles - Google Patents

Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobiles

Info

Publication number
EP2764713A2
EP2764713A2 EP12783539.5A EP12783539A EP2764713A2 EP 2764713 A2 EP2764713 A2 EP 2764713A2 EP 12783539 A EP12783539 A EP 12783539A EP 2764713 A2 EP2764713 A2 EP 2764713A2
Authority
EP
European Patent Office
Prior art keywords
mobile device
user equipment
mobile user
usage
consequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP12783539.5A
Other languages
German (de)
English (en)
Inventor
William Fitzgerald
Peter Bermingham
Frank Hannigan
Paul Prendergast
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yougetitback Ltd
Original Assignee
Yougetitback Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/333,392 external-priority patent/US11864051B2/en
Application filed by Yougetitback Ltd filed Critical Yougetitback Ltd
Priority to EP16198216.0A priority Critical patent/EP3166294B1/fr
Publication of EP2764713A2 publication Critical patent/EP2764713A2/fr
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/023Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • H04M1/724631User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad
    • H04M1/724634With partially locked states, e.g. when some telephonic functional locked states or applications remain accessible in the locked states
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/58Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP based on statistics of usage or network monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/88Provision for limiting connection, or expenditure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • H04W4/027Services making use of location information using location based information parameters using movement velocity, acceleration information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/50Service provisioning or reconfiguring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72418User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
    • H04M1/72421User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent

Definitions

  • Certain embodiments relate to systems and methods for altering the function of an electronic device in response a user of the device violating or adhering to a rule or set of rules.
  • the altered functionality could facilitate behavior modification, such as negative consequences for rule-breakers or positive consequences for rule-followers.
  • Figure 6 is a diagram showing various functionalities of the certain embodiments, one or more of which may be included in step 140.
  • a wireless system such as a wireless mobile telephony network, General Packet Radio Service (GPRS) network, wireless Local Area Network (WLAN), BlueTooth®, Global System for Mobile Communications (GSM) network, Personal Communication Service (PCS) network, Advanced Mobile Phone System (AMPS) network, Infrared (IR), Near Field Communication (NFC), Wi-Fi®, IEEE 102.1 1 network, a Worldwide Interoperability for Microwave Access (WiMax) network, a microwave network, and/or a satellite communication network.
  • GPRS General Packet Radio Service
  • WLAN Wireless Local Area Network
  • GSM Global System for Mobile Communications
  • PCS Personal Communication Service
  • AMPS Advanced Mobile Phone System
  • IR Infrared
  • NFC Near Field Communication
  • Wi-Fi® IEEE 102.1 1 network
  • WiMax Worldwide Interoperability for Microwave Access
  • the security authority may communicate with the mobile device in any desired manner, such as through software operating on a host server in communication with a database.
  • a security threat i.e., the user believes the mobile device has been lost, stolen, or may otherwise be subject to unauthorized access.
  • the functionality of the mobile device can then be altered as a result (140), as discussed further below.
  • a combination of events may be weighted such that the occurrence of a security compromise event is based on a predetermined voting threshold.
  • Individual events may be given more significance than other events, such that only a repeated occurrence of a particular event deviates from the predetermined threshold, while a single occurrence of another event deviates from the threshold. For example, a call outside the usage profile's normal time range may need to occur a total of four times before the predetermined threshold is exceeded, while the entering of an incorrect password two times in succession deviates from the threshold. Similarly, an incorrect password entry in combination with two calls outside the normal time range in the usage profile can deviate from the predetermined threshold. Events may be weighted or scored for the predetermined voting threshold in any desired manner.
  • a security compromise event may be determined based on the failure of a user to provide the proper biometric data.
  • a biometric measurement of a current user of the mobile device is obtained, and the biometric
  • a security compromise event can then be determined where the biometric measurement exceeds a predetermined threshold variance from the previously stored reference value.
  • the security compromise event may be based on any number of biometric measurements from the current user of a mobile device, such as a fingerprint scan, an iris scan, a retina scan, a voice sample, a breath sample, and/or a photograph of a portion of the body of the current user of the mobile device.
  • An environmental parameter may also include information from or about systems and devices in communication with the mobile device.
  • a wireless receiver in communication with the mobile device can be activated and used to sense one or more wireless network addresses from one or more signals received by the mobile device at different points in time. The network addresses sensed at different points in time can be compared to determine whether the sensed network addresses differ, and thus determine if the mobile device has moved.
  • the mobile device comprises a mobile telephone
  • telephone numbers dialed by the unauthorized user can be logged and transmitted to the security authority and/or authorized user, and authorized user and/or security authority can be alerted as the mobile device is engaging in a telephone call.
  • a third party (such as a security authority) may request to access the telephone call, and then establish a conference connection to the telephone call. The third party may actively participate in the conversation or listen to the conversation surreptitiously.
  • the microphone or camera may be activated upon any desired condition being satisfied, such as: the mobile device receiving a call from a predetermined phone number; when the mobile device receives a call during which a predetermined pattern of DTMF tones is received by the mobile device; or during a call received by the mobile device, an utterance received by the mobile device matches within a predetermined threshold a security enablement utterance stored within the mobile device.
  • the mobile device receiving a call from a predetermined phone number; when the mobile device receives a call during which a predetermined pattern of DTMF tones is received by the mobile device; or during a call received by the mobile device, an utterance received by the mobile device matches within a predetermined threshold a security enablement utterance stored within the mobile device.
  • the software application may be configured to operate with minimal underlying hardware functionality.
  • the application may be initiated before the mobile device establishes a network connection.
  • Such a situation may be provided, for instance, when the software application is installed on a SIM card in the mobile device, and the application launches before other software in the mobile device operating system.
  • Figures 9-64 depict various aspects of the operation of certain embodiments.
  • Figures 9-16 depict example notification measures that can be provided on a mobile computing device such as a laptop computer in accordance with certain embodiments.
  • a notification icon or graphic is provided in proximity to input fields where users normally log in to access the mobile computing device.
  • the notification icon or graphic is accompanied by text providing information regarding returning of the device.
  • the various notification messages allow a finder of the mobile device to see that the device is protected by an application operating in conjunction with certain embodiments as well as to provide information to allow the user to return the device.
  • screen 1300 provides a link to a website that an innocent finder can click on to return the device.
  • monitoring or management individuals may include a nurse, doctor, or other healthcare or assistance worker. Other examples of such individuals also include employers.
  • alerts from the mobile device may sent to parents of a child, others may be sent to a security service, and a further set of alerts may be sent to a law enforcement agency, such as a police station, or other emergency services provider, such as a fire station or poison control center.
  • a law enforcement agency such as a police station, or other emergency services provider, such as a fire station or poison control center.
  • Figure 65 illustrates a method according to certain embodiments.
  • the method shown in Figure 65 can be performed by one or more devices.
  • the method can be performed in a mobile user equipment or in one or more servers.
  • the method may be useful for assisting in behavioral control of a user of a mobile device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Operations Research (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Data Mining & Analysis (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Theoretical Computer Science (AREA)
  • Probability & Statistics with Applications (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Testing And Monitoring For Control Systems (AREA)
  • Alarm Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Conformément à certains modes de réalisation, l'invention concerne des systèmes et des procédés pour surveiller et/ou gérer un dispositif par rapport à une règle ou un ensemble de règles et/ou altérer la fonctionnalité du dispositif en réponse. Dans un mode de réalisation, un procédé consiste à surveiller l'équipement d'un utilisateur mobile par rapport à une règle. Le procédé consiste également à appliquer au moins une conséquence à l'équipement d'utilisateur mobile lorsque la règle est au moins l'une d'une règle suivie ou violée. La ou les conséquences comprennent au moins l'une d'une récompense ou d'une sanction. La ou les conséquences concernent l'utilisation de l'équipement d'utilisateur mobile.
EP12783539.5A 2011-10-06 2012-10-08 Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobiles Ceased EP2764713A2 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP16198216.0A EP3166294B1 (fr) 2011-10-06 2012-10-08 Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobiles

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201161544182P 2011-10-06 2011-10-06
US13/333,392 US11864051B2 (en) 2008-04-01 2011-12-21 Systems and methods for monitoring and managing use of mobile electronic devices
PCT/EP2012/069826 WO2013050586A2 (fr) 2011-10-06 2012-10-08 Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobiles

Related Child Applications (1)

Application Number Title Priority Date Filing Date
EP16198216.0A Division EP3166294B1 (fr) 2011-10-06 2012-10-08 Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobiles

Publications (1)

Publication Number Publication Date
EP2764713A2 true EP2764713A2 (fr) 2014-08-13

Family

ID=47146343

Family Applications (2)

Application Number Title Priority Date Filing Date
EP16198216.0A Active EP3166294B1 (fr) 2011-10-06 2012-10-08 Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobiles
EP12783539.5A Ceased EP2764713A2 (fr) 2011-10-06 2012-10-08 Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobiles

Family Applications Before (1)

Application Number Title Priority Date Filing Date
EP16198216.0A Active EP3166294B1 (fr) 2011-10-06 2012-10-08 Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobiles

Country Status (4)

Country Link
EP (2) EP3166294B1 (fr)
BR (1) BR112014008385A2 (fr)
CA (1) CA2851311A1 (fr)
WO (1) WO2013050586A2 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10674375B2 (en) 2014-05-28 2020-06-02 Corning Optical Communications LLC Multiple application modules (MAMs) for monitoring signals in components in wireless distribution systems, including distributed antenna systems (DASs), and related systems and methods
US11032687B2 (en) 2015-01-09 2021-06-08 Corning Optical Communications LLC Multiple application module or unit

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9413707B2 (en) 2014-04-11 2016-08-09 ACR Development, Inc. Automated user task management
US8942727B1 (en) 2014-04-11 2015-01-27 ACR Development, Inc. User Location Tracking
EP3449650A1 (fr) 2016-04-27 2019-03-06 Corning Optical Communications LLC Modules d'application multiples (mam) et/ou unités d'application multiples (mau) permettant de fournir des services dans des systèmes de distribution sans fil (wds) et comprenant des systèmes d'antenne distribués (das), et systèmes et procédés associés
WO2017210186A1 (fr) 2016-05-31 2017-12-07 Corning Optical Communications LLC Dispositifs d'applications multiples pour fournir des services dans des systèmes de distribution sans fil (wds), notamment des systèmes d'antennes réparties (das), et systèmes et procédés associés
CN114338915B (zh) * 2021-12-24 2024-07-30 中国联合网络通信集团有限公司 来电号码风险识别方法、装置、设备及存储介质

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4405829A (en) 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
GB2348777B (en) * 1999-04-06 2003-11-12 Motorola Ltd Service via a cellular communications system
WO2004077797A2 (fr) * 2003-02-25 2004-09-10 Boston Communications Group, Inc. Procede et systeme destines au controle de l'utilisation de telephones mobiles
US20110065375A1 (en) * 2009-04-29 2011-03-17 Boulder Cellular Labs, Inc. System for limiting mobile device functionality in designated environments

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10674375B2 (en) 2014-05-28 2020-06-02 Corning Optical Communications LLC Multiple application modules (MAMs) for monitoring signals in components in wireless distribution systems, including distributed antenna systems (DASs), and related systems and methods
US11032687B2 (en) 2015-01-09 2021-06-08 Corning Optical Communications LLC Multiple application module or unit
US11910290B2 (en) 2015-01-09 2024-02-20 Corning Optical Communications LLC Multiple application module or unit

Also Published As

Publication number Publication date
WO2013050586A2 (fr) 2013-04-11
BR112014008385A2 (pt) 2017-04-04
CA2851311A1 (fr) 2013-04-11
EP3166294A1 (fr) 2017-05-10
WO2013050586A3 (fr) 2013-05-30
EP3166294B1 (fr) 2020-12-23

Similar Documents

Publication Publication Date Title
US11864051B2 (en) Systems and methods for monitoring and managing use of mobile electronic devices
CA2842782C (fr) Systemes et procedes pour evaluer et attenuer dynamiquement le risque d'une entite assuree
EP2266070B1 (fr) Système permettant d'enrayer l'utilisation non autorisée d'un dispositif
US8248237B2 (en) System for mitigating the unauthorized use of a device
US9916481B2 (en) Systems and methods for mitigating the unauthorized use of a device
US9576157B2 (en) Method for mitigating the unauthorized use of a device
US9258326B2 (en) API for auxiliary interface
US9886599B2 (en) Display of information through auxiliary user interface
US20090253408A1 (en) Method for mitigating the unauthorized use of a device
US20100138298A1 (en) System for advertising integration with auxiliary interface
EP3166294B1 (fr) Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobiles
EP2321761B1 (fr) Invocation de services systèmes via une interface auxiliaire
EP2321757B1 (fr) Api pour interface auxiliaire
EP2321951B1 (fr) Système pour l intégration de publicité avec interface auxiliaire
WO2014027242A1 (fr) Systèmes et procédés permettant de réduire l'utilisation non autorisée d'un dispositif
EP2321758A2 (fr) Visualisation d informations par l intermédiaire d une interface utilisateur auxiliaire

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20140506

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20150219

REG Reference to a national code

Ref country code: DE

Ref legal event code: R003

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 20161201