IN2014MN00121A - - Google Patents
Download PDFInfo
- Publication number
- IN2014MN00121A IN2014MN00121A IN121MUN2014A IN2014MN00121A IN 2014MN00121 A IN2014MN00121 A IN 2014MN00121A IN 121MUN2014 A IN121MUN2014 A IN 121MUN2014A IN 2014MN00121 A IN2014MN00121 A IN 2014MN00121A
- Authority
- IN
- India
- Prior art keywords
- lost
- determining
- perform
- another design
- action
- Prior art date
Links
- 230000002730 additional effect Effects 0.000 abstract 1
- 238000000034 method Methods 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
- H04M1/724631—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0261—Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0261—Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
- H04W52/0264—Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by selectively disabling software applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
- Power Sources (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Techniques for detecting and dealing with a lost electronics device are disclosed. In one design the device may autonomously determine whether it is lost. The device may destroy at least one component to render it inoperable and may perform other actions in response to determining that it is lost. In another design the device may determine available battery power of the device upon determining that it is lost select at least one action in a list of possible actions based on the available battery power and perform the selected action(s). In yet another design upon determining that it is lost the device may prevent access to information on the device based on a secondary security key which is not used for encrypting information during normal operation. In yet another design the device may notify at least one contact and may perform at least one additional action upon determining that it is lost.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/183,311 US9392092B2 (en) | 2011-07-14 | 2011-07-14 | Method and apparatus for detecting and dealing with a lost electronics device |
PCT/US2012/046808 WO2013010150A1 (en) | 2011-07-14 | 2012-07-13 | Method and apparatus for detecting and dealing with a lost electronics device |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2014MN00121A true IN2014MN00121A (en) | 2015-06-12 |
Family
ID=46601908
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN121MUN2014 IN2014MN00121A (en) | 2011-07-14 | 2012-07-13 |
Country Status (7)
Country | Link |
---|---|
US (3) | US9392092B2 (en) |
EP (3) | EP2732608A1 (en) |
JP (1) | JP5955956B2 (en) |
KR (2) | KR101697912B1 (en) |
CN (2) | CN105391838B (en) |
IN (1) | IN2014MN00121A (en) |
WO (1) | WO2013010150A1 (en) |
Families Citing this family (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10463774B2 (en) * | 2007-02-27 | 2019-11-05 | Deka Products Limited Partnership | Control systems and methods for blood or fluid handling medical devices |
US9392092B2 (en) | 2011-07-14 | 2016-07-12 | Qualcomm Incorporated | Method and apparatus for detecting and dealing with a lost electronics device |
WO2013103994A2 (en) | 2012-01-08 | 2013-07-11 | Oppenheimer Steven Charles | System and method for item self-assessment as being extant or displaced |
JP6358776B2 (en) * | 2013-02-01 | 2018-07-18 | 三菱重工業株式会社 | Theft self-detection system, user terminal, theft self-detection method, and program |
CN104239759A (en) * | 2013-06-18 | 2014-12-24 | 章玺 | Tablet computer using Bluetooth to implement identity recognition |
KR102018378B1 (en) | 2013-07-08 | 2019-09-04 | 엘지전자 주식회사 | Electronic Device And Method Of Controlling The Same |
US9473534B2 (en) * | 2014-06-02 | 2016-10-18 | Blackberry Limited | System and method for switching between messaging security policies |
CN105591999A (en) * | 2014-10-20 | 2016-05-18 | 阿里巴巴集团控股有限公司 | Verification method and device |
US9813906B2 (en) | 2014-11-12 | 2017-11-07 | Qualcomm Incorporated | Mobile device to provide enhanced security based upon contextual sensor inputs |
US10152383B2 (en) | 2014-12-17 | 2018-12-11 | Airwatch Llc | Expedited device backup, wipe, and enrollment |
CN104469016A (en) * | 2014-12-22 | 2015-03-25 | 联想(北京)有限公司 | Information processing method and electronic devices |
US9792462B2 (en) * | 2015-08-24 | 2017-10-17 | Blackberry Limited | Suspicious portable device movement determination |
CN105721661A (en) * | 2016-02-18 | 2016-06-29 | 广东欧珀移动通信有限公司 | Theft prevention protection method and apparatus for mobile terminal, and mobile terminal |
CN105611072B (en) * | 2016-02-24 | 2019-04-23 | Oppo广东移动通信有限公司 | A kind of mobile terminal is stolen protective device, mobile terminal and stolen guard method |
CN105791500A (en) * | 2016-02-29 | 2016-07-20 | 努比亚技术有限公司 | Mobile phone number safety protection method and mobile terminal |
CN106778389B (en) * | 2016-11-25 | 2018-09-04 | 维沃移动通信有限公司 | A kind of loss detection method and mobile terminal of mobile terminal |
US10823439B2 (en) * | 2016-12-14 | 2020-11-03 | Dell Products L.P. | Systems and methods for reliability control of information handling system |
CN106791130A (en) * | 2016-12-28 | 2017-05-31 | 宇龙计算机通信科技(深圳)有限公司 | Self-destruction processing method and terminal after a kind of terminal robber |
US10114981B2 (en) * | 2016-12-31 | 2018-10-30 | Intel Corporation | Architecture for telemetry and adaptive lifetime control of integrated circuits |
CA2997609A1 (en) * | 2017-03-07 | 2018-09-07 | Sennco Solutions, Inc. | Integrated, persistent security monitoring of electronic merchandise |
JP6864506B2 (en) * | 2017-03-13 | 2021-04-28 | 株式会社三菱Ufj銀行 | Data access control program |
CN108989998A (en) * | 2017-06-02 | 2018-12-11 | 中国移动通信有限公司研究院 | A kind of information processing method and device |
CN107172602B (en) * | 2017-06-27 | 2021-08-10 | 上海展扬通信技术有限公司 | Data security protection method and device for mobile terminal |
CN107480542B (en) * | 2017-08-01 | 2020-06-02 | 中国联合网络通信集团有限公司 | Application data protection method and device |
JP6984339B2 (en) * | 2017-11-15 | 2021-12-17 | 富士フイルムビジネスイノベーション株式会社 | Image forming device, program and image forming system |
US10402364B1 (en) * | 2018-08-07 | 2019-09-03 | Dell Products L.P. | Read-ahead mechanism for a redirected bulk endpoint of a USB device |
CN109218617A (en) * | 2018-09-30 | 2019-01-15 | 中央电视台 | A kind of long-range control method, broadcast level picture pick-up device and Cloud Server |
CN109767600B (en) * | 2019-02-01 | 2021-08-03 | 谷东科技有限公司 | AR glasses capable of automatically alarming and implementation method thereof |
US11308201B2 (en) | 2019-02-05 | 2022-04-19 | Sennco Solutions, Inc. | MDM-based persistent security monitoring |
DE102019109413A1 (en) * | 2019-04-10 | 2020-10-15 | Deutsche Telekom Ag | Tamper-proof photography device |
US11190546B2 (en) * | 2019-05-31 | 2021-11-30 | QDroid Inc. | Secure failsafe apparatus |
US20220083698A1 (en) * | 2019-05-31 | 2022-03-17 | QDroid Inc. | Secure failsafe apparatus |
US11681814B2 (en) | 2019-07-23 | 2023-06-20 | International Business Machines Corporation | Automatic and customized data deletion actions |
US11550938B2 (en) | 2019-09-03 | 2023-01-10 | Science Applications International Corporation | Automatic device zeroization |
JP6832413B2 (en) * | 2019-12-04 | 2021-02-24 | 株式会社アイ・オー・データ機器 | Information processing equipment and programs |
US20220067139A1 (en) * | 2020-08-25 | 2022-03-03 | Kyndryl, Inc. | Loss prevention of devices |
CN113268788B (en) * | 2021-04-29 | 2023-01-10 | 山东英信计算机技术有限公司 | Anti-theft control and management system, method and medium for high-confidentiality server |
Family Cites Families (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH04221496A (en) | 1990-03-29 | 1992-08-11 | Intel Corp | Computer memory circuit mounted onto single substrate and method of finishing sequence for erasing computer memory |
KR100296371B1 (en) * | 1998-12-31 | 2001-08-07 | 최기주 | Computer having security device |
FI109158B (en) | 2000-06-26 | 2002-05-31 | Nokia Corp | Portable device and method for providing a user with information about the functions of the portable device |
JP2002216099A (en) | 2001-01-16 | 2002-08-02 | Joho Net:Kk | Portable data recording terminal |
JP4534378B2 (en) | 2001-04-26 | 2010-09-01 | パナソニック株式会社 | Portable information device having data saving function and data saving method |
US20080148350A1 (en) | 2006-12-14 | 2008-06-19 | Jeffrey Hawkins | System and method for implementing security features and policies between paired computing devices |
FI20020570A0 (en) * | 2002-03-25 | 2002-03-25 | Nokia Corp | Time division of tasks on a mobile phone |
JP2003288273A (en) | 2002-03-28 | 2003-10-10 | Ntt Comware Corp | Method for disabling data readout from terminal, computer program, and storage medium stored with it |
US7015817B2 (en) * | 2002-05-14 | 2006-03-21 | Shuan Michael Copley | Personal tracking device |
JP4777651B2 (en) | 2002-08-23 | 2011-09-21 | イグジット−キューブ,インク. | Computer system and data storage method |
KR200325720Y1 (en) | 2003-05-16 | 2003-09-06 | 데이비드 앤드 크리스 코포레이션 | Mobile phone having anti-theft function |
US7590837B2 (en) | 2003-08-23 | 2009-09-15 | Softex Incorporated | Electronic device security and tracking system and method |
US6940407B2 (en) * | 2003-08-28 | 2005-09-06 | Motorola, Inc. | Method and apparatus for detecting loss and location of a portable communications device |
US20050226468A1 (en) | 2004-03-30 | 2005-10-13 | Intel Corporation | Method and apparatus for enabling context awareness in a wireless system |
JP4247908B2 (en) | 2004-12-15 | 2009-04-02 | 株式会社カシオ日立モバイルコミュニケーションズ | Portable terminal device and data collection method |
JP2006295826A (en) | 2005-04-14 | 2006-10-26 | Sharp Corp | Mobile information terminal with security function |
JP2007148999A (en) | 2005-11-30 | 2007-06-14 | Fujitsu Ltd | Portable apparatus, id card function lock control program, and ic card function lock control method |
CN1980428B (en) * | 2005-11-30 | 2012-05-09 | 中兴通讯股份有限公司 | Method for mobile terminal to automatically encipher and automatically protect subscriber identifying module |
US20090260088A1 (en) | 2006-01-24 | 2009-10-15 | Robert Chi-Thanh Quach | System and Method for Data Destruction |
US8074078B2 (en) | 2006-05-15 | 2011-12-06 | Research In Motion Limited | System and method for remote reset of password and encryption key |
CA2652438C (en) | 2006-05-18 | 2018-06-12 | Research In Motion Limited | Automatic security action invocation for mobile communications device |
US8038722B2 (en) | 2006-08-02 | 2011-10-18 | Applied Minds, Llc | Method and apparatus for protecting data in a portable electronic device |
US9015075B2 (en) | 2006-09-29 | 2015-04-21 | Oracle America, Inc. | Method and apparatus for secure information distribution |
JP4805122B2 (en) | 2006-12-19 | 2011-11-02 | 富士通株式会社 | Portable information terminal, security method and program |
JP2008205752A (en) | 2007-02-20 | 2008-09-04 | Nec Corp | Portable terminal device and loss prevention method in portable terminal device |
US20080263375A1 (en) * | 2007-04-23 | 2008-10-23 | Sundstrom Robert J | Method And System For Managing Activities In A Battery Powered Device |
US20090164804A1 (en) * | 2007-12-25 | 2009-06-25 | Sandisk Il Ltd. | Secured storage device |
US8375422B2 (en) | 2008-03-21 | 2013-02-12 | At&T Mobility Ii Llc | Remote disablement of a communication device |
JP5141329B2 (en) * | 2008-03-26 | 2013-02-13 | アイシン精機株式会社 | Worm gear |
US9576157B2 (en) * | 2008-04-02 | 2017-02-21 | Yougetitback Limited | Method for mitigating the unauthorized use of a device |
US9881152B2 (en) | 2008-04-01 | 2018-01-30 | Yougetitback Limited | System for monitoring the unauthorized use of a device |
US8135415B2 (en) | 2008-05-09 | 2012-03-13 | Symbol Technologies, Inc. | Integrated active tags in mobile devices |
US8855459B2 (en) * | 2008-06-17 | 2014-10-07 | Apple Inc. | Method and apparatus for prolonging battery life of a media player |
CN102113229A (en) | 2008-07-31 | 2011-06-29 | 惠普开发有限公司 | Unlocking a locked user device using a computer generated unlock code provided by user |
WO2010020883A2 (en) | 2008-08-22 | 2010-02-25 | Yougetitback Limited | Invocation of system services through auxiliary interface |
WO2010085551A2 (en) | 2009-01-23 | 2010-07-29 | Aquilonis, Inc. | Systems and methods for managing mobile communications |
US8044818B2 (en) * | 2009-01-27 | 2011-10-25 | Research In Motion Limited | Method and handheld electronic device for detecting and providing notification of a device drop |
US8467768B2 (en) | 2009-02-17 | 2013-06-18 | Lookout, Inc. | System and method for remotely securing or recovering a mobile device |
KR101590915B1 (en) | 2009-03-18 | 2016-02-02 | 엘지전자 주식회사 | Mobile Terminal Communication System And Method Of Managing Missing Mode Using Same |
JP5126216B2 (en) | 2009-12-25 | 2013-01-23 | Necインフロンティア株式会社 | Unauthorized use detection system for mobile devices |
US8244311B2 (en) | 2009-12-29 | 2012-08-14 | International Business Machines Corporation | Time-related power systems |
US8836510B2 (en) | 2010-09-29 | 2014-09-16 | Certicom Corp. | Systems and methods for managing lost devices |
CN101969493A (en) * | 2010-10-28 | 2011-02-09 | 深圳市五巨科技有限公司 | Anti-theft method and device for mobile terminal |
US9392092B2 (en) | 2011-07-14 | 2016-07-12 | Qualcomm Incorporated | Method and apparatus for detecting and dealing with a lost electronics device |
-
2011
- 2011-07-14 US US13/183,311 patent/US9392092B2/en active Active
-
2012
- 2012-07-13 EP EP12741429.0A patent/EP2732608A1/en not_active Ceased
- 2012-07-13 EP EP17170879.5A patent/EP3236640B1/en active Active
- 2012-07-13 WO PCT/US2012/046808 patent/WO2013010150A1/en active Application Filing
- 2012-07-13 KR KR1020167020291A patent/KR101697912B1/en active IP Right Grant
- 2012-07-13 IN IN121MUN2014 patent/IN2014MN00121A/en unknown
- 2012-07-13 JP JP2014520396A patent/JP5955956B2/en active Active
- 2012-07-13 CN CN201510669902.9A patent/CN105391838B/en active Active
- 2012-07-13 EP EP19181539.8A patent/EP3629563A1/en not_active Withdrawn
- 2012-07-13 CN CN201280043451.2A patent/CN103782576B/en active Active
- 2012-07-13 KR KR1020147003832A patent/KR20140048271A/en active Application Filing
-
2016
- 2016-06-08 US US15/177,092 patent/US9954829B2/en active Active
- 2016-06-08 US US15/177,139 patent/US10009323B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US20160286389A1 (en) | 2016-09-29 |
US9392092B2 (en) | 2016-07-12 |
KR101697912B1 (en) | 2017-01-18 |
CN105391838B (en) | 2019-01-01 |
US20130019304A1 (en) | 2013-01-17 |
CN105391838A (en) | 2016-03-09 |
CN103782576A (en) | 2014-05-07 |
US20160285837A1 (en) | 2016-09-29 |
JP5955956B2 (en) | 2016-07-20 |
CN103782576B (en) | 2017-04-12 |
US9954829B2 (en) | 2018-04-24 |
KR20160096717A (en) | 2016-08-16 |
US10009323B2 (en) | 2018-06-26 |
WO2013010150A1 (en) | 2013-01-17 |
JP2014521269A (en) | 2014-08-25 |
EP3236640B1 (en) | 2019-04-03 |
EP3236640A1 (en) | 2017-10-25 |
EP3629563A1 (en) | 2020-04-01 |
KR20140048271A (en) | 2014-04-23 |
EP2732608A1 (en) | 2014-05-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IN2014MN00121A (en) | ||
GB2500852A (en) | Always-available embedded theft reaction subsystem | |
PH12016500827A1 (en) | Apparatus, method and article for power storage device failure safety | |
MX2014015223A (en) | Rfid detection system. | |
GB201100039D0 (en) | Server, user device and malware detection method thereof | |
BR112016028416A2 (en) | authentication based on a secure current motion indicator | |
MX2018014119A (en) | System and method to track usage of surgical instrument. | |
WO2011104697A3 (en) | Method and apparatus for providing cooperative enablement of user input options | |
GB2546219A (en) | Systems and methods to facilitate replacement of depleted batteries | |
MX2013007174A (en) | Unauthorized location detection and countermeasures. | |
GB2529118A (en) | Trusted device | |
WO2014066678A3 (en) | Using user and device behavioral context models | |
BR112015031919A2 (en) | systems and methods for remotely determining the characteristics of a material | |
WO2013016692A3 (en) | Selectively performing a positioning procedure at an access terminal based on a behavior model | |
IN2014DN07500A (en) | ||
MX2013004764A (en) | Methods for processing private metadata. | |
MY168636A (en) | A secure mechanism to switch between different domains of operation in a data processor | |
GB201302553D0 (en) | User Prescence Detection and Event Discovery | |
WO2014031220A3 (en) | Wake status detection for suppression and initiation of notifications | |
GB2521946A (en) | Detection of return oriented programming attacks | |
MX351145B (en) | Device for and method of handling sensitive data. | |
TW201613444A (en) | Protective case for an electronic device | |
WO2012024142A3 (en) | Inferring that a message has been read | |
MX2016010086A (en) | Method and system for generating an advanced storage key in a mobile device without secure elements. | |
WO2012128912A8 (en) | System and method for real time detection and correlation of devices and power outlets |