WO2012019645A1 - Loss and theft protection for mobile devices using a wireless link to a wearable accessory - Google Patents
Loss and theft protection for mobile devices using a wireless link to a wearable accessory Download PDFInfo
- Publication number
- WO2012019645A1 WO2012019645A1 PCT/EP2010/061698 EP2010061698W WO2012019645A1 WO 2012019645 A1 WO2012019645 A1 WO 2012019645A1 EP 2010061698 W EP2010061698 W EP 2010061698W WO 2012019645 A1 WO2012019645 A1 WO 2012019645A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- software
- forgetmenot
- devices
- algorithm
- mobile devices
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Definitions
- ForgetMeNot ® software algorithms and method are based on the premise that when an established wireless bond or link between;
- an automated device locking will occur preventing access to the device data while simultaneously a protection software-based-mechanism will be erected preventing data tampering and b. alarms can be generated to alert both the user and a remote monitoring centre of the fact which allows for corrective measures to be taken.
- the alarms mentioned above can be expressed by audio, visual and sensory means or a combination of the above for the user and with a SMS or email to the remote monitoring centre.
- Bluetooth or radio frequency, or sound or light or a mix match of them
- links that can be created depend on the working practices or the life style of the user or both. These links can be created using the ForgetMeNot ® software and method between;
- the capability of the tampering-proof software mechanism can include but not limited to :
- a secure password defensive mechanism that utilises release keys based on audio(voice), radio frequency, fingerprint identification, light, the traditional text input interface or a combination of the above which additionally is on-off as well rebooting proof
- the types of alarms that can be generated can be distance configurable, be initiated by the device, the secondary device, a third device or a combination of the above and can take the form of audio, visual, radio or mechanical (e.g. vibration) signals to the user or a combination of the above as well as an event reporting mechanism through the wireless means to a remote monitoring centre in the form of text, e-mail, multimedia file or any other type of transmission supported by the participating in the linked group devices.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
ForgetMeNot ® comprises of software, algorithms and a method bonding or pairing mobile devices with various other electronic devices equipped with wireless access mechanisms. It utilises either Bluetooth, or different radio frequencies (e.g. Wi-Fi), or sound or light or a mix match of them as the transmission medium and all related protocols to create wireless links between them. This wireless link in its turn is utilised to safeguard the target device and its data content from accidental loss, theft, or malicious intent from third parties or any combination of the above acts. The software element is installed either on the to-be-protected mobile device or the linked devices or both. The algorithm and the method are used to cover all eventualities and all possible link combinations.
Description
LOSS AND THEFT PROTECTION FOR MOBILE DEVICES USING A WIRELESS LINK TO A WEARABLE ACCESSORY
Description
ForgetMeNot ® software, algorithms and method are based on the premise that when an established wireless bond or link between;
a) a permanently or temporarily attached to the user's body or carried by the user, accessory or electronic garment or other electronic device and
b) the to-be-protected mobile devices
is severed without the user conscious decision or intention then, a. an automated device locking will occur preventing access to the device data while simultaneously a protection software-based-mechanism will be erected preventing data tampering and b. alarms can be generated to alert both the user and a remote monitoring centre of the fact which allows for corrective measures to be taken.
The alarms mentioned above can be expressed by audio, visual and sensory means or a combination of the above for the user and with a SMS or email to the remote monitoring centre.
More specifically the type of links that can be created is through
Bluetooth, or radio frequency, or sound or light or a mix match of them
The combinations of links that can be created depend on the working practices or the life style of the user or both. These links can be created using the ForgetMeNot ® software and method between;
■ Laptop personal computers,
■ Mobile phones,
■ Digital audio or video players
■ Personal Digital Assistance devices
■ Wireless Reading Devices
■ Stand alone or wireless hand-held game consoles
■ Digital cameras
■ Digital recorders
■ Any other wireless device enabled with a USB port, a WiFi circuit or light based communications
■ Bluetooth or other radio frequency enabled headsets,
■ Bluetooth or other radio frequency enabled garments,
■ Bluetooth or any other radio enabled accessories,
■ Radio frequency identification devices,
■ Light communication detectors
In all possible combinations (see drawing 1)
The capability of the tampering-proof software mechanism can include but not limited to :
■ A secure password defensive mechanism that utilises release keys based on audio(voice), radio frequency, fingerprint identification, light, the traditional text input interface or a combination of the above which additionally is on-off as well rebooting proof
■ A software and algorithm preventing data access after a SIM card change with the action causing all data to be permanently and irretrievably erased
■ A software and algorithm preventing data access after connecting wirelessly or physically with another device with the action causing all data to be permanently and irretrievably erased
■ A software and algorithm preventing data access when an external direct link to the device's electronic memory is attempted with the action causing all data to be permanently and irretrievably erased
The types of alarms that can be generated can be distance configurable, be initiated by the device, the secondary device, a third device or a combination of the above and can take the form of audio, visual, radio or mechanical (e.g. vibration) signals to the user or a combination of the above as well as an event reporting mechanism through the wireless means to a remote monitoring centre in the form of text, e-mail, multimedia file or any other type of transmission supported by the participating in the linked group devices.
Claims
1. The use of the ForgetMeNot ® algorithm and software generated, purpose created wireless connection between a to-be-protected mobile device and other mobile devices or radio frequency identifiers including the so called accessories like wireless headsets etc., as the trigger mechanism for a security lock down which has the purpose to protect the data already in the to-be-protected device against accidental loss or theft or any other malicious act
2. The use of ForgetMeNot ® algorithm and software in establishing a permanent event-triggered, remote-monitoring service of the to-be- protected device or devices
3. The use of ForgetMeNot ® software and algorithms in automatically and without human intervention protection against any types of tamper or access of the data of locked down devices with simultaneous automated reporting of the event.
4. The ForgetMeNot ® algorithm and software to protect the content of one or more mobile devices based on the use of another or more devices by means of wireless connection.
5. The utilisation of Bluetooth headsets from ForgetMeNot ® software and from its underlying algorithm in a way that monitors their behaviour / presence to trigger actions or as alarm generation and separation control devices, while allowing them to maintaining all other basic functions and attributes including audio streaming at the same time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2010/061698 WO2012019645A1 (en) | 2010-08-11 | 2010-08-11 | Loss and theft protection for mobile devices using a wireless link to a wearable accessory |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2010/061698 WO2012019645A1 (en) | 2010-08-11 | 2010-08-11 | Loss and theft protection for mobile devices using a wireless link to a wearable accessory |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012019645A1 true WO2012019645A1 (en) | 2012-02-16 |
Family
ID=43566759
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2010/061698 WO2012019645A1 (en) | 2010-08-11 | 2010-08-11 | Loss and theft protection for mobile devices using a wireless link to a wearable accessory |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2012019645A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2645297A1 (en) * | 2012-03-29 | 2013-10-02 | Sony Computer Entertainment America LLC | Securing mobile devices |
US9026083B2 (en) | 2012-03-29 | 2015-05-05 | Sony Computer Entertainment America Llc | Method for determining mobile device password settings based on acceleration information |
US9042865B2 (en) | 2012-03-29 | 2015-05-26 | Sony Computer Entertainment America Llc | Method for determining mobile device password settings based on check-in information |
US9049598B2 (en) | 2012-03-29 | 2015-06-02 | Sony Computer Entertainment America Llc | Method for determining mobile device password settings based on wireless signals |
US9811987B2 (en) | 2015-10-01 | 2017-11-07 | International Business Machines Corporation | Detecting object theft using smart textiles |
US10296768B2 (en) | 2016-05-18 | 2019-05-21 | International Business Machines Corporation | Tracking objects in a two dimensional space |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006019340A1 (en) * | 2004-08-20 | 2006-02-23 | Telefonaktiebolaget Lm Ericsson (Publ) | Wireless lock |
WO2007107749A1 (en) * | 2006-03-22 | 2007-09-27 | Shahood Ahmed | Apparatus and method for determining location and disabling of a mobile terminal |
-
2010
- 2010-08-11 WO PCT/EP2010/061698 patent/WO2012019645A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006019340A1 (en) * | 2004-08-20 | 2006-02-23 | Telefonaktiebolaget Lm Ericsson (Publ) | Wireless lock |
WO2007107749A1 (en) * | 2006-03-22 | 2007-09-27 | Shahood Ahmed | Apparatus and method for determining location and disabling of a mobile terminal |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2645297A1 (en) * | 2012-03-29 | 2013-10-02 | Sony Computer Entertainment America LLC | Securing mobile devices |
US9026083B2 (en) | 2012-03-29 | 2015-05-05 | Sony Computer Entertainment America Llc | Method for determining mobile device password settings based on acceleration information |
US9042865B2 (en) | 2012-03-29 | 2015-05-26 | Sony Computer Entertainment America Llc | Method for determining mobile device password settings based on check-in information |
US9049598B2 (en) | 2012-03-29 | 2015-06-02 | Sony Computer Entertainment America Llc | Method for determining mobile device password settings based on wireless signals |
US9811987B2 (en) | 2015-10-01 | 2017-11-07 | International Business Machines Corporation | Detecting object theft using smart textiles |
US10296768B2 (en) | 2016-05-18 | 2019-05-21 | International Business Machines Corporation | Tracking objects in a two dimensional space |
US10832017B2 (en) | 2016-05-18 | 2020-11-10 | International Business Machines Corporation | Tracking objects in a two dimensional space |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8467770B1 (en) | System for securing a mobile terminal | |
KR101386438B1 (en) | Smartphone that works with USB memory device | |
US8924708B2 (en) | Security switch | |
US8115609B2 (en) | Multi function bluetooth apparatus | |
US8750797B2 (en) | Proximity access and alarm apparatus | |
TWI525472B (en) | Always-available embedded theft reaction subsystem | |
US20130225127A1 (en) | Proximity tag | |
WO2012019645A1 (en) | Loss and theft protection for mobile devices using a wireless link to a wearable accessory | |
US20130298208A1 (en) | System for mobile security | |
US20080178282A1 (en) | Security Switch | |
TWI384855B (en) | Anti-theft system of a mobile device | |
TWI464617B (en) | Always-available embedded theft reaction subsystem | |
CN103488932A (en) | Desktop security intercommunication system for mobile device and personal computer and implementation method thereof | |
TW201346639A (en) | Always-available embedded theft reaction subsystem | |
CN103442121A (en) | Anti-theft mobile phone and achieving method of anti-theft mobile phone | |
JP2010213152A (en) | Portable electronic device and program | |
CN105761455A (en) | Device and method for preventing mobile phone from being lost | |
CN200987166Y (en) | Device with antiloss and information protecting function | |
US9521552B2 (en) | Method and apparatus to use smart phones to securely and conveniently monitor intel pcs remotely | |
EP3139564B1 (en) | Encryption coding module | |
KR101390704B1 (en) | Usb memory safety management system using smartphones | |
KR200483108Y1 (en) | System for preventing loss of mobile phone | |
WO2016177201A1 (en) | Method, terminal and wearable device for controlling privacy data | |
CN106506836A (en) | Preventing mobile phone is from mistake control method, Wearable anti-loss device of mobile phone and mobile phone | |
CN104038932B (en) | A kind of safety equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10755115 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 10755115 Country of ref document: EP Kind code of ref document: A1 |