WO2017010895A1 - A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well - Google Patents
A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well Download PDFInfo
- Publication number
- WO2017010895A1 WO2017010895A1 PCT/PH2015/000010 PH2015000010W WO2017010895A1 WO 2017010895 A1 WO2017010895 A1 WO 2017010895A1 PH 2015000010 W PH2015000010 W PH 2015000010W WO 2017010895 A1 WO2017010895 A1 WO 2017010895A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- theft
- mobile device
- phone
- sim
- apprehension
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/082—Access security using revocation of authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
Definitions
- NTC National Security Commission
- Another object of this invention is to provide for a theft
- apprehension and recovery application is to provide for an anti-theft application that is compatible with the Android Operating Systems, windows, iOS including other upcoming commercial mobile platforms such as Tisen. It transmits via the GSM (Global System for Mobile communications or Group Special Mobile) , 3G (Third Generation) and 4G (Fourth Generation) standards.
- GSM Global System for Mobile communications or Group Special Mobile
- 3G Third Generation
- 4G Fullth Generation
- TARA Firmware TARA, which is embedded in devices at the chipset level; and TARA SOS (Save Our Smartphone) , the downloadable version.
- Still another object of this invention is to provide for a theft apprehension and recovery application that also incorporates an emergency notification solution that enables phone users to send text messages to a pre-set secondary/emergency number using their phone's motion sensors. Unlike most other anti-fheff applications, this is supported by a Customer Service Center (TARA HOTLINE) that facilitates the use of available solutions. With a dedicated Call Center, it is able to give phone users fast, reliable and straightforward response in case their phones are stolen or misplaced.
- TARA HOTLINE Customer Service Center
- FIG. l is a perspective view of my invention of a theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well;
- FIG. 2 is a flow diagram of steps for registration
- FIG. 3 is a flow diagram of steps for the call center assistance
- FIG. 4 is a flow diagram of steps for lock/unlock subject invention by the user.
- FIG. 1 the my invention of a theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well generally designated as 10, which includes the TARA application 1 1 and the mobile device 12.
- This application 1 1 includes Kill Switch 13, SIM Catch 14, locate phone 15, data wipe 16 and load wipe 17 features.
- the Kill Switch 13 is the first line of defense.
- TARA offers the kill switch function. It sets a loud alarm (MAGNANAKAW! MAGNANAKAW!) On stolen mobile handsets, and consequently activate a full system lock. With the phone on full system lock, no key or feature may be used as the alarm remains active. Data wipe feature may only be activated upon request on the TARA hotline number. It is ready for use at a moment's notice.
- the LOCK/UNLOCK feature uses the smartphone's display and speaker to set off a recurrent visual and audio alarm that cannot be stopped while the device is connected to a power source. It completely disables the phone and locks user controls to stop functioning, yet the audio alarm persists to alert anyone within hearing range while the screen conceals the image display.
- the program has auto-boot capacity to detect when the phone is turned on after a power loss and will immediately trigger the alarm.
- TARA offers the kill switch function. It sets a loud alarm
- SIM Catch 1 4 enables to identify the thief's SIM card even though the original SIM card is replaced and send the number information to the TARA call center, which monitors SIM changes and its frequency. Identifying the new SIM connected to the lost or stolen phone will provide a link for its owner to call or send messages to the device and demand or appeal for its return.
- Locate Phone 15 enables the tracking service makes the smartphone's location discoverable using various geo location resources. It will also provide compiled information on the phone's whereabouts to facilitate possible recovery of the device by law enforcement agents or the owner. Tracking is done via different geo location technology and does not require the phone to be GPS- enabled.
- This data wipe 1 6 aims to protect the owner and maintain the privacy of documents, images, videos, and other data. Data stored in a lost phone's storage can be erased upon the authenticated request of the owner to prevent thieves or unauthorized users from obtaining them and using them for blackmail or other harmful intentions.
- Load Wipe 1 7 is a punitive measure that hurts the phone thief's or finder's wallet.
- TARA issues a command via GSM technology that sends a large volume of SMS until all prepaid load credit or postpaid credit limit is consumed.
- the call center 20 When the mobile phone is stolen/lost, the user has to call this call center 20 for assistance as shown in FIG 3.
- the registered user 21 requests this call center 20 for mobile assistance to lock/unlock/wipe the stolen/lost mobile phone 1 2 with embedded TARA application 1 1 .
- the call center 20 Upon receiving such request from the registered user 21 , the call center 20 process this mobile assistance to lock/unlock/locate/wipe this mobile phone 1 2 and sends this request to cloud VM 1 9.
- the cloud VM 1 9 collects and processes the data coming from said call center 20.
- the SMS server 1 8 collects and process SMS coming from cloud VM 19.
- the mobile phone 1 2 receives SMS command coming from the SMS server 18.
- the TARA 1 1 executes the application and mobile command (lock/unlock/locate/wipe) .
- the mobile phone 1 2 sends mobile status via SMS to the SMS server 18 who then sends that status to call center 20.
- the call center 20 receives data & informs the client their mobile status.
- the user then can lock /unlock his mobile phone 1 2 by sending a command to this TARA apps 1 1 via SMS thru their given primary /emergency number to the SMS server 18 who then receives this sent SMS lock/unlock command.
- the cloud VM 19 collects and process the data coming from SMS Server 18.
- this cloud VM 1 9 sends this TARA lock/unlock command to the primary number via SMS to the SMS sever 18 to the TARA application 1 1 , who then sends mobile status via SMS to the SMS sever 1 8.
- This SMS is sent to the Cloud VM 19 that collects &processes the data and forwarded it to the call center 20 that receives data/status update.
Abstract
A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well, that includes a kill switch being defined by a lock/unlock feature for completely disabling the phone and locks user control to stop functioning, yet the audio alarm persists to alert anyone within hearing range while the screen conceals the image display; a SIM catch for enabling the theft's SIM card identification replacing the original SIM, providing a link for its owner to call or send messages to the device and demand or appeal for its return; a locate phone for facilitating possible recovery of the mobile device by law enforcement agents or the owner; a date wipe for protecting the owners and maintain the privacy of documents, images, videos, and other data; and a load wipe for sending a large volume of SMS until all prepaid load credit or postpaid credit limit is consumed. This kill switch has a loud alarm (MAGNANAKAW! MAGNANAKAW!) on stolen mobile handsets, and consequently activate a full system lock.
Description
SPECIFICATION
A THEFT APPREHENSION AND RECOVERY APPLICATION ADAPTED
TO BE EMBEDDED IN A MOBILE DEVICE OR DOWNLOADED AS WELL
FIELD OF THE INVENTION The present invention relates generally to mobile
communication devices and more particularly to a theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well.
BACKGROUND OF THE INVENTION
Rapid developments in mobile technology and subsequent user base growth have resulted in undesirable security risks. As consumers spend more on gadgets and devices, worries about theff, which could turn violent, intensify as criminals target these because they are easy to fence - change the SIM, reset the device and resell for good value.
In the US, where 1.6 million became victims of smartphone theft in 2012, concerns have grown to a point that a coalition of law enforcement officials and other parties called on manufacturers and network operators to provide a technological solution to protect consumers. The initiative is pushing for the inclusion of a 'kill switch' in smartphones to render these devices unusable in case of theft or loss. Consequently, American lawmakers announced plans to legislate the 'kill switch' as a standard feature in smartphones to deter smartphone theft and protect consumers.
In the Philippines, where stealing phones are just as relatively prevalent, users may file a request to have their lost or stolen phones and SIM cards blocked by the National Telecommunications
Commission (NTC), which requires complainants to go to a central office, show proof of ownership or a police report, and execute an affidavit. By the time the user has gone through these processes, the thief/fhieves had already sold the stolen phone to someone else.
According†o the NTC, complaints about lost or stolen mobile phones reached 5,255 cases in the first half of 201 2, a seven percent increase from the same period in the previous year.
SUMMARY OF THE INVENTION
In view of the foregoing, it is therefore the principal object of this invention to provide for the answer to the smartphone theft problem by providing for theft apprehension and recovery application consisting of a Kill Switch, SIM Catch, locate phone, data wipe and load wipe features.
Another object of this invention is to provide for a theft
apprehension and recovery application is to provide for an anti-theft application that is compatible with the Android Operating Systems, windows, iOS including other upcoming commercial mobile platforms such as Tisen. It transmits via the GSM (Global System for Mobile communications or Group Special Mobile) , 3G (Third Generation) and 4G (Fourth Generation) standards. The product has two versions:
Firmware TARA, which is embedded in devices at the chipset level; and TARA SOS (Save Our Smartphone) , the downloadable version.
Still another object of this invention is to provide for a theft apprehension and recovery application that also incorporates an emergency notification solution that enables phone users to send text messages to a pre-set secondary/emergency number using their phone's motion sensors. Unlike most other anti-fheff applications, this is supported by a Customer Service Center (TARA HOTLINE) that facilitates the use of available solutions. With a dedicated Call Center, it is able to give phone users fast, reliable and straightforward response in case their phones are stolen or misplaced.
BRIEF DESCRIPTION OF THE DRAWINGS FIG. l is a perspective view of my invention of a theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well;
FIG. 2 is a flow diagram of steps for registration;
FIG. 3 is a flow diagram of steps for the call center assistance; and FIG. 4 is a flow diagram of steps for lock/unlock subject invention by the user.
DETAILED DESCRIPTION OF THE INVENTION
Referring now to the drawings in detail, wherein like numerals designate same parts throughout, there is shown particularly in FIG. 1 , the my invention of a theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well generally designated as 10, which includes the TARA application 1 1 and the mobile device 12.
This application 1 1 includes Kill Switch 13, SIM Catch 14, locate phone 15, data wipe 16 and load wipe 17 features.
The Kill Switch 13 is the first line of defense. TARA offers the kill switch function. It sets a loud alarm (MAGNANAKAW! MAGNANAKAW!) On stolen mobile handsets, and consequently activate a full system lock. With the phone on full system lock, no key or feature may be used as the alarm remains active. Data wipe feature may only be activated upon request on the TARA hotline number. It is ready for use at a moment's notice. Also called the LOCK/UNLOCK feature, it uses the smartphone's display and speaker to set off a recurrent visual and audio alarm that cannot be stopped while the device is connected to a power source. It completely disables the phone and locks user controls to stop functioning, yet the audio alarm persists to alert anyone within hearing range while the screen conceals the image display. The program has auto-boot capacity to detect when the phone is turned on after a power loss and will immediately trigger the alarm. TARA offers the kill switch function. It sets a loud alarm
(MAGNANAKAW! MAGNANAKAW!) on stolen mobile handsets, and consequently activate a full system lock. With the phone on full system lock, no key or feature may be used as the alarm remains active. Data
wipe feature may only be activated upon request on the TARA hotline number.
SIM Catch 1 4 enables to identify the thief's SIM card even though the original SIM card is replaced and send the number information to the TARA call center, which monitors SIM changes and its frequency. Identifying the new SIM connected to the lost or stolen phone will provide a link for its owner to call or send messages to the device and demand or appeal for its return.
Locate Phone 15 enables the tracking service makes the smartphone's location discoverable using various geo location resources. It will also provide compiled information on the phone's whereabouts to facilitate possible recovery of the device by law enforcement agents or the owner. Tracking is done via different geo location technology and does not require the phone to be GPS- enabled.
Mobile computing has changed the way data is processed. It has become the norm to save important personal or corporate information in mobile phones and gadgets for easy retrieval on the go. This data wipe 1 6 aims to protect the owner and maintain the privacy of documents, images, videos, and other data. Data stored in a lost phone's storage can be erased upon the authenticated request of the owner to prevent thieves or unauthorized users from obtaining them and using them for blackmail or other harmful intentions.
Load Wipe 1 7 is a punitive measure that hurts the phone thief's or finder's wallet. TARA issues a command via GSM technology that sends a large volume of SMS until all prepaid load credit or postpaid credit limit is consumed.
As shown in FIG. 2, prior to the use of this theft apprehension and recovery application 10, registration of the user is required. The user activates and register the TARA application 1 1 via SMS to the SMS server 18 who then receives SMS. The Cloud VM 19 collects and processes the data coming from the SMS server 18 and then sends the
SMS registration notification to client's primary and emergency number and e-mail to the server 18. Then, the call center 20 receives and process data. Afterwards its alerts the first responders whereby, the user is already registered.
When the mobile phone is stolen/lost, the user has to call this call center 20 for assistance as shown in FIG 3. The registered user 21 then requests this call center 20 for mobile assistance to lock/unlock/wipe the stolen/lost mobile phone 1 2 with embedded TARA application 1 1 . Upon receiving such request from the registered user 21 , the call center 20 process this mobile assistance to lock/unlock/locate/wipe this mobile phone 1 2 and sends this request to cloud VM 1 9. The cloud VM 1 9 collects and processes the data coming from said call center 20. Then the SMS server 1 8 collects and process SMS coming from cloud VM 19. The mobile phone 1 2 receives SMS command coming from the SMS server 18. The TARA 1 1 executes the application and mobile command (lock/unlock/locate/wipe) . The mobile phone 1 2 sends mobile status via SMS to the SMS server 18 who then sends that status to call center 20. The call center 20 receives data & informs the client their mobile status. As shown in FIG. 4, the user then can lock /unlock his mobile phone 1 2 by sending a command to this TARA apps 1 1 via SMS thru their given primary /emergency number to the SMS server 18 who then receives this sent SMS lock/unlock command. The cloud VM 19 collects and process the data coming from SMS Server 18. Then, this cloud VM 1 9 sends this TARA lock/unlock command to the primary number via SMS to the SMS sever 18 to the TARA application 1 1 , who then sends mobile status via SMS to the SMS sever 1 8. This SMS is sent to the Cloud VM 19 that collects &processes the data and forwarded it to the call center 20 that receives data/status update.
Claims
1 . A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well, comprising:
a kill switch being defined by a lock/unlock feature for completely disabling the phone and locks user control to stop functioning, yet the audio alarm persists to alert anyone within hearing range while the screen conceals the image display; a SIM catch for enabling the theft's SIM card identification replacing the original SIM, providing a link for its owner to call or send messages to the device and demand or appeal for its return;
A locate phone for facilitating possible recovery of the mobile device by law enforcement agents or the owner;
A date wipe for protecting the owners and maintain the privacy of documents, images, videos, and other data; and
A load wipe for sending a large volume of SMS until all prepaid load credit or postpaid credit limit is consumed.
2. A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well in accordance with claim 1 wherein, said kill switch has a loud alarm (MAGNANAKAW! MAGNANAKAW!) on stolen mobile handsets, and consequently activate a full system lock.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/PH2015/000010 WO2017010895A1 (en) | 2015-07-16 | 2015-07-16 | A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/PH2015/000010 WO2017010895A1 (en) | 2015-07-16 | 2015-07-16 | A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017010895A1 true WO2017010895A1 (en) | 2017-01-19 |
Family
ID=53901099
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/PH2015/000010 WO2017010895A1 (en) | 2015-07-16 | 2015-07-16 | A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2017010895A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108040112A (en) * | 2017-12-18 | 2018-05-15 | 珠海格力电器股份有限公司 | A kind of communication means and equipment |
US10917412B2 (en) * | 2016-05-05 | 2021-02-09 | Paypal, Inc. | Authentication and risk assessment through header injections |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100315236A1 (en) * | 2009-06-10 | 2010-12-16 | Sakargayan Anupam | User activated alarm for communication devices |
WO2015077793A1 (en) * | 2013-11-25 | 2015-05-28 | Asurion, Llc | Phone lock system |
-
2015
- 2015-07-16 WO PCT/PH2015/000010 patent/WO2017010895A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100315236A1 (en) * | 2009-06-10 | 2010-12-16 | Sakargayan Anupam | User activated alarm for communication devices |
WO2015077793A1 (en) * | 2013-11-25 | 2015-05-28 | Asurion, Llc | Phone lock system |
Non-Patent Citations (4)
Title |
---|
MYPHONE: "A Complete Guide on How To Use TARA by MyPhone", 11 January 2014 (2014-01-11), XP054976407, Retrieved from the Internet <URL:https://www.youtube.com/watch?v=Be3brxUb6ME> [retrieved on 20160304] * |
PHOEBE MAGDIRILA: "MyPhone: Philippine hardware brand launches anti-theft app -Tech in", TECHINASIA, 2 October 2013 (2013-10-02), XP055255022, Retrieved from the Internet <URL:https://www.techinasia.com/philippine-hardware-brand-launches-antitheft-app-users> [retrieved on 20160303] * |
ROBERT V.: "MyPhone's Anti-theft TARA App, How to Register and Activate", 6 October 2013 (2013-10-06), XP055255083, Retrieved from the Internet <URL:http://dugompinoy.com/2013/10/activate-myphone-tara-app.html> [retrieved on 20160303] * |
YOMAI: "Philippine hardware brand launches anti-theft app for its users - PINOYDEN", 10 September 2014 (2014-09-10), XP055254983, Retrieved from the Internet <URL:http://www.pinoyden.com.ph/index.php?topic=343971.0> [retrieved on 20160303] * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10917412B2 (en) * | 2016-05-05 | 2021-02-09 | Paypal, Inc. | Authentication and risk assessment through header injections |
CN108040112A (en) * | 2017-12-18 | 2018-05-15 | 珠海格力电器股份有限公司 | A kind of communication means and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220182820A1 (en) | Method and apparatus for protecting data in a portable electronic device | |
KR101140904B1 (en) | Apparatus and methods for locating, tracking and/or recovering a wireless communication device | |
US20130137376A1 (en) | Systems and methods for recovering low power devices | |
US10425798B2 (en) | Communication apparatus, system and method | |
US20120237908A1 (en) | Systems and methods for monitoring and managing use of mobile electronic devices | |
US10129381B2 (en) | Disablement of lost or stolen device | |
US20090251318A1 (en) | Anti-theft system of mobile device | |
WO2019052020A1 (en) | Alarm method, mobile terminal, and computer storage medium | |
EP3166294B1 (en) | Systems and methods for monitoring and managing use of mobile electronic devices | |
US20180033266A1 (en) | Automated motion disturbance detection and alerting | |
AU2020200067A1 (en) | A Method and System for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen) | |
WO2017010895A1 (en) | A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well | |
EP2780900B1 (en) | Systems and methods for recovering low power devices | |
US10356591B1 (en) | Secure emergency response technology | |
PH12014000102A1 (en) | A theft apprehension and recovery application adapted to be embedded in a mobile device or downloaded as well | |
US10580271B1 (en) | Wireless security tracking for weapons | |
CN108616642A (en) | A kind of anti-theft tracking of mobile phone system | |
GB2450539A (en) | Security method for a mobile computing device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15753505 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15753505 Country of ref document: EP Kind code of ref document: A1 |