PH12014000102A1 - A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well - Google Patents

A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well Download PDF

Info

Publication number
PH12014000102A1
PH12014000102A1 PH12014000102A PH12014000102A PH12014000102A1 PH 12014000102 A1 PH12014000102 A1 PH 12014000102A1 PH 12014000102 A PH12014000102 A PH 12014000102A PH 12014000102 A PH12014000102 A PH 12014000102A PH 12014000102 A1 PH12014000102 A1 PH 12014000102A1
Authority
PH
Philippines
Prior art keywords
theft
mobile device
phone
sim
apprehension
Prior art date
Application number
PH12014000102A
Inventor
Rodolfo Noel I Lozada Jr
Original Assignee
Rodolfo Noel I Lozada Jr
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rodolfo Noel I Lozada Jr filed Critical Rodolfo Noel I Lozada Jr
Priority to PH12014000102A priority Critical patent/PH12014000102A1/en
Publication of PH12014000102A1 publication Critical patent/PH12014000102A1/en

Links

Abstract

A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well, that includes a kill switch being defined by a lock/unlock feature for completely disabling the phone and locks user control to stop functioning, yet the audio alarm persists to alert anyone within hearing range while the screen conceals the image display; a SIM catch for enabling the theft's SIM card identification replacing the original SIM, providing a link for its owner to call or send messages to the device and demand or appeal for its return; a locate phone for facilitating possible recovery of the mobile device by law enforcement agents or the owner; a date wipe for protecting the owners and maintain the privacy of documents, images, videos, and other data; and a load wipe for sending a large volume of SMS until all prepaid load credit or postpaid credit limit is consumed. This kill switch has a loud alarm (MAGNANAKAW! MAGNANAKAW!) on stolen mobile handsets, and consequently activate a full system lock.

Description

SPECIFICATION ©
A THEFT APPREHENSION AND RECOVERY APPLICATION ADAPTED - ;
TO BE EMBEDDED IN A MOBILE DEVICE OR DOWNLOADED AS WELL -
FIELD OF THE INVENTION -
The present invention relates generally fo mobile © communication devices and more particularly to a theft apprehension ~ and recovery application adapted to be embedded in a mobile a device or downloaded as well. -
BACKGROUND OF THE INVENTION -
Rapid developments in mobile technology and subsequent user base growth have resulted in undesirable security risks. As consumers spend more on gadgets and devices, worries about theft, which could turn violent, intensify as criminals target these because they are easy to fence — change the SIM, reset the device and resell for good value.
In the US, where 1.6 million became victims of smartphone theft in 2012, concerns have grown to a point that a coalition of law enforcement officials and other parties called on manufacturers and network operators to provide a technological solution to protect consumers. The initiative is pushing for the inclusion of a ‘kill switch’ in smartphones to render these devices unusable in case of theft or loss.
Consequently, American lawmakers announced plans to legislate the ‘kill switch" as a standard feature in smartphones to deter smartphone theft and protect consumers.
In the Philippines, where stealing phones are just as relatively prevalent, users may file a request to have their lost or stolen phones and SIM cards blocked by the National Telecommunications
Commission (NTC), which requires complainants to go to a central i office, show proof of ownership or a police report, and execute an ] affidavit. By the time the user has gone through these processes, the thief/thieves had already sold the stolen phone to someone else.
According to the NTC, complaints about lost or stolen mobile © phones reached 5,255 cases in the first half of 2012, a seven percent ~ increase from the same period in the previous year. -
SUMMARY OF THE INVENTION >
In view of the foregoing, it is therefore the principal object of this - invention to provide for the answer to the smartphone theft problem by ~ providing for theft apprehension and recovery application consisting of © a Kill Switch, SIM Catch, locate phone, data wipe and load wipe © features. .
Another object of this invention is to provide for a theft o apprehension and recovery application is to provide for an anti-theft = application that is compatible with the Android Operating Systems, windows, iOS including other upcoming commercial mobile platforms such as Tisen. It transmits via the GSM (Global System for Mobile ] communications or Group Special Mobile), 3G (Third Generation) and i 4G (Fourth Generation) standards. The product has two versions:
Firmware TARA, which is embedded in devices at the chipset level; and
TARA SOS (Save Our Smartphone), the downloadable version.
Still another object of this invention is to provide for a theft apprehension and recovery application that also incorporates an emergency notification solution that enables phone users to send text messages to a pre-set secondary/emergency number using their phone's motion sensors. Unlike most other anti-theft applications, this is supported by a Customer Service Center (TARA HOTLINE) that facilitates the use of available solutions. With a dedicated Call Center. itis able to give phone users fast, reliable and straightforward response in case their phones are stolen or misplaced.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG.1 is a perspective view of my invention of a theft apprehension 1 and recovery application adapted to be embedded in a mobile device or downloaded as well;
FIG. 21s a flow diagram of steps for registration; !
FIG. 3 is a flow diagram of steps for the call center assistance; and
FIG. 4is a flow diagram of steps for lock/unlock subject invention by . the user. ~
DETAILED DESCRIPTION OF THE INVENTION -
Referring now to the drawings in detail, wherein like numerals - designate same parts throughout, there is shown particularly in FIG. - ; 1, the my invention of a theft apprehension and recovery application = adapted to be embedded in a mobile device or downloaded as - well generally designated as 10, which includes the TARA application - 11 and the mobile device 12.
This application 11 includes Kill Switch 13, SIM Catch 14, locate phone 15, data wipelé and load wipe 17 features. ]
The Kill Switch 13 is the first line of defense. TARA offers the Kill switch function. It sets a loud alarm (MAGNANAKAW! MAGNANAKAW!) ]
On stolen mobile handsets, and consequently activate a full system lock. With the phone on full system lock, no key or feature may be used as the alarm remains active. Data wipe feature may only be activated upon request on the TARA hotline number. It is ready for use at a moment's notice. Also called the LOCK/UNLOCK feature, it uses the smartphone's display and speaker to set off a recurrent visual and audio alarm that cannot be stopped while the device is connected to a power source. It completely disables the phone and locks user controls to stop functioning, yet the audio alarm persists to alert anyone within hearing range while the screen conceals the image display. The program has auto-boot capacity to detect when the phone is turned on after a power loss and will immediately trigger the alarm. TARA offers the kill switch function. It sets a loud alarm (MAGNANAKAW! MAGNANAKAW!) on stolen mobile handsets, and consequently activate a full system lock. With the phone on full system ] lock, no key or feature may be used as the alarm remains active. Data ;
wipe feature may only be activated upon request on the TARA hotline = number. -
SIM Catch 14 enables to identify the thief's SIM card even s though the original SIM card is replaced and send the number . information to the TARA call center, which monitors SIM changes and - its frequency. Identifying the new SIM connected to the lost or stolen - phone will provide a link for its owner to call or send messages to the > device and demand or appeal for its return. £2
Locate Phone 15 enables the tracking service makes the - smartphone’s location discoverable using various geo location > resources. It will also provide compiled information on the phone's - whereabouts to facilitate possible recovery of the device by law enforcement agents or the owner. Tracking is done via different geo location technology and does not require the phone to be GPS- enabled.
Mobile computing has changed the way data is processed. It has become the norm to save important personal or corporate information in mobile phones and gadgets for easy retrieval on the go.
This data wipe 16 aims to protect the owner and maintain the privacy of documents, images, videos, and other data. Data stored in a lost phone's storage can be erased upon the authenticated request of the owner to prevent thieves or unauthorized users from obtaining them and using them for blackmail or other harmful intentions.
Load Wipe 17 is a punitive measure that hurts the phone thief's or finder's wallet. TARA issues a command via GSM technology that sends a large volume of SMS until all prepaid load credit or postpaid credit limit is consumed.
As shown in FIG. 2, prior to the use of this theft apprehension and recovery application 10, registration of the user is required. The user activates and register the TARA application 11 via SMS to the SMS / server 18 who then receives SMS. The Cloud VM 19 collects and processes the data coming from the SMS server 18 and then sends the 1
* SMS registration notification to client's primary and emergency number = and e-mail to the server 18. Then, the call center 20 receives and < process data. Afterwards its alerts the first responders whereby, the user hy is already registered. o
When the mobile phone is stolen/lost, the user has to call this call - center 20 for assistance as shown in FIG 3. The registered user 21 then - requests this call center 20 for mobile assistance to lock/unlock/wipe 5 the stolen/lost mobile phone 12 with embedded TARA application 11. -
Upon receiving such request from the registered user 21, the call center - 20 process this mobile assistance to lock/uniock/locate/wipe this - mobile phone 12 and sends this request to cloud VM 19. The cloud VM - 19 collects and processes the data coming from said call center 20.
Then the SMS server 18 collects and process SMS coming from cloud ]
VM 19. The mobile phone 12 receives SMS command coming from the
SMS server 18. The TARA 11 executes the application and mobile command (lock/unlock/locate/wipe). The mobile phone 12 sends mobile status via SMS to the SMS server 18 who then sends that status to call center 20. The call center 20 receives data & informs the client their mobile status. As shown in FIG. 4, the user then can lock /unlock his mobile phone 12 by sending a command to this TARA apps 11 via SMS ] thru their given primary/emergency number to the SMS server 18 who then receives this sent SMS lock/unlock command. The cloud VM 19 collects and process the data coming from SMS Server 18. Then, this cloud VM 19 sends this TARA lock/unlock command to the primary number via SMS to the SMS sever 18 to the TARA application 11, who then sends mobile status via SMS to the SMS sever 18. This SMS is sent to the Cloud VM 19 that collects &processes the data and forwarded it to the call center 20 that receives data/status update.

Claims (2)

CLAIM:
1. A theft apprehension and recovery application adapted to be ~ embedded in a mobile device or downloaded as well, - comprising: - a kill switch being defined by a lock/unlock feature for - completely disabling the phone and locks user control to stop - functioning, yet the audio alarm persists to alert anyone within - hearing range while the screen conceals the image display; = a SIM catch for enabling the theft's SIM card identification replacing the original SIM, providing a link for its owner to call or send messages to the device and demand or appeal for its return; A locate phone for facilitating possible recovery of the mobile device by law enforcement agents or the owner; A date wipe for protecting the owners and maintain the privacy of documents, images, videos, and other data; and A load wipe for sending a large volume of SMS until all prepaid load credit or postpaid credit limit is consumed.
2. A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well in accordance with claim 1 wherein, said kill switch has a loud alarm (MAGNANAKAW! MAGNANAKAW!} on stolen mobile handsets, and consequently activate a full system lock.
PH12014000102A 2014-04-04 2014-04-04 A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well PH12014000102A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PH12014000102A PH12014000102A1 (en) 2014-04-04 2014-04-04 A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PH12014000102A PH12014000102A1 (en) 2014-04-04 2014-04-04 A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well

Publications (1)

Publication Number Publication Date
PH12014000102A1 true PH12014000102A1 (en) 2015-10-12

Family

ID=55305312

Family Applications (1)

Application Number Title Priority Date Filing Date
PH12014000102A PH12014000102A1 (en) 2014-04-04 2014-04-04 A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well

Country Status (1)

Country Link
PH (1) PH12014000102A1 (en)

Similar Documents

Publication Publication Date Title
US20220182820A1 (en) Method and apparatus for protecting data in a portable electronic device
KR101140904B1 (en) Apparatus and methods for locating, tracking and/or recovering a wireless communication device
US20130137376A1 (en) Systems and methods for recovering low power devices
US10425798B2 (en) Communication apparatus, system and method
EP2476108B1 (en) Alert for real-time risk of theft or loss
KR101386438B1 (en) Smartphone that works with USB memory device
US20120237908A1 (en) Systems and methods for monitoring and managing use of mobile electronic devices
US20090251318A1 (en) Anti-theft system of mobile device
WO2019052020A1 (en) Alarm method, mobile terminal, and computer storage medium
US20180033266A1 (en) Automated motion disturbance detection and alerting
EP3166294B1 (en) Systems and methods for monitoring and managing use of mobile electronic devices
US10750345B1 (en) Secure emergency response technology
WO2017010895A1 (en) A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well
CN104469019A (en) Mobile phone with alarming, riot preventing and body protecting functions and control method thereof
EP2780900B1 (en) Systems and methods for recovering low power devices
CN102984411A (en) Methods for protecting personal safety and property safety by smart mobile device
PH12014000102A1 (en) A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well
AU2014203056A1 (en) A Method and System for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen)
US10580271B1 (en) Wireless security tracking for weapons
SE1451261A1 (en) Security arrangement and method therfore
Azman et al. My guardian: A personal safety mobile application
GB2621414A (en) Method and apparatus for providing selective privacy in a tracking system
US20190064365A1 (en) Trackable locking safe
KR20140002863A (en) Service system of safety home-coming and method thereof
GB2450539A (en) Security method for a mobile computing device