WO2012019645A1 - Loss and theft protection for mobile devices using a wireless link to a wearable accessory - Google Patents

Loss and theft protection for mobile devices using a wireless link to a wearable accessory Download PDF

Info

Publication number
WO2012019645A1
WO2012019645A1 PCT/EP2010/061698 EP2010061698W WO2012019645A1 WO 2012019645 A1 WO2012019645 A1 WO 2012019645A1 EP 2010061698 W EP2010061698 W EP 2010061698W WO 2012019645 A1 WO2012019645 A1 WO 2012019645A1
Authority
WO
WIPO (PCT)
Prior art keywords
software
forgetmenot
devices
algorithm
mobile devices
Prior art date
Application number
PCT/EP2010/061698
Other languages
French (fr)
Inventor
Sotirios Melioumis
Original Assignee
Sotirios Melioumis
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sotirios Melioumis filed Critical Sotirios Melioumis
Priority to PCT/EP2010/061698 priority Critical patent/WO2012019645A1/en
Publication of WO2012019645A1 publication Critical patent/WO2012019645A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Definitions

  • ForgetMeNot ® software algorithms and method are based on the premise that when an established wireless bond or link between;
  • an automated device locking will occur preventing access to the device data while simultaneously a protection software-based-mechanism will be erected preventing data tampering and b. alarms can be generated to alert both the user and a remote monitoring centre of the fact which allows for corrective measures to be taken.
  • the alarms mentioned above can be expressed by audio, visual and sensory means or a combination of the above for the user and with a SMS or email to the remote monitoring centre.
  • Bluetooth or radio frequency, or sound or light or a mix match of them
  • links that can be created depend on the working practices or the life style of the user or both. These links can be created using the ForgetMeNot ® software and method between;
  • the capability of the tampering-proof software mechanism can include but not limited to :
  • a secure password defensive mechanism that utilises release keys based on audio(voice), radio frequency, fingerprint identification, light, the traditional text input interface or a combination of the above which additionally is on-off as well rebooting proof
  • the types of alarms that can be generated can be distance configurable, be initiated by the device, the secondary device, a third device or a combination of the above and can take the form of audio, visual, radio or mechanical (e.g. vibration) signals to the user or a combination of the above as well as an event reporting mechanism through the wireless means to a remote monitoring centre in the form of text, e-mail, multimedia file or any other type of transmission supported by the participating in the linked group devices.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

ForgetMeNot ® comprises of software, algorithms and a method bonding or pairing mobile devices with various other electronic devices equipped with wireless access mechanisms. It utilises either Bluetooth, or different radio frequencies (e.g. Wi-Fi), or sound or light or a mix match of them as the transmission medium and all related protocols to create wireless links between them. This wireless link in its turn is utilised to safeguard the target device and its data content from accidental loss, theft, or malicious intent from third parties or any combination of the above acts. The software element is installed either on the to-be-protected mobile device or the linked devices or both. The algorithm and the method are used to cover all eventualities and all possible link combinations.

Description

LOSS AND THEFT PROTECTION FOR MOBILE DEVICES USING A WIRELESS LINK TO A WEARABLE ACCESSORY
Description
ForgetMeNot ® software, algorithms and method are based on the premise that when an established wireless bond or link between;
a) a permanently or temporarily attached to the user's body or carried by the user, accessory or electronic garment or other electronic device and
b) the to-be-protected mobile devices
is severed without the user conscious decision or intention then, a. an automated device locking will occur preventing access to the device data while simultaneously a protection software-based-mechanism will be erected preventing data tampering and b. alarms can be generated to alert both the user and a remote monitoring centre of the fact which allows for corrective measures to be taken.
The alarms mentioned above can be expressed by audio, visual and sensory means or a combination of the above for the user and with a SMS or email to the remote monitoring centre.
More specifically the type of links that can be created is through
Bluetooth, or radio frequency, or sound or light or a mix match of them
The combinations of links that can be created depend on the working practices or the life style of the user or both. These links can be created using the ForgetMeNot ® software and method between;
Laptop personal computers,
Mobile phones,
Digital audio or video players
Personal Digital Assistance devices
Wireless Reading Devices
Stand alone or wireless hand-held game consoles
Digital cameras
Digital recorders
Any other wireless device enabled with a USB port, a WiFi circuit or light based communications
Bluetooth or other radio frequency enabled headsets,
Bluetooth or other radio frequency enabled garments,
Bluetooth or any other radio enabled accessories,
Radio frequency identification devices,
Light communication detectors
In all possible combinations (see drawing 1)
The capability of the tampering-proof software mechanism can include but not limited to :
A secure password defensive mechanism that utilises release keys based on audio(voice), radio frequency, fingerprint identification, light, the traditional text input interface or a combination of the above which additionally is on-off as well rebooting proof
A software and algorithm preventing data access after a SIM card change with the action causing all data to be permanently and irretrievably erased A software and algorithm preventing data access after connecting wirelessly or physically with another device with the action causing all data to be permanently and irretrievably erased
A software and algorithm preventing data access when an external direct link to the device's electronic memory is attempted with the action causing all data to be permanently and irretrievably erased
The types of alarms that can be generated can be distance configurable, be initiated by the device, the secondary device, a third device or a combination of the above and can take the form of audio, visual, radio or mechanical (e.g. vibration) signals to the user or a combination of the above as well as an event reporting mechanism through the wireless means to a remote monitoring centre in the form of text, e-mail, multimedia file or any other type of transmission supported by the participating in the linked group devices.

Claims

Claims I CLAIM :
1. The use of the ForgetMeNot ® algorithm and software generated, purpose created wireless connection between a to-be-protected mobile device and other mobile devices or radio frequency identifiers including the so called accessories like wireless headsets etc., as the trigger mechanism for a security lock down which has the purpose to protect the data already in the to-be-protected device against accidental loss or theft or any other malicious act
2. The use of ForgetMeNot ® algorithm and software in establishing a permanent event-triggered, remote-monitoring service of the to-be- protected device or devices
3. The use of ForgetMeNot ® software and algorithms in automatically and without human intervention protection against any types of tamper or access of the data of locked down devices with simultaneous automated reporting of the event.
4. The ForgetMeNot ® algorithm and software to protect the content of one or more mobile devices based on the use of another or more devices by means of wireless connection.
5. The utilisation of Bluetooth headsets from ForgetMeNot ® software and from its underlying algorithm in a way that monitors their behaviour / presence to trigger actions or as alarm generation and separation control devices, while allowing them to maintaining all other basic functions and attributes including audio streaming at the same time.
PCT/EP2010/061698 2010-08-11 2010-08-11 Loss and theft protection for mobile devices using a wireless link to a wearable accessory WO2012019645A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/EP2010/061698 WO2012019645A1 (en) 2010-08-11 2010-08-11 Loss and theft protection for mobile devices using a wireless link to a wearable accessory

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2010/061698 WO2012019645A1 (en) 2010-08-11 2010-08-11 Loss and theft protection for mobile devices using a wireless link to a wearable accessory

Publications (1)

Publication Number Publication Date
WO2012019645A1 true WO2012019645A1 (en) 2012-02-16

Family

ID=43566759

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2010/061698 WO2012019645A1 (en) 2010-08-11 2010-08-11 Loss and theft protection for mobile devices using a wireless link to a wearable accessory

Country Status (1)

Country Link
WO (1) WO2012019645A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2645297A1 (en) * 2012-03-29 2013-10-02 Sony Computer Entertainment America LLC Securing mobile devices
US9026083B2 (en) 2012-03-29 2015-05-05 Sony Computer Entertainment America Llc Method for determining mobile device password settings based on acceleration information
US9042865B2 (en) 2012-03-29 2015-05-26 Sony Computer Entertainment America Llc Method for determining mobile device password settings based on check-in information
US9049598B2 (en) 2012-03-29 2015-06-02 Sony Computer Entertainment America Llc Method for determining mobile device password settings based on wireless signals
US9811987B2 (en) 2015-10-01 2017-11-07 International Business Machines Corporation Detecting object theft using smart textiles
US10296768B2 (en) 2016-05-18 2019-05-21 International Business Machines Corporation Tracking objects in a two dimensional space

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006019340A1 (en) * 2004-08-20 2006-02-23 Telefonaktiebolaget Lm Ericsson (Publ) Wireless lock
WO2007107749A1 (en) * 2006-03-22 2007-09-27 Shahood Ahmed Apparatus and method for determining location and disabling of a mobile terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006019340A1 (en) * 2004-08-20 2006-02-23 Telefonaktiebolaget Lm Ericsson (Publ) Wireless lock
WO2007107749A1 (en) * 2006-03-22 2007-09-27 Shahood Ahmed Apparatus and method for determining location and disabling of a mobile terminal

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2645297A1 (en) * 2012-03-29 2013-10-02 Sony Computer Entertainment America LLC Securing mobile devices
US9026083B2 (en) 2012-03-29 2015-05-05 Sony Computer Entertainment America Llc Method for determining mobile device password settings based on acceleration information
US9042865B2 (en) 2012-03-29 2015-05-26 Sony Computer Entertainment America Llc Method for determining mobile device password settings based on check-in information
US9049598B2 (en) 2012-03-29 2015-06-02 Sony Computer Entertainment America Llc Method for determining mobile device password settings based on wireless signals
US9811987B2 (en) 2015-10-01 2017-11-07 International Business Machines Corporation Detecting object theft using smart textiles
US10296768B2 (en) 2016-05-18 2019-05-21 International Business Machines Corporation Tracking objects in a two dimensional space
US10832017B2 (en) 2016-05-18 2020-11-10 International Business Machines Corporation Tracking objects in a two dimensional space

Similar Documents

Publication Publication Date Title
US8467770B1 (en) System for securing a mobile terminal
KR101386438B1 (en) Smartphone that works with USB memory device
US8924708B2 (en) Security switch
US8115609B2 (en) Multi function bluetooth apparatus
US8750797B2 (en) Proximity access and alarm apparatus
TWI525472B (en) Always-available embedded theft reaction subsystem
US20130225127A1 (en) Proximity tag
WO2012019645A1 (en) Loss and theft protection for mobile devices using a wireless link to a wearable accessory
US20130298208A1 (en) System for mobile security
US20080178282A1 (en) Security Switch
TWI384855B (en) Anti-theft system of a mobile device
TWI464617B (en) Always-available embedded theft reaction subsystem
CN103488932A (en) Desktop security intercommunication system for mobile device and personal computer and implementation method thereof
TW201346639A (en) Always-available embedded theft reaction subsystem
CN103442121A (en) Anti-theft mobile phone and achieving method of anti-theft mobile phone
JP2010213152A (en) Portable electronic device and program
CN105761455A (en) Device and method for preventing mobile phone from being lost
CN200987166Y (en) Device with antiloss and information protecting function
US9521552B2 (en) Method and apparatus to use smart phones to securely and conveniently monitor intel pcs remotely
EP3139564B1 (en) Encryption coding module
KR101390704B1 (en) Usb memory safety management system using smartphones
KR200483108Y1 (en) System for preventing loss of mobile phone
WO2016177201A1 (en) Method, terminal and wearable device for controlling privacy data
CN106506836A (en) Preventing mobile phone is from mistake control method, Wearable anti-loss device of mobile phone and mobile phone
CN104038932B (en) A kind of safety equipment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10755115

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10755115

Country of ref document: EP

Kind code of ref document: A1