GB2390266A - A portable communication device which emits a chemical odour - Google Patents

A portable communication device which emits a chemical odour Download PDF

Info

Publication number
GB2390266A
GB2390266A GB0215054A GB0215054A GB2390266A GB 2390266 A GB2390266 A GB 2390266A GB 0215054 A GB0215054 A GB 0215054A GB 0215054 A GB0215054 A GB 0215054A GB 2390266 A GB2390266 A GB 2390266A
Authority
GB
United Kingdom
Prior art keywords
chemical
portable communications
communications device
authentication
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0215054A
Other versions
GB2390266B (en
GB0215054D0 (en
Inventor
Moyeen Shujauddin Mufti
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Electronics Co Ltd
Original Assignee
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics Co Ltd filed Critical Samsung Electronics Co Ltd
Priority to GB0215054A priority Critical patent/GB2390266B/en
Publication of GB0215054D0 publication Critical patent/GB0215054D0/en
Publication of GB2390266A publication Critical patent/GB2390266A/en
Application granted granted Critical
Publication of GB2390266B publication Critical patent/GB2390266B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • H04M1/673Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B15/00Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
    • G08B15/02Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives with smoke, gas, or coloured or odorous powder or liquid
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B5/00Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied
    • G08B5/40Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using smoke, fire or coloured gases
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/02Constructional features of telephone sets
    • H04M1/21Combinations with auxiliary equipment, e.g. with clocks or memoranda pads
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A portable communication device with a chemical emitter is configured to emit a first chemical, with an odour, externally from the portable communication device, upon failure in the authentication of a user of the device. The communication unit may be a mobile telephone, a personal digital assistant, a laptop computer, a digital audio/video broadcast device. A second chemical may also be emitted, this chemical is used to neutralize the first chemical. One or more sensors may be used to activate the device. Authentication may be by a password, voice, or biometric such as a fingerprint. A radio link may be used to or from a wireless base station and a SIM card within the device. The first chemical may also be used as an alarm to aid in theft prevention and recovery of the device. The first chemical may be hydrogen sulphide gas.

Description

( 2390266
IMPROVEMENTS IN PORTABLE COMMUNICATION DEVICES
Field of the Invention
The present invention relates to improvements in portable 5 communication devices, more particularly to improvements in the security of these devices.
Background of the Invention
Portable communication devices are a common commodity widely used by the general public. There are a wide range of devices which maybe 10 purchased by consumers, ranging from standard mobile telephone handsets to luxury laptop computers incorporating expensive and desirable Matures.
These portable communication devices, including mobile telephone handsets, personal digital assistants (PDA), Digital Adio/Video Broadcast (DAB/DVB) devices and laptop computers' are all highly desirable consumer 15 goods and therefore targets for theft.
When these devices are stolen, or even lost, it can be very difficult for the owners to find and reclaim their property. In particular, mobile telephones when stolen can easily have their SIM (Subscriber Identity Module) card replaced allowing any other potential user to use the device on any available 20 network of their choice.
Many ways have been discussed of improving the security aspects of luxury consumable items' for example by allowing the device to destroy its internal workings in order to deter theft and prevent further use. AISO,
( methods of writing identification numbers, such as postcodes, on the casing of devices in ultraviolet sensitive ink are known.
These methods of providing security for luxury consumer goods have many disadvantages, such as not being able to locate the stolen or lost goods 5 or making the goods completely inoperable such that they are of no use if retrieved. Also, any identifying marks placed on the covers, which identify the rightful owner of the device can be replaced with relative ease.
This invention aims to overcome, or at least alleviate one or more of the aforementioned problems. I 10 Statement of the Invention
- According to a first aspect of the present invention there is provided a I portable communications device as claimed in claim 1.
According to a second aspect of the present invention there is provided a method of deterring theft of a portable communications device as claimed in 15 claim 12.
The present invention has many advantages, such as being able to locate the stolen or lost goods without making the goods completely inoperable such that they are of no use if retrieved.
Brief Description of the Drawings I
20 Specific embodiments of the present invention will now be described by way of example only, with reference to the accompanying drawings in which:
f Figure I shows a system layout suitable for implementing an i embodiment of the present invention; Figure 2, consisting of Figures 2a and 2b, shows a flow diagram for use in an embodiment of the present invention; 5 Figure 3 shows a chemical emitting device suitable for use in an embodiment of the present invention; Figure 4 shows an example of an anti-tamper device for use in an embodiment of the present invention; Figure 5 shows a further flow diagram for use in an embodiment of the l 10 present invention; Figure 6 shows a circuit for use in an embodiment of the present invention; Figure 7 shows a further circuit for use in an embodiment of the present invention.
15 Description of First Embodiment
Figure 1 shows a mobile telephone communications network. A service provider ( 101) has a transceiver ( 102) to receive and transmit encrypted data via an air interface (103) to a mobile communications device; such as a mobile telephone (104). The mobile telephone (104) also has a 20 transceiver (105) to receive and transmit messages from/to the air interface (103). Incoming messages may be received by a SIM card (106) , which is housed within the mobile telephone (104). A unique IMEI (international mobile equipment identity) (107), a 15-digit identity number that is unique to
the device, is stored within an E2PROM (111) that resides in the mobile.
Upon an IMLI request from the Network, a message such as an RIL3 (Radio Interface Layer) message containing the IMEI is sent back to the network.
The SIM card (106) acts upon instructions received via the encrypted 5 messages from the service provider (101) and outputs instructions to a controller (108). The SIM card is enabled to do this by programming; the SIM card using known systems such as SIM Toolkit and JavaSIM. l he controller ( 108) is connected to a chemical emitting device ( 109). Most of the components within the mobile telephone (104) are linked by a 10 communications bus (110). The SIM card may however be linked by a contact pad (not shown).
Figure 2 shows a flow diagram depicting the steps taken when security of the mobile is compromised. In step 201, the device is noted to be missing i.e. it has been stolen or lost. After step 201, the user alerts the service 15 provider in step 203 by a further communication means such as another telephone or via the Internet. The owner provides details of the mobile telephone to the service provider, such as the IMEI or the telephone number so as to identify the mobile telephone, step 203.
Once the service provider has been alerted, an encrypted message is 20 sent via the air interface, as shown in step 205. The message is sent by any suitable means such as, for example, a SMS message directed to the SIM.
If at step 206 the mobile is already switched on, the mobile has already been validated at the service provider end and so the IMEI of the
mobile is already known by the service provider. The authentication means is then activated. starting at step 210. However, if the mobile is not switched on, no further action is taken until it is subsequently switched on at step 208.
After the mobile is switched on it will attempt to validate itself with the 5 service provider at step 209. During validation, the IMEI is sent back to the service provider to identify the mobile as discussed previously. Upon condonation that the IMEI matches the mobile that has been reported missing, the service provider sends an encrypted authentication request message at step 210.
10 Once the mobile has received the authentication request message from the service provider, it activates the authentication means as shown in step 211. The mobile then sounds an alert, which may be a combination of such things as a beeper, vibrator and a synthesized voice, as shown in step 212.
After the alert has been sounded, an authentication is required by the service 15 provider, as shown in step 213. The authentication may be carried out either by requesting a password from the user, or alternatively using voice or fingerprint recognition.
If at step 214 the user has been authorised, the authentication means is then deactivated at step 215 and the mobile is ready for normal use.
20 However, if authorization is not accepted the person in possession of the mobile has the option to switch the mobile off as shown in step 216.
If the mobile is switched off, it may then be handed into the nearest dealer at step 21S, who in turn will deactivate the alert by requesting the
( service provider to send another encrypted deactivation message, as shown in step 219. Alternatively the person in possession of the mobile may contact the service provider separately as shown in step 217. Also. if the mobile is lost and has been handed into a lost property centre, it will be possible for the 5 personnel in the centre to contact the service provider by using a dedicated number available for use on the mobile so that the service provider can deactivate the alert.
If the mobile is not switched off, a malodorous chemical is released into the air, shown in step 220. 1 his malodorous chemical may for example 10 be hydrogen sulphide (HIS). The chemical is released in periodic bursts so as to conserve the amount of chemicals held within the mobile and allow the chemical to be emitted over a considerable period of time.
At step 221, the mobile is locked and placed into an idle mode. The idle mode ensures the mobile cannot be used to make any calls other than to a 15 dedicated number. For example, access to emergency service is allowed.
Also, an option is available to ring the service provider on their dedicated number, which is available by pressing a dedicated button on the handset, or alternatively the service provider number may be printed on the mobile casing. 20 If the user is not authenticated by the service provider, as shown in step 222, the cycle is repeated. However, if the user is subsequently authenticated, the service provider will send a further encrypted deactivation message to the mobile, as shown in step 223. A neutralising chemical is
( released into the air, as shown in step 224, which will react with the first malodorous chemical so as to neutralise the odour. A suitable chemical for neutralizing hydrogen sulphide is chlorine dioxide (CIO2). Finally, at step 225 the mobile is unlocked by the service provider so it may subsequently be used 5 normally. The chemical emitting device discussed above will now be described in greater detail.
Figure 3 shows an example of a chemical emitting device that may be used in an embodiment of this invention. l he device has a chamber (301) that 10 is used to stored a first chemical, such as hydrogen sulphide, a malodorous chemical. A second chamber (302) is shown which holds a second neutralising chemical, such as chlorine dioxide (CIO2). A valve control device (303) is used to operate valves attached to the gates of the two chemical housings, (301 and 302). A controller (108) within the mobile IS telephone is used to operate the valve control device (303). A signal is sent from the mobile telephone controller to operate the valves only when authentication has failed. as discussed previously. When the valve control device (303) opens up the first chemical chamber (301), it allows the first chemical (hydrogen sulphide) to be emitted and odour is released externally 20 into the air. If subsequently a user is authenticated, the phone controller (108) sends a message to the valve control device (303) to open up the valve within the second chamber, so as to release the second chemical (chlorine dioxide) as
a neutralizer. The neutralising chemical sufficiently removes all of the bad odour. 1'he release of the malodorous chemical to produce an odour provides a suitable means to deter thieves from stealing the device. Also, if the device 5 is subsequently stolen then it would be extremely difficult for the device to be used properly. Also, the emission of the bad odour aids in the recovery of the device. Therefore, if the device is not stolen but is merely lost within the owner's house, it is possible and desirable for the owner to detect the location of the device by smell. The owner may then obtain authentication via the 10 service provider, enabling the alert mode to be switched off and the neutralising chemical to be activated.
Such a chemical emitting device as shown in Figure 3 may be manufactured using micro-engineering techniques. This makes the device sufficiently small so as to fit within the casing of a mobile telephone. The 15 device consists of mechanical valves that are controlled electrically, the valves being constructed on a silicon wafer. Techniques for producing these devices are well known in the art, such as in WO 98/26880, which describes a thermionic generator produced using micro-engineering techniques and is hereby incorporated by reference. An aroma emitting device is shown in 20 Korean Patent Application KR 2001 000705, which is also hereby incorporated by reference.
A multichip package may be manufactured that consists of the controller (108), and the chemical emitting device, the chemical emitting
( device constructed on a silicon wafer. The controller (108) may be manufactured from an Application Specific Integrated Circuit (ASIC). The package may be a combination of an ASIC and the chemical emitting device fitted to one circuit board, or both the ASlC and emitting device may be 5 manufactured on the same silicon wafer, or indeed on a thick film device.
The chip package can then be retrofitted into existing mobile communication devices. Description of Second Embodiment
The second embodiment as described below contains all the features 10 of the first embodiment plus additional features.
A person who has taken a mobile telephone and wishes to disassemble the telephone to deactivate the chemical emitting device would be able to do so fairly easily if it were not for additional security measures.
A mobile telephone is shown in Figure 4 that has an LCD (403), a 15 keypad (404), a back cover (401) and a front cover (402). Additionally fitted on the mobile telephone are anti-tamper sensors (405), which are used to detect whether the front and back covers are separated from each other. For simplicity Figure 4 only shows two sensors fitted to the top and side of the mobile telephone, however, more sensors may be fitted across the front and 20 back covers of the mobile. Preferably, these sensors will be fitted internally in the device, although it would also be possible to fit these externally if required.
( The anti-tamper sensors work in the following manner as shown in Figure 6. The sensors are made of a conducting strip (405), of a material such as aluminium, which is litted in line with a power supply (601). Also fitted in parallel with the conducting strip is a resistive material (603) . If the 5 conducting strip is broken when the back and front panels are separated, a current will pass through the resistive component (603) and cause a voltage drop (604) to appear across the resistive component (603).
Figure 7 depicts how these voltages may be used to provide an output (704) to the chemical emitting device. If a voltage is supplied from two of the 10 anti-tamper sensors, V' and V2 (701. 702), these voltages are ANDED together in the AND circuit (703) which then provides an output (704). This output is used to trigger the chemical emitting; device so it releases the malodorous chemical as discussed previously.
A flow diagram of the action taken when an anti tamper sensor is 15 activated is shown in Figure 5. If an anti tamper seal is broken at step 501.
then a malodorous chemical is released at step 220. AISO, the mobile is locked at step 224 so that the user is not able to use the mobile other than to call dedicated numbers, such as emergency services or the service provider number. 20 If an engineer needs to access the internal workings of the mobile for repair purposes, or a user requires access to the SIM card, it is possible for the engineer or user to contact the service provider and deactivate the anti-tamper sensors by having a deactivation message sent to the mobile.
( Other Embodiments and Variations It will be apparent to the skilled reader that various modifications and variations may be employed in relation to the above-described embodiments without departing from the scope of the present invention.
5 For example, it would be clear to the skilled person that different chemicals other than hydrogen sulphide and chlorine dioxide may be used.
Any chemical pairing may be used which consists of one malodorous chemical along with a neutralizing chemical.
It will also be clear to the skilled person that instead of the user 10 alerting the service provider once it has been discovered that the device has been stolen or lost, a time out mechanism may be used whereby an ID checlc is requested. such as a password to be inputted at regular intervals. If the password is not inputted when requested, the service provider will be alerted automatically. Alternatively, if an incorrect password is inputted then the 15 service provider will also be contacted. Also, the ID check maybe requested when first switching the device on.
It will also be clear to the skilled person that any messages may not necessarily be in an encrypted format although this will allow for the possibility of third parties gaining access to any unencrypted messages.
20 It will also be clear to a skilled person that the messages sent by the service provider may be SMS messages or may be sent via dedicated data channels i.e. network control channels, or may be as a result of a network broadcast message.
( It will be clear to the skilled person that any type of tamper mechanism may be used for the anti-tamper sensors, such as micro-switches or magnetic reed switches. Also' any number of sensors may be fitted to the device in any position.
5 It will also be clear to the skilled person that this invention may apply to any portable communication device such as mobile telephones, PDAs, DAB and DVB devices, and laptop computers. This invention can be applied to any device that contains a unique identification number, the unique number able to be transmitted to a service provider.
10 It will also be clear to the skilled person that in conjunction with the release of the chemical, it is possible to activate a beacon signal that is transmitted so as to locate the device. Also, alternatively or in combination with the beacon signal an audible alert may be sounded. such as a synthesized voice or a beeping noise. This will alert any persons near to the mobile that Is the mobile is not with its valid owner. The synthesised voice may for example state "Phone Stolen". This audio alert may also be activated periodically so as to conserve the battery power of the device. Also the device may transmit an LBS (location based service) message at regular intervals so as to update the position of the device. This may be carried out 20 using SMS messaging, or any other suitable system such as GPS (Global Positioning System) or E911 systems.
( It will also be clear to a skilled person that any other suitable sensor could be used for the anti-tamper sensor, including non-electronic sensors such as optical sensors.
It will also be clear to a skilled person that the IMEi may be stored in 5 a flash memory or EPROM device.

Claims (16)

f CLAIMS
1. A portable communications device comprising a chemical emitter and an authentication means, the chemical emitter emitting a first 5 chemical with an odour externally from the portable communications device upon failure in the authentication of a user of the portable communications device, the authentication carried out by the authentication means.
2. A portable communications device according to claim I further 10 comprising one or more sensors, the chemical emitter emitting the first chemical with an odour externally from the portable communications device when at least one of the sensors is activated.
3. A portable communications device according to claims I or 2, 15 the chemical emitter further comprising a second chemical to neutralise the odour of the first chemical.
4. A portable communications device according to claims 1. 2 or 3, wherein the device is a mobile telephone.
5. A portable communications device according to claims 1, 2 or 3, wherein the device is a Personal Digital Assistant.
6. A portable communications device according to claims 1, 2 or 3, wherein the device is a Digital Audio/Video Broadcast device.
7. A portable communications device according to claims 1, 2 or 5 3, wherein the device is a portable computing device.
8. A portable communications device according to claims 1, 2 or 3, wherein the authentication means authenticates a user by requesting a password.
9. A portable communications device according to claims 1, 2 or 3, wherein the authentication means authenticates a user by using voice recognition. 15
10. A portable communications device according to claims 1, 2 or 3, wherein the authentication means authenticates a user by using fingerprint recognition.
11. A method of deterring theft of a portable communications 20 device comprising the steps of: alerting a service provider; sending a message to the portable communications device; activating an authentication means; and
if the authentication means fails to authenticate the user of the portable communications device. releasing a first chemical trom a chemical emitter to produce an odour which is emitted externally from the portable communications device.
12. A method according to claim I 1 further comprising the steps of: reading a monitoring means within the portable communications device to monitor sensors attached to the device; and 10 if one or more sensors are activated. emitting the first chemical from the chemical emitter.
13. A method according to claims 11 or 12 further comprising the steps of: 15 emitting a second chemical to neutralise the odour of the first chemical upon subsequent authentication of the user of the portable communications device.
14. A multi-chip package device comprising a chemical emitter 20 adapted to perform part of the method as claimed in claims 1 1, 12 or 13.
15. A multi-chip package device comprising a chemical emitter adapted to be used in a device as claimed in claim 1, 2 or 3
!
16. A portable communications network adapted to provide a message to a portable communications device requesting authentication from a user of the portable communications device upon receiving; an alert as part 5 of the method according to claims I I. 12 or 13.
GB0215054A 2002-06-28 2002-06-28 Improvements in portable communication devices Expired - Fee Related GB2390266B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0215054A GB2390266B (en) 2002-06-28 2002-06-28 Improvements in portable communication devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0215054A GB2390266B (en) 2002-06-28 2002-06-28 Improvements in portable communication devices

Publications (3)

Publication Number Publication Date
GB0215054D0 GB0215054D0 (en) 2002-08-07
GB2390266A true GB2390266A (en) 2003-12-31
GB2390266B GB2390266B (en) 2005-12-21

Family

ID=9939525

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0215054A Expired - Fee Related GB2390266B (en) 2002-06-28 2002-06-28 Improvements in portable communication devices

Country Status (1)

Country Link
GB (1) GB2390266B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2407458A (en) * 2003-08-07 2005-04-27 Radioscape Ltd Preventing use of lost/stolen article by transmission of blocking code

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5182541A (en) * 1992-02-28 1993-01-26 Concept Five, Inc. Remote controlled theft deterrent system
JPH0927089A (en) * 1995-07-13 1997-01-28 Nippon Denki Ido Tsushin Kk Crime prevention device
WO1998055346A1 (en) * 1997-06-03 1998-12-10 Durand Limited Alarm apparatus
WO2001086986A1 (en) * 2000-05-09 2001-11-15 Infohand Company Limited A method for storing, retrieving multi-media data in digital mobile telephones and a digital mobile telephone therefor
DE20115776U1 (en) * 2001-09-26 2002-03-07 Merlaku Kastriot Cellphone with fragrance notes
JP2002076734A (en) * 2000-08-16 2002-03-15 Koto Ryo Antenna assembly structure of portable radio terminal having aroma emitting function
DE10061593A1 (en) * 2000-12-11 2002-06-13 Maika Paetzold Mobile protection system has network, e.g. UMTS, that can transmit camera and video information and further perfects location system, e.g. GPS, audible alarm and odor dispenser

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5843381A (en) * 1996-04-12 1998-12-01 Calgon Carbon Corporation Apparatus for removal of hydrogen sulfide

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5182541A (en) * 1992-02-28 1993-01-26 Concept Five, Inc. Remote controlled theft deterrent system
JPH0927089A (en) * 1995-07-13 1997-01-28 Nippon Denki Ido Tsushin Kk Crime prevention device
WO1998055346A1 (en) * 1997-06-03 1998-12-10 Durand Limited Alarm apparatus
WO2001086986A1 (en) * 2000-05-09 2001-11-15 Infohand Company Limited A method for storing, retrieving multi-media data in digital mobile telephones and a digital mobile telephone therefor
JP2002076734A (en) * 2000-08-16 2002-03-15 Koto Ryo Antenna assembly structure of portable radio terminal having aroma emitting function
DE10061593A1 (en) * 2000-12-11 2002-06-13 Maika Paetzold Mobile protection system has network, e.g. UMTS, that can transmit camera and video information and further perfects location system, e.g. GPS, audible alarm and odor dispenser
DE20115776U1 (en) * 2001-09-26 2002-03-07 Merlaku Kastriot Cellphone with fragrance notes

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2407458A (en) * 2003-08-07 2005-04-27 Radioscape Ltd Preventing use of lost/stolen article by transmission of blocking code
GB2407458B (en) * 2003-08-07 2006-05-24 Radioscape Ltd Method of preventing use of a lost or stolen device including a digital transmission receiver

Also Published As

Publication number Publication date
GB2390266B (en) 2005-12-21
GB0215054D0 (en) 2002-08-07

Similar Documents

Publication Publication Date Title
US11575782B2 (en) Transmitter near a phone restricts some functions not all
EP2115953B1 (en) Apparatus and methods for locating, tracking and/or recovering a wireless communication device
US20060009238A1 (en) Personal communication devices
EP1172016B1 (en) Method of generating control signals based on location of radio terminals
CN107074198B (en) Key module
US20130137376A1 (en) Systems and methods for recovering low power devices
US8249665B2 (en) Wireless communication device management
US9014758B2 (en) Security for wireless communication
US20100273452A1 (en) Apparatus and Methods For Locating Tracking and/or Recovering a Wireless Communication Device
US9191880B2 (en) Wireless communication device management
JP2007150650A (en) Portable communication terminal device and program
JPH0964967A (en) Dial lock system for portable telephone set
GB2379834A (en) Protection of wireless data storage devices
GB2390266A (en) A portable communication device which emits a chemical odour
WO2013072774A2 (en) Systems and methods for recovering low power devices
RU2225302C1 (en) Information-and-security complex for monitoring and protection of vehicles and immovable property objects against unauthorized use
JPH09205662A (en) Radio call receiver
JP2001010448A (en) Wireless method and device for preventing theft of vehicle
KR20020033234A (en) Security system using mobile station
KR100372408B1 (en) burglar guard system of car using hand-phone
RU2329164C1 (en) Information-and-security system for transportation vehicles
JP2001122082A (en) Vehicle theft processing system
KR20020045286A (en) Apparatus and method for preventing burglar and embezzling of portable phone
JP2004032479A (en) Mobile phone
JPH097075A (en) Crime prevention system, and its transmission equipment and its reception equipment

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20160628