PH12014000102A1 - A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well - Google Patents
A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well Download PDFInfo
- Publication number
- PH12014000102A1 PH12014000102A1 PH12014000102A PH12014000102A PH12014000102A1 PH 12014000102 A1 PH12014000102 A1 PH 12014000102A1 PH 12014000102 A PH12014000102 A PH 12014000102A PH 12014000102 A PH12014000102 A PH 12014000102A PH 12014000102 A1 PH12014000102 A1 PH 12014000102A1
- Authority
- PH
- Philippines
- Prior art keywords
- theft
- mobile device
- phone
- sim
- apprehension
- Prior art date
Links
- 238000011084 recovery Methods 0.000 title claims abstract description 15
- 235000017399 Caesalpinia tinctoria Nutrition 0.000 description 15
- 241000388430 Tara Species 0.000 description 15
- 238000000034 method Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- VJYFKVYYMZPMAB-UHFFFAOYSA-N ethoprophos Chemical compound CCCSP(=O)(OCC)SCCC VJYFKVYYMZPMAB-UHFFFAOYSA-N 0.000 description 1
- 230000000306 recurrent effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Abstract
A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well, that includes a kill switch being defined by a lock/unlock feature for completely disabling the phone and locks user control to stop functioning, yet the audio alarm persists to alert anyone within hearing range while the screen conceals the image display; a SIM catch for enabling the theft's SIM card identification replacing the original SIM, providing a link for its owner to call or send messages to the device and demand or appeal for its return; a locate phone for facilitating possible recovery of the mobile device by law enforcement agents or the owner; a date wipe for protecting the owners and maintain the privacy of documents, images, videos, and other data; and a load wipe for sending a large volume of SMS until all prepaid load credit or postpaid credit limit is consumed. This kill switch has a loud alarm (MAGNANAKAW! MAGNANAKAW!) on stolen mobile handsets, and consequently activate a full system lock.
Description
SPECIFICATION ©
A THEFT APPREHENSION AND RECOVERY APPLICATION ADAPTED - ;
TO BE EMBEDDED IN A MOBILE DEVICE OR DOWNLOADED AS WELL -
The present invention relates generally fo mobile © communication devices and more particularly to a theft apprehension ~ and recovery application adapted to be embedded in a mobile a device or downloaded as well. -
Rapid developments in mobile technology and subsequent user base growth have resulted in undesirable security risks. As consumers spend more on gadgets and devices, worries about theft, which could turn violent, intensify as criminals target these because they are easy to fence — change the SIM, reset the device and resell for good value.
In the US, where 1.6 million became victims of smartphone theft in 2012, concerns have grown to a point that a coalition of law enforcement officials and other parties called on manufacturers and network operators to provide a technological solution to protect consumers. The initiative is pushing for the inclusion of a ‘kill switch’ in smartphones to render these devices unusable in case of theft or loss.
Consequently, American lawmakers announced plans to legislate the ‘kill switch" as a standard feature in smartphones to deter smartphone theft and protect consumers.
In the Philippines, where stealing phones are just as relatively prevalent, users may file a request to have their lost or stolen phones and SIM cards blocked by the National Telecommunications
Commission (NTC), which requires complainants to go to a central i office, show proof of ownership or a police report, and execute an ] affidavit. By the time the user has gone through these processes, the thief/thieves had already sold the stolen phone to someone else.
According to the NTC, complaints about lost or stolen mobile © phones reached 5,255 cases in the first half of 2012, a seven percent ~ increase from the same period in the previous year. -
In view of the foregoing, it is therefore the principal object of this - invention to provide for the answer to the smartphone theft problem by ~ providing for theft apprehension and recovery application consisting of © a Kill Switch, SIM Catch, locate phone, data wipe and load wipe © features. .
Another object of this invention is to provide for a theft o apprehension and recovery application is to provide for an anti-theft = application that is compatible with the Android Operating Systems, windows, iOS including other upcoming commercial mobile platforms such as Tisen. It transmits via the GSM (Global System for Mobile ] communications or Group Special Mobile), 3G (Third Generation) and i 4G (Fourth Generation) standards. The product has two versions:
Firmware TARA, which is embedded in devices at the chipset level; and
TARA SOS (Save Our Smartphone), the downloadable version.
Still another object of this invention is to provide for a theft apprehension and recovery application that also incorporates an emergency notification solution that enables phone users to send text messages to a pre-set secondary/emergency number using their phone's motion sensors. Unlike most other anti-theft applications, this is supported by a Customer Service Center (TARA HOTLINE) that facilitates the use of available solutions. With a dedicated Call Center. itis able to give phone users fast, reliable and straightforward response in case their phones are stolen or misplaced.
FIG.1 is a perspective view of my invention of a theft apprehension 1 and recovery application adapted to be embedded in a mobile device or downloaded as well;
FIG. 21s a flow diagram of steps for registration; !
FIG. 3 is a flow diagram of steps for the call center assistance; and
FIG. 4is a flow diagram of steps for lock/unlock subject invention by . the user. ~
Referring now to the drawings in detail, wherein like numerals - designate same parts throughout, there is shown particularly in FIG. - ; 1, the my invention of a theft apprehension and recovery application = adapted to be embedded in a mobile device or downloaded as - well generally designated as 10, which includes the TARA application - 11 and the mobile device 12.
This application 11 includes Kill Switch 13, SIM Catch 14, locate phone 15, data wipelé and load wipe 17 features. ]
The Kill Switch 13 is the first line of defense. TARA offers the Kill switch function. It sets a loud alarm (MAGNANAKAW! MAGNANAKAW!) ]
On stolen mobile handsets, and consequently activate a full system lock. With the phone on full system lock, no key or feature may be used as the alarm remains active. Data wipe feature may only be activated upon request on the TARA hotline number. It is ready for use at a moment's notice. Also called the LOCK/UNLOCK feature, it uses the smartphone's display and speaker to set off a recurrent visual and audio alarm that cannot be stopped while the device is connected to a power source. It completely disables the phone and locks user controls to stop functioning, yet the audio alarm persists to alert anyone within hearing range while the screen conceals the image display. The program has auto-boot capacity to detect when the phone is turned on after a power loss and will immediately trigger the alarm. TARA offers the kill switch function. It sets a loud alarm (MAGNANAKAW! MAGNANAKAW!) on stolen mobile handsets, and consequently activate a full system lock. With the phone on full system ] lock, no key or feature may be used as the alarm remains active. Data ;
wipe feature may only be activated upon request on the TARA hotline = number. -
SIM Catch 14 enables to identify the thief's SIM card even s though the original SIM card is replaced and send the number . information to the TARA call center, which monitors SIM changes and - its frequency. Identifying the new SIM connected to the lost or stolen - phone will provide a link for its owner to call or send messages to the > device and demand or appeal for its return. £2
Locate Phone 15 enables the tracking service makes the - smartphone’s location discoverable using various geo location > resources. It will also provide compiled information on the phone's - whereabouts to facilitate possible recovery of the device by law enforcement agents or the owner. Tracking is done via different geo location technology and does not require the phone to be GPS- enabled.
Mobile computing has changed the way data is processed. It has become the norm to save important personal or corporate information in mobile phones and gadgets for easy retrieval on the go.
This data wipe 16 aims to protect the owner and maintain the privacy of documents, images, videos, and other data. Data stored in a lost phone's storage can be erased upon the authenticated request of the owner to prevent thieves or unauthorized users from obtaining them and using them for blackmail or other harmful intentions.
Load Wipe 17 is a punitive measure that hurts the phone thief's or finder's wallet. TARA issues a command via GSM technology that sends a large volume of SMS until all prepaid load credit or postpaid credit limit is consumed.
As shown in FIG. 2, prior to the use of this theft apprehension and recovery application 10, registration of the user is required. The user activates and register the TARA application 11 via SMS to the SMS / server 18 who then receives SMS. The Cloud VM 19 collects and processes the data coming from the SMS server 18 and then sends the 1
* SMS registration notification to client's primary and emergency number = and e-mail to the server 18. Then, the call center 20 receives and < process data. Afterwards its alerts the first responders whereby, the user hy is already registered. o
When the mobile phone is stolen/lost, the user has to call this call - center 20 for assistance as shown in FIG 3. The registered user 21 then - requests this call center 20 for mobile assistance to lock/unlock/wipe 5 the stolen/lost mobile phone 12 with embedded TARA application 11. -
Upon receiving such request from the registered user 21, the call center - 20 process this mobile assistance to lock/uniock/locate/wipe this - mobile phone 12 and sends this request to cloud VM 19. The cloud VM - 19 collects and processes the data coming from said call center 20.
Then the SMS server 18 collects and process SMS coming from cloud ]
VM 19. The mobile phone 12 receives SMS command coming from the
SMS server 18. The TARA 11 executes the application and mobile command (lock/unlock/locate/wipe). The mobile phone 12 sends mobile status via SMS to the SMS server 18 who then sends that status to call center 20. The call center 20 receives data & informs the client their mobile status. As shown in FIG. 4, the user then can lock /unlock his mobile phone 12 by sending a command to this TARA apps 11 via SMS ] thru their given primary/emergency number to the SMS server 18 who then receives this sent SMS lock/unlock command. The cloud VM 19 collects and process the data coming from SMS Server 18. Then, this cloud VM 19 sends this TARA lock/unlock command to the primary number via SMS to the SMS sever 18 to the TARA application 11, who then sends mobile status via SMS to the SMS sever 18. This SMS is sent to the Cloud VM 19 that collects &processes the data and forwarded it to the call center 20 that receives data/status update.
Claims (2)
1. A theft apprehension and recovery application adapted to be ~ embedded in a mobile device or downloaded as well, - comprising: - a kill switch being defined by a lock/unlock feature for - completely disabling the phone and locks user control to stop - functioning, yet the audio alarm persists to alert anyone within - hearing range while the screen conceals the image display; = a SIM catch for enabling the theft's SIM card identification replacing the original SIM, providing a link for its owner to call or send messages to the device and demand or appeal for its return; A locate phone for facilitating possible recovery of the mobile device by law enforcement agents or the owner; A date wipe for protecting the owners and maintain the privacy of documents, images, videos, and other data; and A load wipe for sending a large volume of SMS until all prepaid load credit or postpaid credit limit is consumed.
2. A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well in accordance with claim 1 wherein, said kill switch has a loud alarm (MAGNANAKAW! MAGNANAKAW!} on stolen mobile handsets, and consequently activate a full system lock.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PH12014000102A PH12014000102A1 (en) | 2014-04-04 | 2014-04-04 | A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PH12014000102A PH12014000102A1 (en) | 2014-04-04 | 2014-04-04 | A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well |
Publications (1)
Publication Number | Publication Date |
---|---|
PH12014000102A1 true PH12014000102A1 (en) | 2015-10-12 |
Family
ID=55305312
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PH12014000102A PH12014000102A1 (en) | 2014-04-04 | 2014-04-04 | A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well |
Country Status (1)
Country | Link |
---|---|
PH (1) | PH12014000102A1 (en) |
-
2014
- 2014-04-04 PH PH12014000102A patent/PH12014000102A1/en unknown
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220182820A1 (en) | Method and apparatus for protecting data in a portable electronic device | |
KR101140904B1 (en) | Apparatus and methods for locating, tracking and/or recovering a wireless communication device | |
US20130137376A1 (en) | Systems and methods for recovering low power devices | |
US10425798B2 (en) | Communication apparatus, system and method | |
EP2476108B1 (en) | Alert for real-time risk of theft or loss | |
KR101386438B1 (en) | Smartphone that works with USB memory device | |
US20120237908A1 (en) | Systems and methods for monitoring and managing use of mobile electronic devices | |
US20090251318A1 (en) | Anti-theft system of mobile device | |
WO2019052020A1 (en) | Alarm method, mobile terminal, and computer storage medium | |
US20180033266A1 (en) | Automated motion disturbance detection and alerting | |
EP3166294B1 (en) | Systems and methods for monitoring and managing use of mobile electronic devices | |
US10750345B1 (en) | Secure emergency response technology | |
WO2017010895A1 (en) | A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well | |
CN104469019A (en) | Mobile phone with alarming, riot preventing and body protecting functions and control method thereof | |
EP2780900B1 (en) | Systems and methods for recovering low power devices | |
CN102984411A (en) | Methods for protecting personal safety and property safety by smart mobile device | |
PH12014000102A1 (en) | A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well | |
AU2014203056A1 (en) | A Method and System for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen) | |
US10580271B1 (en) | Wireless security tracking for weapons | |
SE1451261A1 (en) | Security arrangement and method therfore | |
Azman et al. | My guardian: A personal safety mobile application | |
GB2621414A (en) | Method and apparatus for providing selective privacy in a tracking system | |
US20190064365A1 (en) | Trackable locking safe | |
KR20140002863A (en) | Service system of safety home-coming and method thereof | |
GB2450539A (en) | Security method for a mobile computing device |