WO2017010895A1 - A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well - Google Patents

A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well Download PDF

Info

Publication number
WO2017010895A1
WO2017010895A1 PCT/PH2015/000010 PH2015000010W WO2017010895A1 WO 2017010895 A1 WO2017010895 A1 WO 2017010895A1 PH 2015000010 W PH2015000010 W PH 2015000010W WO 2017010895 A1 WO2017010895 A1 WO 2017010895A1
Authority
WO
WIPO (PCT)
Prior art keywords
theft
mobile device
phone
sim
apprehension
Prior art date
Application number
PCT/PH2015/000010
Other languages
French (fr)
Inventor
Rodolfo Noel I. LOZADA, Jr.
Original Assignee
Lozada Rodolfo Noel I Jr
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lozada Rodolfo Noel I Jr filed Critical Lozada Rodolfo Noel I Jr
Priority to PCT/PH2015/000010 priority Critical patent/WO2017010895A1/en
Publication of WO2017010895A1 publication Critical patent/WO2017010895A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/082Access security using revocation of authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent

Definitions

  • NTC National Security Commission
  • Another object of this invention is to provide for a theft
  • apprehension and recovery application is to provide for an anti-theft application that is compatible with the Android Operating Systems, windows, iOS including other upcoming commercial mobile platforms such as Tisen. It transmits via the GSM (Global System for Mobile communications or Group Special Mobile) , 3G (Third Generation) and 4G (Fourth Generation) standards.
  • GSM Global System for Mobile communications or Group Special Mobile
  • 3G Third Generation
  • 4G Fullth Generation
  • TARA Firmware TARA, which is embedded in devices at the chipset level; and TARA SOS (Save Our Smartphone) , the downloadable version.
  • Still another object of this invention is to provide for a theft apprehension and recovery application that also incorporates an emergency notification solution that enables phone users to send text messages to a pre-set secondary/emergency number using their phone's motion sensors. Unlike most other anti-fheff applications, this is supported by a Customer Service Center (TARA HOTLINE) that facilitates the use of available solutions. With a dedicated Call Center, it is able to give phone users fast, reliable and straightforward response in case their phones are stolen or misplaced.
  • TARA HOTLINE Customer Service Center
  • FIG. l is a perspective view of my invention of a theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well;
  • FIG. 2 is a flow diagram of steps for registration
  • FIG. 3 is a flow diagram of steps for the call center assistance
  • FIG. 4 is a flow diagram of steps for lock/unlock subject invention by the user.
  • FIG. 1 the my invention of a theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well generally designated as 10, which includes the TARA application 1 1 and the mobile device 12.
  • This application 1 1 includes Kill Switch 13, SIM Catch 14, locate phone 15, data wipe 16 and load wipe 17 features.
  • the Kill Switch 13 is the first line of defense.
  • TARA offers the kill switch function. It sets a loud alarm (MAGNANAKAW! MAGNANAKAW!) On stolen mobile handsets, and consequently activate a full system lock. With the phone on full system lock, no key or feature may be used as the alarm remains active. Data wipe feature may only be activated upon request on the TARA hotline number. It is ready for use at a moment's notice.
  • the LOCK/UNLOCK feature uses the smartphone's display and speaker to set off a recurrent visual and audio alarm that cannot be stopped while the device is connected to a power source. It completely disables the phone and locks user controls to stop functioning, yet the audio alarm persists to alert anyone within hearing range while the screen conceals the image display.
  • the program has auto-boot capacity to detect when the phone is turned on after a power loss and will immediately trigger the alarm.
  • TARA offers the kill switch function. It sets a loud alarm
  • SIM Catch 1 4 enables to identify the thief's SIM card even though the original SIM card is replaced and send the number information to the TARA call center, which monitors SIM changes and its frequency. Identifying the new SIM connected to the lost or stolen phone will provide a link for its owner to call or send messages to the device and demand or appeal for its return.
  • Locate Phone 15 enables the tracking service makes the smartphone's location discoverable using various geo location resources. It will also provide compiled information on the phone's whereabouts to facilitate possible recovery of the device by law enforcement agents or the owner. Tracking is done via different geo location technology and does not require the phone to be GPS- enabled.
  • This data wipe 1 6 aims to protect the owner and maintain the privacy of documents, images, videos, and other data. Data stored in a lost phone's storage can be erased upon the authenticated request of the owner to prevent thieves or unauthorized users from obtaining them and using them for blackmail or other harmful intentions.
  • Load Wipe 1 7 is a punitive measure that hurts the phone thief's or finder's wallet.
  • TARA issues a command via GSM technology that sends a large volume of SMS until all prepaid load credit or postpaid credit limit is consumed.
  • the call center 20 When the mobile phone is stolen/lost, the user has to call this call center 20 for assistance as shown in FIG 3.
  • the registered user 21 requests this call center 20 for mobile assistance to lock/unlock/wipe the stolen/lost mobile phone 1 2 with embedded TARA application 1 1 .
  • the call center 20 Upon receiving such request from the registered user 21 , the call center 20 process this mobile assistance to lock/unlock/locate/wipe this mobile phone 1 2 and sends this request to cloud VM 1 9.
  • the cloud VM 1 9 collects and processes the data coming from said call center 20.
  • the SMS server 1 8 collects and process SMS coming from cloud VM 19.
  • the mobile phone 1 2 receives SMS command coming from the SMS server 18.
  • the TARA 1 1 executes the application and mobile command (lock/unlock/locate/wipe) .
  • the mobile phone 1 2 sends mobile status via SMS to the SMS server 18 who then sends that status to call center 20.
  • the call center 20 receives data & informs the client their mobile status.
  • the user then can lock /unlock his mobile phone 1 2 by sending a command to this TARA apps 1 1 via SMS thru their given primary /emergency number to the SMS server 18 who then receives this sent SMS lock/unlock command.
  • the cloud VM 19 collects and process the data coming from SMS Server 18.
  • this cloud VM 1 9 sends this TARA lock/unlock command to the primary number via SMS to the SMS sever 18 to the TARA application 1 1 , who then sends mobile status via SMS to the SMS sever 1 8.
  • This SMS is sent to the Cloud VM 19 that collects &processes the data and forwarded it to the call center 20 that receives data/status update.

Abstract

A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well, that includes a kill switch being defined by a lock/unlock feature for completely disabling the phone and locks user control to stop functioning, yet the audio alarm persists to alert anyone within hearing range while the screen conceals the image display; a SIM catch for enabling the theft's SIM card identification replacing the original SIM, providing a link for its owner to call or send messages to the device and demand or appeal for its return; a locate phone for facilitating possible recovery of the mobile device by law enforcement agents or the owner; a date wipe for protecting the owners and maintain the privacy of documents, images, videos, and other data; and a load wipe for sending a large volume of SMS until all prepaid load credit or postpaid credit limit is consumed. This kill switch has a loud alarm (MAGNANAKAW! MAGNANAKAW!) on stolen mobile handsets, and consequently activate a full system lock.

Description

SPECIFICATION
A THEFT APPREHENSION AND RECOVERY APPLICATION ADAPTED
TO BE EMBEDDED IN A MOBILE DEVICE OR DOWNLOADED AS WELL
FIELD OF THE INVENTION The present invention relates generally to mobile
communication devices and more particularly to a theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well.
BACKGROUND OF THE INVENTION
Rapid developments in mobile technology and subsequent user base growth have resulted in undesirable security risks. As consumers spend more on gadgets and devices, worries about theff, which could turn violent, intensify as criminals target these because they are easy to fence - change the SIM, reset the device and resell for good value.
In the US, where 1.6 million became victims of smartphone theft in 2012, concerns have grown to a point that a coalition of law enforcement officials and other parties called on manufacturers and network operators to provide a technological solution to protect consumers. The initiative is pushing for the inclusion of a 'kill switch' in smartphones to render these devices unusable in case of theft or loss. Consequently, American lawmakers announced plans to legislate the 'kill switch' as a standard feature in smartphones to deter smartphone theft and protect consumers.
In the Philippines, where stealing phones are just as relatively prevalent, users may file a request to have their lost or stolen phones and SIM cards blocked by the National Telecommunications
Commission (NTC), which requires complainants to go to a central office, show proof of ownership or a police report, and execute an affidavit. By the time the user has gone through these processes, the thief/fhieves had already sold the stolen phone to someone else. According†o the NTC, complaints about lost or stolen mobile phones reached 5,255 cases in the first half of 201 2, a seven percent increase from the same period in the previous year.
SUMMARY OF THE INVENTION
In view of the foregoing, it is therefore the principal object of this invention to provide for the answer to the smartphone theft problem by providing for theft apprehension and recovery application consisting of a Kill Switch, SIM Catch, locate phone, data wipe and load wipe features.
Another object of this invention is to provide for a theft
apprehension and recovery application is to provide for an anti-theft application that is compatible with the Android Operating Systems, windows, iOS including other upcoming commercial mobile platforms such as Tisen. It transmits via the GSM (Global System for Mobile communications or Group Special Mobile) , 3G (Third Generation) and 4G (Fourth Generation) standards. The product has two versions:
Firmware TARA, which is embedded in devices at the chipset level; and TARA SOS (Save Our Smartphone) , the downloadable version.
Still another object of this invention is to provide for a theft apprehension and recovery application that also incorporates an emergency notification solution that enables phone users to send text messages to a pre-set secondary/emergency number using their phone's motion sensors. Unlike most other anti-fheff applications, this is supported by a Customer Service Center (TARA HOTLINE) that facilitates the use of available solutions. With a dedicated Call Center, it is able to give phone users fast, reliable and straightforward response in case their phones are stolen or misplaced.
BRIEF DESCRIPTION OF THE DRAWINGS FIG. l is a perspective view of my invention of a theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well;
FIG. 2 is a flow diagram of steps for registration; FIG. 3 is a flow diagram of steps for the call center assistance; and FIG. 4 is a flow diagram of steps for lock/unlock subject invention by the user.
DETAILED DESCRIPTION OF THE INVENTION
Referring now to the drawings in detail, wherein like numerals designate same parts throughout, there is shown particularly in FIG. 1 , the my invention of a theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well generally designated as 10, which includes the TARA application 1 1 and the mobile device 12.
This application 1 1 includes Kill Switch 13, SIM Catch 14, locate phone 15, data wipe 16 and load wipe 17 features.
The Kill Switch 13 is the first line of defense. TARA offers the kill switch function. It sets a loud alarm (MAGNANAKAW! MAGNANAKAW!) On stolen mobile handsets, and consequently activate a full system lock. With the phone on full system lock, no key or feature may be used as the alarm remains active. Data wipe feature may only be activated upon request on the TARA hotline number. It is ready for use at a moment's notice. Also called the LOCK/UNLOCK feature, it uses the smartphone's display and speaker to set off a recurrent visual and audio alarm that cannot be stopped while the device is connected to a power source. It completely disables the phone and locks user controls to stop functioning, yet the audio alarm persists to alert anyone within hearing range while the screen conceals the image display. The program has auto-boot capacity to detect when the phone is turned on after a power loss and will immediately trigger the alarm. TARA offers the kill switch function. It sets a loud alarm
(MAGNANAKAW! MAGNANAKAW!) on stolen mobile handsets, and consequently activate a full system lock. With the phone on full system lock, no key or feature may be used as the alarm remains active. Data wipe feature may only be activated upon request on the TARA hotline number.
SIM Catch 1 4 enables to identify the thief's SIM card even though the original SIM card is replaced and send the number information to the TARA call center, which monitors SIM changes and its frequency. Identifying the new SIM connected to the lost or stolen phone will provide a link for its owner to call or send messages to the device and demand or appeal for its return.
Locate Phone 15 enables the tracking service makes the smartphone's location discoverable using various geo location resources. It will also provide compiled information on the phone's whereabouts to facilitate possible recovery of the device by law enforcement agents or the owner. Tracking is done via different geo location technology and does not require the phone to be GPS- enabled.
Mobile computing has changed the way data is processed. It has become the norm to save important personal or corporate information in mobile phones and gadgets for easy retrieval on the go. This data wipe 1 6 aims to protect the owner and maintain the privacy of documents, images, videos, and other data. Data stored in a lost phone's storage can be erased upon the authenticated request of the owner to prevent thieves or unauthorized users from obtaining them and using them for blackmail or other harmful intentions.
Load Wipe 1 7 is a punitive measure that hurts the phone thief's or finder's wallet. TARA issues a command via GSM technology that sends a large volume of SMS until all prepaid load credit or postpaid credit limit is consumed.
As shown in FIG. 2, prior to the use of this theft apprehension and recovery application 10, registration of the user is required. The user activates and register the TARA application 1 1 via SMS to the SMS server 18 who then receives SMS. The Cloud VM 19 collects and processes the data coming from the SMS server 18 and then sends the SMS registration notification to client's primary and emergency number and e-mail to the server 18. Then, the call center 20 receives and process data. Afterwards its alerts the first responders whereby, the user is already registered.
When the mobile phone is stolen/lost, the user has to call this call center 20 for assistance as shown in FIG 3. The registered user 21 then requests this call center 20 for mobile assistance to lock/unlock/wipe the stolen/lost mobile phone 1 2 with embedded TARA application 1 1 . Upon receiving such request from the registered user 21 , the call center 20 process this mobile assistance to lock/unlock/locate/wipe this mobile phone 1 2 and sends this request to cloud VM 1 9. The cloud VM 1 9 collects and processes the data coming from said call center 20. Then the SMS server 1 8 collects and process SMS coming from cloud VM 19. The mobile phone 1 2 receives SMS command coming from the SMS server 18. The TARA 1 1 executes the application and mobile command (lock/unlock/locate/wipe) . The mobile phone 1 2 sends mobile status via SMS to the SMS server 18 who then sends that status to call center 20. The call center 20 receives data & informs the client their mobile status. As shown in FIG. 4, the user then can lock /unlock his mobile phone 1 2 by sending a command to this TARA apps 1 1 via SMS thru their given primary /emergency number to the SMS server 18 who then receives this sent SMS lock/unlock command. The cloud VM 19 collects and process the data coming from SMS Server 18. Then, this cloud VM 1 9 sends this TARA lock/unlock command to the primary number via SMS to the SMS sever 18 to the TARA application 1 1 , who then sends mobile status via SMS to the SMS sever 1 8. This SMS is sent to the Cloud VM 19 that collects &processes the data and forwarded it to the call center 20 that receives data/status update.

Claims

I CLAIM:
1 . A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well, comprising:
a kill switch being defined by a lock/unlock feature for completely disabling the phone and locks user control to stop functioning, yet the audio alarm persists to alert anyone within hearing range while the screen conceals the image display; a SIM catch for enabling the theft's SIM card identification replacing the original SIM, providing a link for its owner to call or send messages to the device and demand or appeal for its return;
A locate phone for facilitating possible recovery of the mobile device by law enforcement agents or the owner;
A date wipe for protecting the owners and maintain the privacy of documents, images, videos, and other data; and
A load wipe for sending a large volume of SMS until all prepaid load credit or postpaid credit limit is consumed.
2. A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well in accordance with claim 1 wherein, said kill switch has a loud alarm (MAGNANAKAW! MAGNANAKAW!) on stolen mobile handsets, and consequently activate a full system lock.
PCT/PH2015/000010 2015-07-16 2015-07-16 A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well WO2017010895A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/PH2015/000010 WO2017010895A1 (en) 2015-07-16 2015-07-16 A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/PH2015/000010 WO2017010895A1 (en) 2015-07-16 2015-07-16 A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well

Publications (1)

Publication Number Publication Date
WO2017010895A1 true WO2017010895A1 (en) 2017-01-19

Family

ID=53901099

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/PH2015/000010 WO2017010895A1 (en) 2015-07-16 2015-07-16 A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well

Country Status (1)

Country Link
WO (1) WO2017010895A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108040112A (en) * 2017-12-18 2018-05-15 珠海格力电器股份有限公司 A kind of communication means and equipment
US10917412B2 (en) * 2016-05-05 2021-02-09 Paypal, Inc. Authentication and risk assessment through header injections

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100315236A1 (en) * 2009-06-10 2010-12-16 Sakargayan Anupam User activated alarm for communication devices
WO2015077793A1 (en) * 2013-11-25 2015-05-28 Asurion, Llc Phone lock system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100315236A1 (en) * 2009-06-10 2010-12-16 Sakargayan Anupam User activated alarm for communication devices
WO2015077793A1 (en) * 2013-11-25 2015-05-28 Asurion, Llc Phone lock system

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
MYPHONE: "A Complete Guide on How To Use TARA by MyPhone", 11 January 2014 (2014-01-11), XP054976407, Retrieved from the Internet <URL:https://www.youtube.com/watch?v=Be3brxUb6ME> [retrieved on 20160304] *
PHOEBE MAGDIRILA: "MyPhone: Philippine hardware brand launches anti-theft app -Tech in", TECHINASIA, 2 October 2013 (2013-10-02), XP055255022, Retrieved from the Internet <URL:https://www.techinasia.com/philippine-hardware-brand-launches-antitheft-app-users> [retrieved on 20160303] *
ROBERT V.: "MyPhone's Anti-theft TARA App, How to Register and Activate", 6 October 2013 (2013-10-06), XP055255083, Retrieved from the Internet <URL:http://dugompinoy.com/2013/10/activate-myphone-tara-app.html> [retrieved on 20160303] *
YOMAI: "Philippine hardware brand launches anti-theft app for its users - PINOYDEN", 10 September 2014 (2014-09-10), XP055254983, Retrieved from the Internet <URL:http://www.pinoyden.com.ph/index.php?topic=343971.0> [retrieved on 20160303] *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10917412B2 (en) * 2016-05-05 2021-02-09 Paypal, Inc. Authentication and risk assessment through header injections
CN108040112A (en) * 2017-12-18 2018-05-15 珠海格力电器股份有限公司 A kind of communication means and equipment

Similar Documents

Publication Publication Date Title
US20220182820A1 (en) Method and apparatus for protecting data in a portable electronic device
KR101140904B1 (en) Apparatus and methods for locating, tracking and/or recovering a wireless communication device
US20130137376A1 (en) Systems and methods for recovering low power devices
US10425798B2 (en) Communication apparatus, system and method
US20120237908A1 (en) Systems and methods for monitoring and managing use of mobile electronic devices
US10129381B2 (en) Disablement of lost or stolen device
US20090251318A1 (en) Anti-theft system of mobile device
WO2019052020A1 (en) Alarm method, mobile terminal, and computer storage medium
EP3166294B1 (en) Systems and methods for monitoring and managing use of mobile electronic devices
US20180033266A1 (en) Automated motion disturbance detection and alerting
AU2020200067A1 (en) A Method and System for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen)
WO2017010895A1 (en) A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well
EP2780900B1 (en) Systems and methods for recovering low power devices
US10356591B1 (en) Secure emergency response technology
PH12014000102A1 (en) A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well
US10580271B1 (en) Wireless security tracking for weapons
CN108616642A (en) A kind of anti-theft tracking of mobile phone system
GB2450539A (en) Security method for a mobile computing device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15753505

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15753505

Country of ref document: EP

Kind code of ref document: A1