WO2007069176A2 - Method for the detection of a use of a camera unit in a mobile device - Google Patents
Method for the detection of a use of a camera unit in a mobile device Download PDFInfo
- Publication number
- WO2007069176A2 WO2007069176A2 PCT/IB2006/054730 IB2006054730W WO2007069176A2 WO 2007069176 A2 WO2007069176 A2 WO 2007069176A2 IB 2006054730 W IB2006054730 W IB 2006054730W WO 2007069176 A2 WO2007069176 A2 WO 2007069176A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- camera unit
- hash
- mobile device
- hash values
- unit
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2207/00—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
- H04M2207/18—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place wireless networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2242/00—Special services or facilities
- H04M2242/04—Special services or facilities for emergency applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2242/00—Special services or facilities
- H04M2242/30—Determination of the location of a subscriber
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/52—Details of telephonic subscriber devices including functional features of a camera
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/16—Automatic or semi-automatic exchanges with lock-out or secrecy provision in party-line systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/50—Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
- H04M3/53—Centralised arrangements for recording incoming messages, i.e. mailbox systems
- H04M3/5322—Centralised arrangements for recording incoming messages, i.e. mailbox systems for recording text messages
Definitions
- the invention relates to a method for the detection of a use of a camera unit in a mobile terminal, a mobile device with a camera unit and a security monitoring system.
- US 2005/0064856 discloses a method for managing the operation of a camera in a mobile communications unit.
- a signal is sent to the mobile communications unit, which signal causes at least one function of the camera unit to be disabled.
- These camera functions may include the ability to take a picture, to select a picture resolution, the ability to record audio, the ability to record video or provide a flash function.
- the location of the mobile communications unit may be determined by a global positioning system, a triangulation process or a wireless transmission.
- the signal to limit the functions of the camera of the mobile communications unit may also be sent in accordance with a Bluetooth protocol.
- This object is solved by a method for the detection of a use of a camera unit in a mobile terminal according to claim 1 , a mobile device according to claim 5 and a security monitoring system according to claim 9.
- a method for the detection of a use of a camera unit in a mobile device is provided.
- a signal for initiating the detection mode for detecting the use of a camera unit is received in wireless fashion.
- a hashing function is performed on operation codes performed by the camera unit and/or on memory modules associated with the function of the camera unit at a first point of time to determine a first hash value.
- a hash function is performed on operation codes performed by the camera unit and/or on the memory modules associated with the function of the camera unit at a second point of time to determine a second hash value.
- the first and second hash values are transmitted.
- the received first and second hash values are compared and a warning signal is initiated if the first and second hash values do not match.
- any use of a camera unit in a mobile device can be detected and any security personnel may be notified.
- the first and/or second hash values are determined at regular intervals if the signal for initiating the detection mode is received. Hence, if the detection mode is activated, the detection of the use of the camera unit can be performed on a regular basis.
- the determined first and second hash values are transmitted at regular intervals if the signal for initiating the detection mode is received. Hence, if the detection mode is activated, the security personnel will be updated at regular intervals on the use of a camera unit.
- the position of the mobile device is determined. Furthermore, there is determined whether the position of the mobile device is in a specified area. The first and second hash values are not compared if the determined position of the mobile device is outside the specified area. Therefore, it can be prevented that the use of a camera unit is detected if the position of the mobile device is outside a restricted area.
- the invention also relates to a mobile device comprising a camera unit for taking pictures or videos, and a wireless receiver unit for receiving a signal to initiate a detection mode for detecting the use of the camera unit.
- the device furthermore comprises at least one memory module for storing the output data of the camera unit, and a hash computing unit for computing a hash value of the memory modules that are used to store the output data of the camera unit and for computing a hash value on the operation codes of the camera unit.
- a transmitter unit wirelessly transmits the hash value as computed by the hash computing unit.
- the invention also relates to a security monitoring system for monitoring the use of a camera unit in a mobile device.
- the security monitoring system comprises a transmitter unit for transmitting a signal to initiate the detection of the use of the camera unit.
- the transmitter unit is also adapted to receive hash values transmitted by a mobile device.
- the system furthermore comprises a hash database for storing hash values of operational codes of a camera and/or for storing hash values of memory modules associated with the function of the camera unit.
- a hash comparator unit compares the received hash values with hash values stored in the hash database in order to determine whether the hash values have changed.
- a warning signal is initiated if the hash values have changed.
- the invention relates to a method in which a signal is transmitted to restrict the use of a camera unit.
- a hash function is computed for those memory blocks associated with the function of the camera unit and is transmitted to the device that is sending the specific signal to disable the function of the camera unit.
- the memory module associated with the camera unit is hashed, i.e. an automatic signature of the memory module is produced and these hashed values are transmitted.
- the transmitted hashed values are compared to infer whether the camera unit has been used. In other words, a specific signal for disabling the camera unit is received by the mobile device.
- a hash function of the memory block associated with the camera unit is produced.
- the hash value is transmitted to a receiver of the transmitter device that transmits the signal for disabling the camera unit.
- a new hash value of the memory blocks associated with the camera unit is determined and transmitted.
- the hash value of the memory modules associated with the camera unit of the mobile device which was determined when the mobile device entered the restricted area is compared to the hash value of the memory blocks associated with the camera unit when the mobile terminal leaves the restricted area or after a predetermined period of time has elapsed. By comparing these two hash values, there may be inferred whether the user has used the camera unit of his mobile device.
- Fig.l shows a block diagram of a mobile device according to the first embodiment
- Fig.2 shows a block diagram of a special signal controller device
- Fig.3 shows a flow chart of the method for the detection of the use of a camera unit in a mobile device according to a first embodiment
- Fig.4 shows a block diagram of those parts of the mobile phone which are used to determine the hash function.
- Fig.l shows a block diagram of the basic architecture of a mobile device according to a first embodiment.
- the mobile device comprises a receiver module 10 for wirelessly receiving a special signal 100.
- the mobile device furthermore comprises a controller 20, memory modules 30, a camera/video unit 40, a hash computing unit 60 and a hash transmitter 70.
- the receiver module 10 controls the camera/video unit 40 via the controller 20. If a special signal or detecting mode signal SGlOO is received, the operation of the camera/video unit 40 may be temporarily shut down. Alternatively or additionally, when the SG signal or detection mode is received, the memory modules 30 which are associated with the operation of the camera/video unit are switched to a special operating mode, i.e. the detection mode.
- the hash computing unit 60 computes a hash value of the memory modules and forwards this hash value to the hash transmitter 70 which transmits this value to a receiver of the transmitter of the special signal 100. For example, if a user of the mobile device which may be used as a mobile phone uses the camera unit 40 for example to take a picture, the output data of the camera/video unit 40 will be stored in the memory modules 30 that are associated with the function of the camera/video unit.
- the hash computing unit 60 computes a hash value of the memory modules that are associated with the function of the camera/video unit and may also compute a hash value of the operation codes which are performed by the camera unit 40 on the memory modules.
- a special signal or detection mode signal 100 is received by the mobile phone via its receiver module 10, the operation of the hash computing unit 60 is initiated and a hash value of the memory modules and the operation codes is determined. If a further special signal 100 is received, the hash computing unit 60 computes a new hash value of the memory modules 30 as well as of the operation codes. Alternatively or additionally, this may also be performed after predetermined time intervals and the computed hash value may be stored in a special part of the memory modules. The hash values of the memory modules as well as the operation codes may be stored for a predetermined period of time or may be replaced by new hash values. Furthermore, the stored hash values may be transmitted at predetermined or regular time intervals or upon a reception at the signal 100.
- the receiver module 10 and the hash transmitter 70 may be used as a single receiver/transmitter unit.
- Fig.2 shows a block diagram of a controller device or a security monitoring device according to the first embodiment.
- the controller device comprises a hash comparator unit 110, a controller unit 120, a hash database 130, a transmitter unit 140 and a mobile detector unit 160.
- the mobile detector unit 160 serves to detect any mobile devices or mobile terminals within its range. Alternatively or additionally, such a mobile detector unit 160 may also be arranged outside the controller device of Fig.2 so that the information regarding the presence of mobile devices within a specific range may also be provided from external devices.
- the controller unit 120 receives the detection results of the mobile detector unit 160 and initiates a transmission of a special signal or detection mode signal 100 by the transmitter unit 140.
- a hash computing unit 60 of the mobile device computes the hash value of the memory modules 30 associated with the camera/video unit 40 and/or the hash values of the operation codes of the camera unit 40. These hash values are transmitted via the hash transmitting unit 70.
- the hash value as transmitted by the hash transmitting unit 70 is received by the controller device for example via the transmitter unit 140 which may also be used as a receiver unit.
- the received hash value is forwarded to the hash database 130 via the controller unit 120 and is stored together with the identification data of the mobile device.
- the hash comparator unit 110 serves to compare the hash value stored in the database 130, which corresponds to the hash value computed before the special signal 100 is received with the hash value computed when a further special signal 100 is received. In other words, the hash values stored before entering premises are compared to the hash values stored after leaving the premises. If the hash comparator unit 110 detects that the hash values have changed during this time, the hash comparator unit may initiate a warning or an alert.
- the transmitter unit 140 continuously transmits a special signal 100 or transmits the special signal at regular intervals, so that a mobile detector unit 160 is not needed anymore and may be omitted.
- the mobile device may compute the hash values of the memory modules 30 and the operation codes at predetermined or regular intervals and transmit these values via the hash transmitter 70. This may be performed by sending the hash values in a query packet after which the transmitter unit 140 initiates the transmission of a special signal 100.
- the computation of the hash values of the memory modules 30 and the operation codes may be initiated by the user of the mobile device for example by pressing a specific button or a combination of buttons.
- the hash computing unit 40 starts computing the hash values and transmitting the computed hash values via the hash transmitter 70 to the receiver unit 140 of the controller device.
- Fig.3 shows a flow chart of a method for the control of the hash function in a camera unit.
- the flow starts in step S 1.
- step S2 there is determined whether the mobile device has entered specific premises. If the mobile device has not entered the premises, the flow proceeds to step S3 where the mobile device is left in a normal operation mode.
- step S4 the flow ends. If the mobile device has not entered the premises, the flow also proceeds to step S 8 where it is determined whether the mobile device leaves specific premises. If this is the case, the flow proceeds to step S9 where a special signal or detection mode signal is transmitted. Thereafter, the flow proceeds to step SlO where the hash value of the memory modules as well as that of the operation codes is determined.
- step SI l the hash value is transmitted from the mobile device.
- step S7 the received hash values are stored and compared in the controller device or the security monitoring device.
- step S6 there is determined whether the hash values have changed. If the hash values have changed, an alert is initiated in step S5 to notify the operator that a camera unit of the mobile device has been used. Thereafter, the flow proceeds to step S4 where the flow ends.
- step S2 If in step S2 it has been determined that a mobile device enters premises, the flow proceeds to step S13 where there is determined whether a special signal or detection mode signal has been transmitted. If no special signal or detection mode signal has been transmitted, the flow proceeds to step S3 and the camera is left in normal operation. However, if it is determined in step S13 that a special signal has been transmitted, the flow may proceed to step S 14 where the camera unit or at least parts of the camera unit are disabled. Alternatively or additionally, the flow proceeds from step S 13 to step S15 where the mobile device is switched to a special mode or a detection mode to trace the operation of the camera. Thereafter, the flow proceeds to step S16 where the hash values of the memory modules and the operational codes are computed and are transmitted in step S 17.
- step S7 the transmitted hash values are received by the controller device or the security monitoring device and are stored and compared. If the hash values have been transmitted in step S 17, the flow proceeds to step Sl 8 and it is indicated that the mobile device is within the premises.
- a hash value of the memory block, the memory module and/or the operational code associated with a camera unit of a mobile device is determined if a special signal or a detection mode signal is received.
- the results of the hash computation are transmitted to a security monitoring station when the mobile device enters a specific area and when it leaves this specific area. In the monitoring station, these two hash values are compared and an alert signal is initiated if these two values do not match.
- the mobile device may determine the hash values of the memory modules and/or the operational code associated with the camera unit at predetermined or regular time intervals and transmit these hash values to the security monitoring station. Accordingly, the security monitoring station will always be able to determine whether the camera unit of a mobile device has been used such that a warning signal may be initiated. If the mobile device determines the hash values of the memory modules and the operation code at predetermined or regular time intervals if the mobile device is switched on, any use of the camera unit will be detected even if a user switches off his mobile device when leaving the premises. The security monitoring station may compare the received hash values from the mobile devices on the spot so that any use of the camera unit may be detected immediately and a warning signal may be issued immediately.
- Fig.4 shows a block diagram of a part of the mobile device according to Fig.1.
- memory modules 30a, 30b and 30c as well as the hash computing unit 60 and data and address lines 35 are shown.
- the memory blocks 30a - 30c are connected to the camera unit 40 via these address lines 35.
- the hash computing unit 60 is coupled to the data/address lines 35 for probing for operation codes and is as well coupled to the memory blocks 30a - 30c for monitoring the data thereof.
- the hash values of the operation codes and the memory blocks are determined in the hash computing unit 60 which may be used as a one-way hash function generator and the determined hash values are forwarded to the hash transmitter 70 to be transmitted.
- the special operation mode i.e.
- the detection mode for tracing the operation of the camera unit is enabled and the hash computing unit 60 will start to probe the data/address lines to determine whether any operations are performed on those memory blocks which are associated with the function of the camera unit. If any operation is performed on these memory blocks, the operation codes are probed and passed on to the hash generator. The data associated with them and stored in the memory blocks are also read and passed to the hash generator.
- a situation may arise where a person enters premises without being detected or registered by the controller of the premises. If such a person switches on his mobile device, the mobile device will listen to a broadcast channel and based on the actual signal strength select a base station that is transmitting the strongest signal and will then register with this base station. The base station will detect the switching on of the mobile device and can communicate this to the responsible controller. Accordingly, the base station will then forward the identification of all mobile phones registered with this station to a security monitoring system, i.e. the camera controller according to Fig.2. The security monitoring system may check whether any of the registered mobile phones has not been present in the database of the controller before. Additionally, a hash value of the memory modules and the operational codes associated with the camera unit of the mobile device may also be transmitted to the base station and forwarded to the security monitoring system when the mobile device is switched on.
- the position of the mobile device may be determined for example by means of a global positioning system, a cellular telephone triangulation or other location techniques. If it is determined by this location procedure that the mobile device is within the range of the base station but outside the restricted area, then the mobile device may not be switched to a special mode during which the operation of the camera unit is traced. However, if it is determined by this localization that the mobile device is in a restricted area indeed, then the mobile device is switched to the special mode to trace the operation of the camera unit.
- the EMSI number of the device may also be transmitted to the base station and may be forwarded to the security monitoring system to avoid any fraud on the user side by merely exchanging the SIM card. Accordingly, the security monitoring system may be able to identify the mobile device irrespective of the SIM card used by the user.
- the operation codes which are associated with the function of the camera unit are monitored and hashed, it is also possible to determine whether a user entered a restricted area with his mobile device switched on, activated the camera unit to take a picture within the restricted area and stored these data on a memory module (possibly a removable memory module) different from the one with which he entered the restricted area and leaves the restricted area with his mobile phone switched on, but with the original memory module reinstalled. Accordingly, it can be prevented that a user of a mobile phone bypasses the security monitoring.
- a memory module possibly a removable memory module
- the hash function of the operational codes related to these camera operations is computed and is stored or transmitted accordingly, the operational codes will be different from the operational codes or in particular the hash values of the operational codes computed when the restricted area was entered.
- the original memory is reinstalled in the mobile device, as the hash values of the operational codes computed when leaving the restricted area will not correspond to the hash values of the operational codes as computed when entering the restricted area.
- the above described method for the detection of a use of a camera unit may be applicable to any portable mobile devices that comprise camera units in order to prevent the stealing of sensitive information or in order to prevent pictures from being taken in a private environment.
- a history of executed operation codes for special memory modules is examined and a corresponding hash function, i.e. a signature is determined. This may be triggered by an external signal.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Studio Devices (AREA)
- Telephone Function (AREA)
Abstract
A method for the detection of a use of a camera unit in a mobile device is provided. A signal for initiating the detection mode for detecting the use of a camera unit is wirelessly received. A hashing function on operation codes performed by the camera unit and/or the hashing function of memory modules associated with the function of the camera unit is performed at at least a first point of time to determine a first hash value. Thereafter, a hash function is performed on operation codes performed by the camera unit and/or a hashing function is performed on the memory modules associated with the function of the camera unit at at least a second point of time to determine a second hash value. The first and second hash values are transmitted. The received first and second hash values are compared and a warning signal is initiated if the first and second hash values do not match.
Description
Method for the detection of a use of a camera unit in a mobile device
FIELD OF THE INVENTION
The invention relates to a method for the detection of a use of a camera unit in a mobile terminal, a mobile device with a camera unit and a security monitoring system.
BACKGROUND OF THE INVENTION
With the development of mobile devices or mobile terminals which may comprise detachable memory modules or external memory devices, the possibilities to transfer data easily have significantly increased. External memory devices may be constituted by a USB memory stick, memory card or the like. Additionally, the provision of camera units in mobile devices or mobile terminals has resulted in an increased danger of pictures or videos being taken in restricted or private areas without anybody noticing. Such mobile devices with camera units may be misused for espionage or may be misused for taking pictures in a private environment. However, as a lot of current mobile phones also have camera units, it is difficult to control the use of the camera units of such mobile telephones. On the other hand, it is not acceptable to users of mobile phones with camera units if the mobile phones have to be left aside when the users enter a restricted or private area, as these mobile devices are also a means of communication for the users.
US 2005/0064856 discloses a method for managing the operation of a camera in a mobile communications unit. Depending on the location of the mobile communications unit, a signal is sent to the mobile communications unit, which signal causes at least one function of the camera unit to be disabled. These camera functions may include the ability to take a picture, to select a picture resolution, the ability to record audio, the ability to record video or provide a flash function. The location of the mobile communications unit may be determined by a global positioning system, a triangulation process or a wireless transmission. The signal to limit the functions of the camera of the mobile communications unit may also be sent in accordance with a Bluetooth protocol.
It can therefore be expected that such a functionality will be implemented in almost all mobile phones with a camera unit, so that after receiving a specific signal, the camera functionality of the mobile phone is restricted for a specified amount of time.
SUMMARY OF THE INVENTION
It is an object of the invention to provide a method for the detection of a use of a camera unit in a mobile terminal, which can be implemented more easily from the environment of the mobile device.
This object is solved by a method for the detection of a use of a camera unit in a mobile terminal according to claim 1 , a mobile device according to claim 5 and a security monitoring system according to claim 9.
Therefore, a method for the detection of a use of a camera unit in a mobile device is provided. A signal for initiating the detection mode for detecting the use of a camera unit is received in wireless fashion. A hashing function is performed on operation codes performed by the camera unit and/or on memory modules associated with the function of the camera unit at a first point of time to determine a first hash value. Thereafter, a hash function is performed on operation codes performed by the camera unit and/or on the memory modules associated with the function of the camera unit at a second point of time to determine a second hash value. The first and second hash values are transmitted. The received first and second hash values are compared and a warning signal is initiated if the first and second hash values do not match.
Accordingly, any use of a camera unit in a mobile device can be detected and any security personnel may be notified.
According to one aspect of the invention the first and/or second hash values are determined at regular intervals if the signal for initiating the detection mode is received. Hence, if the detection mode is activated, the detection of the use of the camera unit can be performed on a regular basis. According to another aspect of the invention the determined first and second hash values are transmitted at regular intervals if the signal for initiating the detection mode is received. Hence, if the detection mode is activated, the security personnel will be updated at regular intervals on the use of a camera unit.
According to a further aspect of the invention the position of the mobile device is determined. Furthermore, there is determined whether the position of the mobile device is in a specified area. The first and second hash values are not compared if the determined position of the mobile device is outside the specified area. Therefore, it can be prevented that the use of a camera unit is detected if the position of the mobile device is outside a restricted area.
The invention also relates to a mobile device comprising a camera unit for taking pictures or videos, and a wireless receiver unit for receiving a signal to initiate a detection mode for detecting the use of the camera unit. The device furthermore comprises at least one memory module for storing the output data of the camera unit, and a hash computing unit for computing a hash value of the memory modules that are used to store the output data of the camera unit and for computing a hash value on the operation codes of the camera unit. A transmitter unit wirelessly transmits the hash value as computed by the hash computing unit.
The invention also relates to a security monitoring system for monitoring the use of a camera unit in a mobile device. The security monitoring system comprises a transmitter unit for transmitting a signal to initiate the detection of the use of the camera unit. The transmitter unit is also adapted to receive hash values transmitted by a mobile device. The system furthermore comprises a hash database for storing hash values of operational codes of a camera and/or for storing hash values of memory modules associated with the function of the camera unit. A hash comparator unit compares the received hash values with hash values stored in the hash database in order to determine whether the hash values have changed. A warning signal is initiated if the hash values have changed.
The invention relates to a method in which a signal is transmitted to restrict the use of a camera unit. A hash function is computed for those memory blocks associated with the function of the camera unit and is transmitted to the device that is sending the specific signal to disable the function of the camera unit. The memory module associated with the camera unit is hashed, i.e. an automatic signature of the memory module is produced and these hashed values are transmitted. The transmitted hashed values are compared to infer whether the camera unit has been used. In other words, a specific signal for disabling the camera unit is received by the mobile device. A hash function of the memory block associated with the camera unit is produced. The hash value is transmitted to a receiver of the transmitter device that transmits the signal for disabling the camera unit. If the user leaves the restricted area, a new hash value of the memory blocks associated with the camera unit is determined and transmitted. In the transmitter device the hash value of the memory modules associated with the camera unit of the mobile device which was determined when the mobile device entered the restricted area is compared to the hash value of the memory blocks associated with the camera unit when the mobile terminal leaves the restricted area or after a predetermined period of time
has elapsed. By comparing these two hash values, there may be inferred whether the user has used the camera unit of his mobile device.
These and other aspects of the invention are defined in the dependent claims.
BRIEF DESCRIPTION OF THE DRAWINGS
The embodiments and advantages of the present invention will now be described in more detail with reference to the figures.
Fig.l shows a block diagram of a mobile device according to the first embodiment,
Fig.2 shows a block diagram of a special signal controller device,
Fig.3 shows a flow chart of the method for the detection of the use of a camera unit in a mobile device according to a first embodiment, and
Fig.4 shows a block diagram of those parts of the mobile phone which are used to determine the hash function.
DESCRIPTION OF PREFERRED EMBODIMENTS
Fig.l shows a block diagram of the basic architecture of a mobile device according to a first embodiment. The mobile device comprises a receiver module 10 for wirelessly receiving a special signal 100. The mobile device furthermore comprises a controller 20, memory modules 30, a camera/video unit 40, a hash computing unit 60 and a hash transmitter 70. The receiver module 10 controls the camera/video unit 40 via the controller 20. If a special signal or detecting mode signal SGlOO is received, the operation of the camera/video unit 40 may be temporarily shut down. Alternatively or additionally, when the SG signal or detection mode is received, the memory modules 30 which are associated with the operation of the camera/video unit are switched to a special operating mode, i.e. the detection mode. In this special operating mode, the hash computing unit 60 computes a hash value of the memory modules and forwards this hash value to the hash transmitter 70 which transmits this value to a receiver of the transmitter of the special signal 100. For example, if a user of the mobile device which may be used as a mobile phone uses the camera unit 40 for example to take a picture, the output data of the camera/video unit 40 will be stored in the memory modules 30 that are associated with the function of the camera/video unit. The hash computing unit 60 computes a hash value of the memory modules that are associated with the function of the camera/video unit and may also
compute a hash value of the operation codes which are performed by the camera unit 40 on the memory modules. If a special signal or detection mode signal 100 is received by the mobile phone via its receiver module 10, the operation of the hash computing unit 60 is initiated and a hash value of the memory modules and the operation codes is determined. If a further special signal 100 is received, the hash computing unit 60 computes a new hash value of the memory modules 30 as well as of the operation codes. Alternatively or additionally, this may also be performed after predetermined time intervals and the computed hash value may be stored in a special part of the memory modules. The hash values of the memory modules as well as the operation codes may be stored for a predetermined period of time or may be replaced by new hash values. Furthermore, the stored hash values may be transmitted at predetermined or regular time intervals or upon a reception at the signal 100. The receiver module 10 and the hash transmitter 70 may be used as a single receiver/transmitter unit.
Fig.2 shows a block diagram of a controller device or a security monitoring device according to the first embodiment. The controller device comprises a hash comparator unit 110, a controller unit 120, a hash database 130, a transmitter unit 140 and a mobile detector unit 160. The mobile detector unit 160 serves to detect any mobile devices or mobile terminals within its range. Alternatively or additionally, such a mobile detector unit 160 may also be arranged outside the controller device of Fig.2 so that the information regarding the presence of mobile devices within a specific range may also be provided from external devices.
The controller unit 120 receives the detection results of the mobile detector unit 160 and initiates a transmission of a special signal or detection mode signal 100 by the transmitter unit 140. As mentioned above, as soon as the mobile device has received the special signal or detection mode signal 100, a hash computing unit 60 of the mobile device computes the hash value of the memory modules 30 associated with the camera/video unit 40 and/or the hash values of the operation codes of the camera unit 40. These hash values are transmitted via the hash transmitting unit 70. The hash value as transmitted by the hash transmitting unit 70 is received by the controller device for example via the transmitter unit 140 which may also be used as a receiver unit. Thus the received hash value is forwarded to the hash database 130 via the controller unit 120 and is stored together with the identification data of the mobile device. The hash comparator unit 110 serves to compare the hash value stored in the database 130, which corresponds to the hash value computed before the special signal 100 is received with the hash value computed when a further special signal 100 is received. In other words, the hash values stored before entering premises are compared to the
hash values stored after leaving the premises. If the hash comparator unit 110 detects that the hash values have changed during this time, the hash comparator unit may initiate a warning or an alert.
In an alternative embodiment of the controller device based on the controller device according to the first embodiment, the transmitter unit 140 continuously transmits a special signal 100 or transmits the special signal at regular intervals, so that a mobile detector unit 160 is not needed anymore and may be omitted. Alternatively or additionally, the mobile device may compute the hash values of the memory modules 30 and the operation codes at predetermined or regular intervals and transmit these values via the hash transmitter 70. This may be performed by sending the hash values in a query packet after which the transmitter unit 140 initiates the transmission of a special signal 100.
According to a further embodiment, the computation of the hash values of the memory modules 30 and the operation codes may be initiated by the user of the mobile device for example by pressing a specific button or a combination of buttons. The hash computing unit 40 starts computing the hash values and transmitting the computed hash values via the hash transmitter 70 to the receiver unit 140 of the controller device.
Fig.3 shows a flow chart of a method for the control of the hash function in a camera unit. The flow starts in step S 1. In step S2, there is determined whether the mobile device has entered specific premises. If the mobile device has not entered the premises, the flow proceeds to step S3 where the mobile device is left in a normal operation mode.
Thereafter, the flow proceeds to step S4 where the flow ends. If the mobile device has not entered the premises, the flow also proceeds to step S 8 where it is determined whether the mobile device leaves specific premises. If this is the case, the flow proceeds to step S9 where a special signal or detection mode signal is transmitted. Thereafter, the flow proceeds to step SlO where the hash value of the memory modules as well as that of the operation codes is determined.
Thereafter, the flow proceeds to step SI l where the hash value is transmitted from the mobile device. The flow proceeds to step S7 where the received hash values are stored and compared in the controller device or the security monitoring device. In step S6 there is determined whether the hash values have changed. If the hash values have changed, an alert is initiated in step S5 to notify the operator that a camera unit of the mobile device has been used. Thereafter, the flow proceeds to step S4 where the flow ends.
If in step S2 it has been determined that a mobile device enters premises, the flow proceeds to step S13 where there is determined whether a special signal or detection
mode signal has been transmitted. If no special signal or detection mode signal has been transmitted, the flow proceeds to step S3 and the camera is left in normal operation. However, if it is determined in step S13 that a special signal has been transmitted, the flow may proceed to step S 14 where the camera unit or at least parts of the camera unit are disabled. Alternatively or additionally, the flow proceeds from step S 13 to step S15 where the mobile device is switched to a special mode or a detection mode to trace the operation of the camera. Thereafter, the flow proceeds to step S16 where the hash values of the memory modules and the operational codes are computed and are transmitted in step S 17. Thereafter, the flow proceeds to step S7 where the transmitted hash values are received by the controller device or the security monitoring device and are stored and compared. If the hash values have been transmitted in step S 17, the flow proceeds to step Sl 8 and it is indicated that the mobile device is within the premises.
In other words, a hash value of the memory block, the memory module and/or the operational code associated with a camera unit of a mobile device is determined if a special signal or a detection mode signal is received. The results of the hash computation are transmitted to a security monitoring station when the mobile device enters a specific area and when it leaves this specific area. In the monitoring station, these two hash values are compared and an alert signal is initiated if these two values do not match.
Alternatively or additionally, the mobile device may determine the hash values of the memory modules and/or the operational code associated with the camera unit at predetermined or regular time intervals and transmit these hash values to the security monitoring station. Accordingly, the security monitoring station will always be able to determine whether the camera unit of a mobile device has been used such that a warning signal may be initiated. If the mobile device determines the hash values of the memory modules and the operation code at predetermined or regular time intervals if the mobile device is switched on, any use of the camera unit will be detected even if a user switches off his mobile device when leaving the premises. The security monitoring station may compare the received hash values from the mobile devices on the spot so that any use of the camera unit may be detected immediately and a warning signal may be issued immediately. Fig.4 shows a block diagram of a part of the mobile device according to Fig.1.
Here, memory modules 30a, 30b and 30c as well as the hash computing unit 60 and data and address lines 35 are shown. The memory blocks 30a - 30c are connected to the camera unit 40 via these address lines 35. The hash computing unit 60 is coupled to the data/address lines 35 for probing for operation codes and is as well coupled to the memory blocks 30a - 30c for
monitoring the data thereof. The hash values of the operation codes and the memory blocks are determined in the hash computing unit 60 which may be used as a one-way hash function generator and the determined hash values are forwarded to the hash transmitter 70 to be transmitted. In particular, as soon as the special signal 100 or a detection mode signal is received by the mobile device, the special operation mode, i.e. the detection mode for tracing the operation of the camera unit is enabled and the hash computing unit 60 will start to probe the data/address lines to determine whether any operations are performed on those memory blocks which are associated with the function of the camera unit. If any operation is performed on these memory blocks, the operation codes are probed and passed on to the hash generator. The data associated with them and stored in the memory blocks are also read and passed to the hash generator.
According to a further embodiment which may be based on any of the above- mentioned embodiments, a situation may arise where a person enters premises without being detected or registered by the controller of the premises. If such a person switches on his mobile device, the mobile device will listen to a broadcast channel and based on the actual signal strength select a base station that is transmitting the strongest signal and will then register with this base station. The base station will detect the switching on of the mobile device and can communicate this to the responsible controller. Accordingly, the base station will then forward the identification of all mobile phones registered with this station to a security monitoring system, i.e. the camera controller according to Fig.2. The security monitoring system may check whether any of the registered mobile phones has not been present in the database of the controller before. Additionally, a hash value of the memory modules and the operational codes associated with the camera unit of the mobile device may also be transmitted to the base station and forwarded to the security monitoring system when the mobile device is switched on.
In addition, the position of the mobile device may be determined for example by means of a global positioning system, a cellular telephone triangulation or other location techniques. If it is determined by this location procedure that the mobile device is within the range of the base station but outside the restricted area, then the mobile device may not be switched to a special mode during which the operation of the camera unit is traced. However, if it is determined by this localization that the mobile device is in a restricted area indeed, then the mobile device is switched to the special mode to trace the operation of the camera unit.
In addition, once the mobile device is switched on and has registered with a base station, the EMSI number of the device may also be transmitted to the base station and may be forwarded to the security monitoring system to avoid any fraud on the user side by merely exchanging the SIM card. Accordingly, the security monitoring system may be able to identify the mobile device irrespective of the SIM card used by the user.
As the operation codes which are associated with the function of the camera unit are monitored and hashed, it is also possible to determine whether a user entered a restricted area with his mobile device switched on, activated the camera unit to take a picture within the restricted area and stored these data on a memory module (possibly a removable memory module) different from the one with which he entered the restricted area and leaves the restricted area with his mobile phone switched on, but with the original memory module reinstalled. Accordingly, it can be prevented that a user of a mobile phone bypasses the security monitoring.
For example, if a memory is replaced by a further memory during the operations of the camera unit of the mobile device, the hash function of the operational codes related to these camera operations is computed and is stored or transmitted accordingly, the operational codes will be different from the operational codes or in particular the hash values of the operational codes computed when the restricted area was entered. The same applies if the original memory is reinstalled in the mobile device, as the hash values of the operational codes computed when leaving the restricted area will not correspond to the hash values of the operational codes as computed when entering the restricted area.
To ensure the above-mentioned operation, operational codes related to the operation of the camera unit must be stored safely or a new hash value has to be computed each time an operation is performed. Furthermore, the hash values should be protected so that no modification of them can be performed.
The above described method for the detection of a use of a camera unit may be applicable to any portable mobile devices that comprise camera units in order to prevent the stealing of sensitive information or in order to prevent pictures from being taken in a private environment. A history of executed operation codes for special memory modules is examined and a corresponding hash function, i.e. a signature is determined. This may be triggered by an external signal.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design many alternative embodiments without departing from the scope of the appended claims. In the claims, any
reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps other than those listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. In the device claim enumerating several means, several of these means can be embodied by one and the same item of hardware. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
Furthermore, any reference signs in the claims shall not be construed as limiting the scope of the claims.
Claims
1. Method for the detection of a use of a camera unit in a mobile device, comprising the steps of: wirelessly receiving a signal for initiating a detection mode for detecting a use of a camera unit, - performing a hashing function on operation codes performed by the camera unit and/or a hashing function on memory modules associated with the function of the camera unit at at least a first point of time to determine first hash values, performing a hashing function on operation codes performed by the camera unit and/or a hashing function on memory modules associated with the function of the camera unit at at least a second point of time to determine second hash values, transmitting the first and second hash values, comparing the received first and second hash values, and initiating a warning signal if the first and second hash values do not match.
2. Method according to claim 1, wherein the first and/or second hash values are determined at regular time intervals if the signal for initiating the detection mode is received.
3. Method according to claim 2, wherein the determined first and second hash values are transmitted at regular intervals if the signal for initiating the detection mode is received.
4. Method according to claim 1, further comprising the steps of: determining the position of the mobile device and determining whether the location of the mobile device is within a specified area, wherein the first and second hash values are not compared if the determined position of the mobile device is outside the specified area.
5. Mobile device, comprising a camera unit (40) for taking pictures or videos; at least one memory module (30) for storing the output data of the camera unit (40), a wireless receiver unit (10) for receiving a signal to initiate a detection mode for detecting a use of the camera unit (40); - a hash computing unit (60) for computing a hash value of the memory modules (30) which are used to store the output data of the camera unit (40) and for computing a hash value on operation codes of the camera unit (40), and a transmitter unit (70) for wirelessly transmitting the hash values as computed by the hash computing unit (60).
6. Mobile device according to claim 5, wherein the hash computing unit (60) is adapted to probe data and address lines (35) between the camera unit (40) and the memory modules (30a - 30c) to find whether any operation codes have been sent over the data and address lines (35) related to the function of the camera unit, wherein the hash computing unit (60) is furthermore adapted to monitor the data of the memory modules (30a - 30c) which are associated with the function of the camera unit.
7. Mobile device according to claim 5 or 6, wherein the determined hash values of the operation codes of the camera unit (40) as well as the hash values of the memory modules (30a - 30c) are stored in a tamper-proof part of the memory modules (30).
8. Mobile device according to claim 6, wherein the transmitter unit (70) is adapted to transmit the computed hash values at regular time intervals if the signal to initiate the detection mode has been received.
9. Security monitoring system for monitoring the use of a camera unit in a mobile device, comprising: a transmitter unit (140) for wirelessly transmitting a signal (100) to initiate the detection mode for detecting the use of a camera unit and for receiving hash values as wirelessly transmitted from a mobile device, a hash database (130) for storing hash values of operational codes of a camera unit in a mobile device and/or hash values of memory modules associated with the function of the camera unit (40), and a hash comparator unit (110) for comparing the received hash values with hash values stored in the hash database (130) to detect whether the hash values have changed and to initiate a warning signal if the hash values have.
10. Security monitoring system according to claim 9, further comprising a detector unit (160) for detecting the presence of a mobile device within a specified area, wherein the transmitter unit (140) wirelessly transmits a signal to initiate the detection mode if the detector unit (160) has detected any mobile devices.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05301070.8 | 2005-12-16 | ||
EP05301070 | 2005-12-16 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2007069176A2 true WO2007069176A2 (en) | 2007-06-21 |
WO2007069176A3 WO2007069176A3 (en) | 2007-10-11 |
Family
ID=38025557
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2006/054730 WO2007069176A2 (en) | 2005-12-16 | 2006-12-11 | Method for the detection of a use of a camera unit in a mobile device |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2007069176A2 (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130167197A1 (en) * | 2005-12-22 | 2013-06-27 | At&T Intellectual Property I, L.P. | Methods, Systems, and Computer Program Products for Invoking Trust-Controlled Services Via Application Programming Interfaces (APIs) Respectively Associated Therewith |
US10270599B2 (en) | 2017-04-27 | 2019-04-23 | Factom, Inc. | Data reproducibility using blockchains |
US10411897B2 (en) | 2017-02-17 | 2019-09-10 | Factom, Inc. | Secret sharing via blockchains |
US10419225B2 (en) | 2017-01-30 | 2019-09-17 | Factom, Inc. | Validating documents via blockchain |
US10685399B2 (en) | 2017-03-31 | 2020-06-16 | Factom, Inc. | Due diligence in electronic documents |
US10783164B2 (en) | 2018-05-18 | 2020-09-22 | Factom, Inc. | Import and export in blockchain environments |
US10817873B2 (en) | 2017-03-22 | 2020-10-27 | Factom, Inc. | Auditing of electronic documents |
US11044095B2 (en) | 2018-08-06 | 2021-06-22 | Factom, Inc. | Debt recordation to blockchains |
US11042871B2 (en) | 2018-08-06 | 2021-06-22 | Factom, Inc. | Smart contracts in blockchain environments |
US11134120B2 (en) | 2018-05-18 | 2021-09-28 | Inveniam Capital Partners, Inc. | Load balancing in blockchain environments |
US11164250B2 (en) | 2018-08-06 | 2021-11-02 | Inveniam Capital Partners, Inc. | Stable cryptocurrency coinage |
US11170366B2 (en) | 2018-05-18 | 2021-11-09 | Inveniam Capital Partners, Inc. | Private blockchain services |
US11328290B2 (en) | 2018-08-06 | 2022-05-10 | Inveniam Capital Partners, Inc. | Stable cryptocurrency coinage |
US11343075B2 (en) | 2020-01-17 | 2022-05-24 | Inveniam Capital Partners, Inc. | RAM hashing in blockchain environments |
US11989208B2 (en) | 2018-08-06 | 2024-05-21 | Inveniam Capital Partners, Inc. | Transactional sharding of blockchain transactions |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12008526B2 (en) | 2021-03-26 | 2024-06-11 | Inveniam Capital Partners, Inc. | Computer system and method for programmatic collateralization services |
US12007972B2 (en) | 2021-06-19 | 2024-06-11 | Inveniam Capital Partners, Inc. | Systems and methods for processing blockchain transactions |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050064856A1 (en) * | 2003-09-18 | 2005-03-24 | International Business Machines Corporation | Method and apparatus for managing functions in a camera phone |
-
2006
- 2006-12-11 WO PCT/IB2006/054730 patent/WO2007069176A2/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050064856A1 (en) * | 2003-09-18 | 2005-03-24 | International Business Machines Corporation | Method and apparatus for managing functions in a camera phone |
Cited By (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9071604B2 (en) * | 2005-12-22 | 2015-06-30 | At&T Intellectual Property I, L.P. | Methods, systems, and computer program products for invoking trust-controlled services via application programming interfaces (APIs) respectively associated therewith |
US20130167197A1 (en) * | 2005-12-22 | 2013-06-27 | At&T Intellectual Property I, L.P. | Methods, Systems, and Computer Program Products for Invoking Trust-Controlled Services Via Application Programming Interfaces (APIs) Respectively Associated Therewith |
US11044100B2 (en) | 2017-01-30 | 2021-06-22 | Factom, Inc. | Validating documents |
US11863686B2 (en) | 2017-01-30 | 2024-01-02 | Inveniam Capital Partners, Inc. | Validating authenticity of electronic documents shared via computer networks |
US10419225B2 (en) | 2017-01-30 | 2019-09-17 | Factom, Inc. | Validating documents via blockchain |
US10411897B2 (en) | 2017-02-17 | 2019-09-10 | Factom, Inc. | Secret sharing via blockchains |
US11296889B2 (en) | 2017-02-17 | 2022-04-05 | Inveniam Capital Partners, Inc. | Secret sharing via blockchains |
US10817873B2 (en) | 2017-03-22 | 2020-10-27 | Factom, Inc. | Auditing of electronic documents |
US11580534B2 (en) | 2017-03-22 | 2023-02-14 | Inveniam Capital Partners, Inc. | Auditing of electronic documents |
US11443370B2 (en) | 2017-03-31 | 2022-09-13 | Inveniam Capital Partners, Inc. | Due diligence in electronic documents |
US11468510B2 (en) | 2017-03-31 | 2022-10-11 | Inveniam Capital Partners, Inc. | Due diligence in electronic documents |
US10685399B2 (en) | 2017-03-31 | 2020-06-16 | Factom, Inc. | Due diligence in electronic documents |
US11443371B2 (en) | 2017-03-31 | 2022-09-13 | Inveniam Capital Partners, Inc. | Due diligence in electronic documents |
US10693652B2 (en) | 2017-04-27 | 2020-06-23 | Factom, Inc. | Secret sharing via blockchain distribution |
US11044097B2 (en) | 2017-04-27 | 2021-06-22 | Factom, Inc. | Blockchain recordation of device usage |
US10270599B2 (en) | 2017-04-27 | 2019-04-23 | Factom, Inc. | Data reproducibility using blockchains |
US11134120B2 (en) | 2018-05-18 | 2021-09-28 | Inveniam Capital Partners, Inc. | Load balancing in blockchain environments |
US11170366B2 (en) | 2018-05-18 | 2021-11-09 | Inveniam Capital Partners, Inc. | Private blockchain services |
US11587074B2 (en) | 2018-05-18 | 2023-02-21 | Inveniam Capital Partners, Inc. | Recordation of device usage to blockchains |
US11930072B2 (en) | 2018-05-18 | 2024-03-12 | Inveniam Capital Partners, Inc. | Load balancing in blockchain environments |
US11580535B2 (en) | 2018-05-18 | 2023-02-14 | Inveniam Capital Partners, Inc. | Recordation of device usage to public/private blockchains |
US11477271B2 (en) | 2018-05-18 | 2022-10-18 | Inveniam Capital Partners, Inc. | Load balancing in blockchain environments |
US10783164B2 (en) | 2018-05-18 | 2020-09-22 | Factom, Inc. | Import and export in blockchain environments |
US11347769B2 (en) | 2018-05-18 | 2022-05-31 | Inveniam Capital Partners, Inc. | Import and export in blockchain environments |
US11042871B2 (en) | 2018-08-06 | 2021-06-22 | Factom, Inc. | Smart contracts in blockchain environments |
US11587069B2 (en) | 2018-08-06 | 2023-02-21 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11348097B2 (en) | 2018-08-06 | 2022-05-31 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11989208B2 (en) | 2018-08-06 | 2024-05-21 | Inveniam Capital Partners, Inc. | Transactional sharding of blockchain transactions |
US11044095B2 (en) | 2018-08-06 | 2021-06-22 | Factom, Inc. | Debt recordation to blockchains |
US11334874B2 (en) | 2018-08-06 | 2022-05-17 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11328290B2 (en) | 2018-08-06 | 2022-05-10 | Inveniam Capital Partners, Inc. | Stable cryptocurrency coinage |
US11531981B2 (en) | 2018-08-06 | 2022-12-20 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11295296B2 (en) | 2018-08-06 | 2022-04-05 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11276056B2 (en) | 2018-08-06 | 2022-03-15 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11205172B2 (en) | 2018-08-06 | 2021-12-21 | Inveniam Capital Partners, Inc. | Factom protocol in blockchain environments |
US11348098B2 (en) | 2018-08-06 | 2022-05-31 | Inveniam Capital Partners, Inc. | Decisional architectures in blockchain environments |
US11615398B2 (en) | 2018-08-06 | 2023-03-28 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11620642B2 (en) | 2018-08-06 | 2023-04-04 | Inveniam Capital Partners, Inc. | Digital contracts in blockchain environments |
US11676132B2 (en) | 2018-08-06 | 2023-06-13 | Inveniam Capital Partners, Inc. | Smart contracts in blockchain environments |
US11687916B2 (en) | 2018-08-06 | 2023-06-27 | Inveniam Capital Partners, Inc. | Decisional architectures in blockchain environments |
US11164250B2 (en) | 2018-08-06 | 2021-11-02 | Inveniam Capital Partners, Inc. | Stable cryptocurrency coinage |
US11863305B2 (en) | 2020-01-17 | 2024-01-02 | Inveniam Capital Partners, Inc. | RAM hashing in blockchain environments |
US11343075B2 (en) | 2020-01-17 | 2022-05-24 | Inveniam Capital Partners, Inc. | RAM hashing in blockchain environments |
US11943334B2 (en) | 2020-01-17 | 2024-03-26 | Inveniam Capital Partners, Inc. | Separating hashing from proof-of-work in blockchain environments |
US11444749B2 (en) | 2020-01-17 | 2022-09-13 | Inveniam Capital Partners, Inc. | Separating hashing from proof-of-work in blockchain environments |
Also Published As
Publication number | Publication date |
---|---|
WO2007069176A3 (en) | 2007-10-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2007069176A2 (en) | Method for the detection of a use of a camera unit in a mobile device | |
CN104869243B (en) | A kind of anti-theft tracking of mobile phone system and method | |
US7257374B1 (en) | Automatic security locking method and system for wireless-enabled devices | |
RU2626659C1 (en) | Method and equipment for device control | |
WO2010078114A1 (en) | System and method for identifying and locating wireless devices that are being operated by unauthorized users | |
US9239772B2 (en) | Detecting true battery removal from a host device by comparing a voltage level on a communication line with a threshold voltage level | |
US20080184345A1 (en) | Method of Detecting and Authenticating Connection Target for Wireless Communication Apparatus | |
KR20160020394A (en) | Network connection method and device | |
CN104332012A (en) | Anti-theft method and device of terminal device | |
CN103365554A (en) | Mobile terminal and unlocking operation processing method | |
KR102166709B1 (en) | Data based control system and method | |
CN104601204B (en) | trigger condition detection method and device | |
CN105657662A (en) | Locating information sharing method and locating information sharing device | |
JP2005151392A (en) | Mobile communication terminal equipped with missing/illegal use preventing function | |
US9002273B2 (en) | Apparatus and process for detection of a bluetooth device | |
CN108401507B (en) | MDT (minimization drive test) measuring method and device | |
KR101013614B1 (en) | Mobile terminal and its function limit apparatus and method | |
JP2003101640A (en) | Portable terminal | |
JP2010086373A (en) | Security system | |
JP2008003992A (en) | Portable communication system | |
JP2004021847A (en) | System for monitoring position | |
US20070298759A1 (en) | Alarm device for mobile phone | |
JP4210512B2 (en) | Alarm system, portable alarm device, alarm method | |
KR20040020675A (en) | Location Tracking Apparatus and Method Using GPS and Bluetooth Interworking System | |
CN107437323A (en) | Radio communication device and its corresponding method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06832190 Country of ref document: EP Kind code of ref document: A2 |