WO2007132352A2 - Appareil de localisation intelligent et procédés associés - Google Patents

Appareil de localisation intelligent et procédés associés Download PDF

Info

Publication number
WO2007132352A2
WO2007132352A2 PCT/IB2007/001710 IB2007001710W WO2007132352A2 WO 2007132352 A2 WO2007132352 A2 WO 2007132352A2 IB 2007001710 W IB2007001710 W IB 2007001710W WO 2007132352 A2 WO2007132352 A2 WO 2007132352A2
Authority
WO
WIPO (PCT)
Prior art keywords
information
owner
financial
lost
user
Prior art date
Application number
PCT/IB2007/001710
Other languages
English (en)
Other versions
WO2007132352A8 (fr
Inventor
Josephine Suk Ying Lai
Original Assignee
Josephine Suk Ying Lai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Josephine Suk Ying Lai filed Critical Josephine Suk Ying Lai
Publication of WO2007132352A2 publication Critical patent/WO2007132352A2/fr
Publication of WO2007132352A8 publication Critical patent/WO2007132352A8/fr

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Definitions

  • a mobile device like any commodity, can be lost, stolen or misplaced. However, due to the cost and type of information stored on the device, it is desirable to recover such devices when they are lost.
  • the first part of the service allow user to locate their device(s) through the system.
  • the second part of the service provides a channel for the user to retrieve the device if it is found and returned by anyone.
  • a registered user (“the user") registered his/her device in the system.
  • the device will periodically update the system its latest location through all possible channel (internet, wireless network, SMS, and etc).
  • the system will keep a record of this location.
  • the user may locate the approximate location of the registered device(s) through the system using AGPS. If the device is not reachable at the request time, a message from the system will describe the situation to the user and the last recorded device location will be return to the user together with the timestamp of this last record.
  • the sticker contains a unique identification number that allow the system to identify the owner.
  • the owner might use a message shown on the device display instead of the sticker. This message contains the unique identification and the return instruction.
  • someone finds the device he/she will have several options to return the device to the owner:
  • the person that finds the device can return the device to one of the depot.
  • the depot will locate the owner's information based on the unique identification number.
  • the depot will notify the owner using the information stored in the system and either send the device back to the owner or arrange a local pick up by the owner.
  • the person that finds the device and based on the information shown on the display may contact the owner directly.
  • Figure 1 Block diagram of a typical communication system for tracking and locating mobile device.
  • FIG. 1 is a block diagram of an exemplary embodiment of a tracking and locating system.
  • the system comprises a three-tier information system.
  • the three-tier information system may comprise a database server(s), an
  • the terminal workstation (10) may be, for example, a mobile computing device, which could be but is not limited to a personal digital assistant (PDA), a laptop computer, or a smart phone.
  • the system may contain at least one application server.
  • Each application server comprises core and business logic of the communication system, include database management.
  • the application server (13) processes what is input by users, and returns results of processing to users.
  • the database server controls processing of data stored in a database located in the database server (13). Such processing includes, for example, reading, writing, deleting, modifying, and backup.
  • a communication tower or satellite (11) provides a communication path (21) to each mobile computing device.
  • the mobile computing device communicates with the communication tower or satellite.
  • the communication tower or satellite (11) is also connected to the application servers (13) through a communication path (22).
  • the communication path (22) may be either private or public.
  • the communication path may or may not be wireless; that is, employ wireless communication.
  • Each application server (13) is coupled to a local area network (LAN),
  • the LAN provides access to the Internet for the application servers and the computing devices.
  • the mobile device therefore also has access to the Internet via the LAN, to any of the application servers, thru the communication path 21, and to the communication path 22.
  • a user profile can be obtained from the above system, or by any method the user
  • the communication path 23 may be either private or public.
  • the communication path may or may not be wireless; that is, employ wireless communication.
  • System (13) and third party (14) communicate through a communication path 24.
  • the communication path (24) may be either private or public.
  • the communication path may or may not be wireless; that is, employ wireless communication.
  • the disclosed system Upon the user's request, the disclosed system will attempt to locate the mobile computing device.
  • the system may use a single technology, or one or more technologies in combination to locate the device.
  • One example of a useful technology for this purpose is the Assisted Global Positioning System (AGPS).
  • AGPS Assisted Global Positioning System
  • This system will search for the mobile computing device using GPS technologies and map the approximate location.
  • the mobile's location information will be send to the user to help track down the device.
  • the information can be presented as, but is not limited to, a web page, a text message, email, or audio description, etc.
  • Another technology that can be used for location of the device is the cellular network, in the case of devices that already incorporate telephones, or that have a cellular transceiver installed for the purpose of assisting in locating the device.
  • the location of the device can be determined within a fairly small area through the cellular system. Either of these locating methods, a combination of methods, or a variety of other methods, can be
  • a retriever returning system is also provided.
  • This system may be targeted to all physically present devices, which can include but not limited to mobile computing device.
  • a human readable instruction and unique ID is embedded on the device. This can be either a sticker-type label with instruction and a unique ID printed on it, or a message displayed on the device screen, or instructions and unique ID printed on the device during manufacturing that can be used to correspond with the registered owner.
  • a person retrieving the device can follow the printed instructions and return the device to the system service center through different methods, included but not limited to drop box or courier pickup. Based on the unique ID on the device label, the system service center will retrieve the rightful owner's contact from the user profile system. The system will contact and notify the owner that the lost device was found.
  • the current invention is the answer for a need for improved notification methods and procedures for notifying issuers of banking or identification information registered on mobile devices.
  • the registered user (“the user") adds a new card profile to the mobile device by manually entering the information, or through a card reader, or wirelessly transmits the information.
  • the information can be a credit card, banking card, driver's license, rewards cards, etc.
  • the profile may include the following: name of the person associated with the card, the card identification code and/or contact information such as email or telephone number.
  • This information is then encrypted and synchronized with the company's sync server ("the company” refers to the company managing the device information system).
  • a server is setup to receive the notification whenever the user loses his/her mobile device containing the card information.
  • the card companies' server can be an email server, voice server, etc.
  • This system can, after receiving the information, notify the card companies' operators about the missing status and to take immediate action to suspend the account.
  • This system can also be connected to the card companies' main database system and trigger a suspend command to the account on their system when it receives the missing status signal.
  • Figure 1 Block diagram of a typical communication system for loss reporting
  • Figure 2 Flowchart for user login verification
  • Figure 3 Flowchart for retrieving profile information from main system and report lost status to the third party.
  • FIG. 1 is a block diagram of an exemplary embodiment of a loss reporting system.
  • the system comprises a three-tier information system.
  • the three-tier information system comprises a database server(s) and an application server(s) (13).
  • the system may contain at least one application server.
  • Each application server comprises core and business logic of the communication system, including database management.
  • the application server (13) processes what is input by users, and returns results of processing to users.
  • the database server controls processing of data stored in a database located in the database server (13). Such processing may include, for example, reading, writing, deleting, modifying, and backup.
  • Software applications utilized in conjunction with this invention can easily be programmed by anyone commonly skilled in the art.
  • a user profile can be obtained from the above system, or by any method the user utilizes to import the information to the main system. This can include, but is not limited to, a web user interface.
  • User (12) and system (13) communicate through a communication path 23.
  • the communication path (23) may be either private or public.
  • the communication path may or may not be wireless; that is, employ wireless communication.
  • System (13) and third party (14) communicate through a communication path 24.
  • the communication path (24) may be either private or public.
  • the communication path may or may not be wireless; that is, employ wireless communication.
  • Figure 2 is a flow chart showing an exemplary embodiment of a method for authorizing a user to access an application.
  • the server retrieves the user profile based on the device LD. (i.e. phone number, network interface card MAC address, ESN). A user profile may then be retrieved.
  • the system uses a defined security question to verify the user's identity. Upon providing a correct answer to this question, the user will be granted access to the main system. For users that cannot provide a correct answer, the system will not grant access right to the user and disconnects the current connection with user.
  • Figure 3 is a flow chart showing an exemplary embodiment of a process for users
  • the server retrieves the user's profile based on the user's provided unique device ID (i.e.
  • the system When a user profile is retrieved, the system will go through the stored information within the profile. For each registered piece of information (e.g. Credit card, bank card, Social security number) that has been lost, if desired, the system may then contact the appropriate third party organization based on the information supplied. The system will send a predefined command to the third party organization. The third party organization will implement the received command. A command executed status may be sent, if desired, by the third party after the command is processed. In an embodiment, the system will repeat the steps until all the registered information under the user' s profile has been processed.
  • the system will go through the stored information within the profile. For each registered piece of information (e.g. Credit card, bank card, Social security number) that has been lost, if desired, the system may then contact the appropriate third party organization based on the information supplied. The system will send a predefined command to the third party organization. The third party organization will implement the received command. A command executed status may be sent, if desired, by the third party after the command is processed. In an embodiment

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un système et un procédé permettant de localiser et de récupérer des dispositifs mobiles enregistrés perdus ou volés. Dans un mode de réalisation cité à titre d'exemple, après que les utilisateurs ont enregistré le dispositif mobile auprès d'un opérateur, l'identité du dispositif est stockées dans la base de données de l'opérateur. Lorsqu'un utilisateur ne parvient pas à localiser son dispositif mobile, il peut contacter l'opérateur au sujet de la perte ou du vol du dispositif mobile enregistré. L'opérateur entame alors une séquence de recherche. Cette séquence de recherche peut comprendre une ou plusieurs méthodes. Deux des méthodes de recherche pouvant être utilisées seules ou ensemble comprennent un releveur de coordonnées de type "GPS" ou un releveur de coordonnées de type "réseau cellulaire". L'emplacement du dispositif mobile peut être affiché graphiquement sur une page Web avec des indications cartographiques ou communiqué par téléphone ou tout autre moyen de communication, tel que le courriel électronique, un service d'envoi de messages courts, etc. En outre, l'utilisateur peut étiqueter le dispositif mobile à l'aide de messages indiquant comment retourner le dispositif mobile lorsqu'il est retrouvé.
PCT/IB2007/001710 2006-01-24 2007-01-18 Appareil de localisation intelligent et procédés associés WO2007132352A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US76135006P 2006-01-24 2006-01-24
US60/761,350 2006-01-24

Publications (2)

Publication Number Publication Date
WO2007132352A2 true WO2007132352A2 (fr) 2007-11-22
WO2007132352A8 WO2007132352A8 (fr) 2008-05-15

Family

ID=38694280

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2007/001710 WO2007132352A2 (fr) 2006-01-24 2007-01-18 Appareil de localisation intelligent et procédés associés

Country Status (1)

Country Link
WO (1) WO2007132352A2 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011100464A1 (fr) * 2010-02-11 2011-08-18 Amazon Technologies, Inc. Protection de dispositifs contre un endommagement par choc

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011100464A1 (fr) * 2010-02-11 2011-08-18 Amazon Technologies, Inc. Protection de dispositifs contre un endommagement par choc
US8330305B2 (en) 2010-02-11 2012-12-11 Amazon Technologies, Inc. Protecting devices from impact damage
CN102939571A (zh) * 2010-02-11 2013-02-20 亚马逊技术股份有限公司 保护设备免受撞击损坏
US9706028B1 (en) 2010-02-11 2017-07-11 Amazon Technologies, Inc. Protecting devices from impact damage

Also Published As

Publication number Publication date
WO2007132352A8 (fr) 2008-05-15

Similar Documents

Publication Publication Date Title
US10111039B1 (en) Determining the last location of lost and stolen portable electronic devices when wireless communications access to the lost or stolen devices is lost or intermittent
US8280359B2 (en) Methods of authorizing actions
US8225380B2 (en) Methods to authenticate access and alarm as to proximity to location
CA2650852C (fr) Systeme mobile et securise de gestion d'informations et procede associe
US9848081B2 (en) Dissemination of real estate information through text messaging
US8483962B2 (en) Method for providing route information and the system thereof
US20080109370A1 (en) Extraction of information from e-mails and delivery to mobile phones, system and method
JP2004064763A (ja) 座標ウェイポイントにおいてメッセージにアクセスし記録するシステム及び方法
JP2002199423A (ja) 座標ウェイポイントでメッセージにアクセスして記録するシステム及び方法
CN103581441B (zh) 移动终端追踪防盗系统和方法
GB2516154A (en) Communication tag, system and method
CN101727646A (zh) 网络银行报警系统及方法
JP2009157893A (ja) 携帯電話とicタグを使用した警備員巡回管理システム
US11756084B2 (en) Proximity based mechanisms for customer-service interaction feedback
CN101124563A (zh) 用于会话提供的系统及方法
JP2004252964A (ja) ロケーション証明システム
WO2016107274A1 (fr) Procédé et dispositif d'étiquetage de numéro de téléphone
WO2007132352A2 (fr) Appareil de localisation intelligent et procédés associés
CN101807313A (zh) 一种发送考勤数据的方法及装置
JP2008102656A (ja) 安否情報確認システム
KR20150030811A (ko) 원산지 인증 및 구매 방법
JP2005332219A (ja) 固定資産管理方法
US11604770B2 (en) Methods and systems for secure product tracking data storage and verification
US11783337B2 (en) Mobile application-based error reporting
US11244127B1 (en) Mobile application-based error response

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07734891

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07734891

Country of ref document: EP

Kind code of ref document: A2