WO2017089922A1 - Locating stolen mobile phone based on unique hardware identifier - Google Patents

Locating stolen mobile phone based on unique hardware identifier Download PDF

Info

Publication number
WO2017089922A1
WO2017089922A1 PCT/IB2016/056789 IB2016056789W WO2017089922A1 WO 2017089922 A1 WO2017089922 A1 WO 2017089922A1 IB 2016056789 W IB2016056789 W IB 2016056789W WO 2017089922 A1 WO2017089922 A1 WO 2017089922A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile phone
user
original
new
phone number
Prior art date
Application number
PCT/IB2016/056789
Other languages
French (fr)
Inventor
Shubham MALHOTRA
Sai Srinivas Kiran GARIMELLA
Original Assignee
Motiveprime Consumer Electronics Pvt Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motiveprime Consumer Electronics Pvt Ltd filed Critical Motiveprime Consumer Electronics Pvt Ltd
Publication of WO2017089922A1 publication Critical patent/WO2017089922A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier

Definitions

  • the present disclosure generally relates to Internet, wireless technologies and mobile phones. More particularly, the present disclosure relates to a system and method to easily locate a stolen mobile phone.
  • these mobile phones may include many different application programs or apps that people have bought for the mobile phone such as productivity apps, games, news apps, and so forth. These apps have provided new ways for consumers to access content, connect with others, improve productivity, relax, and discover new things-just to name a few examples.
  • a key feature of such mobile phones is that they are small and relatively lightweight. So, people can often be found using them in public such as on subways, on buses, while walking outside, in coffee shops, in restaurants, and so forth. Since such mobile phones are also expensive, they are particularly attractive to thieves. For example, a common method of theft on subways is to snatch mobile phones away from unsuspecting owners right before the subway doors close. Once the mobile phone has been stolen, it can take just minutes for the thief to wipe it clean and ready the device for resale. Recovery of a stolen mobile phone hence is very difficult.
  • the high price and demand of a mobile phone can also tempt a non-thief who finds a lost mobile phone to keep the device rather than search for its rightful owner.
  • a person who finds a lost mobile phone and intends to return it may find it difficult to locate the owner.
  • IMEI code International Mobile Station Equipment Identity code
  • IMEI code International Mobile Station Equipment Identity code
  • the numbers expressing quantities or dimensions of items, and so forth, used to describe and claim certain embodiments of the invention are to be understood as being modified in some instances by the term "about.” Accordingly, in some embodiments, the numerical parameters set forth in the written description and attached claims are approximations that can vary depending upon the desired properties sought to be obtained by a particular embodiment. In some embodiments, the numerical parameters should be construed in light of the number of reported significant digits and by applying ordinary rounding techniques. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of some embodiments of the invention are approximations, the numerical values set forth in the specific examples are reported as precisely as practicable. The numerical values presented in some embodiments of the invention may contain certain errors necessarily resulting from the standard deviation found in their respective testing measurements.
  • the present disclosure generally relates to Internet, wireless technologies and mobile phones. More particularly, the present disclosure relates to a system and method to make a mobile phone theft proof.
  • the system and method of the present disclosure includes a unique hardware identifier (UHID) encryption module, user registration module, user details storage module with user information table, user details comparison module, SEVI card change detection module, and original user communication module.
  • UHID unique hardware identifier
  • each mobile phone can be configured with a unique hardware identifier (UfflD) encryption module that can be configured to encrypt the UHID of the mobile phone when the mobile phone is started for the first time by an original user using an encoding function whose definition can change after a fixed time period that can be determined by the operating system of the mobile phone.
  • Unique hardware identifier (UHID) encryption module can send the encrypted UHID to user registration module.
  • the unique hardware identifier (UHID) of the mobile phone can be a hardware identifier that cannot be change/manipulated in any manner and is associated with the core hardware of the device such as with the processor and/or memory.
  • UHID can be a unique code that is different for each mobile phone/smart phone, and can be of a defined length but is configured such that no manipulation of the same can ever be done.
  • the UHID can be the central processing unit (CPU) or SoC (System on Chip) Serial Number, ICCID (Integrated CircuitCard Identifier) or any other hardware identity or combinations of these.
  • the UHID of the mobile phone can be configured in such a fashion that it is not possible to change, remove or duplicate it.
  • the system and method of the present disclosure can be so configured that no user can change the UHID of the mobile phone, even when they insert a new SEVI card in the mobile phone or factory reset the mobile phone.
  • unique hardware id (UHID) encryption module can be part of the operating system of the mobile phone.
  • each mobile phone can be configured with a user registration module that can receive the encrypted UHID from unique hardware id (UHID) encryption module when the mobile phone is switched on for the first time, wherein the registration module can, at the time, prompt original user for a default e-mail id for all communications from the company if the mobile phone gets stolen, which can be as part of the user creating an account with the operating system/mobile phone, which is a usual procedure for most current mobile phones.
  • user registration module can be so configured that providing of this default e-mail id by the original user can be an essential requirement to proceed with further usage of the mobile phone as it forms part of the account registration/creation stage.
  • user registration module can store this default e-mail id.
  • user registration module can be configured to determine the location where, and date and time stamp when, the mobile phone was first switched on by the original user.
  • user registration module can store the location where and date and time stamp when mobile phone was first switched on.
  • user registration module can send the encrypted UHID, original user's default e-mail id, and the location where and date and time stamp when mobile phone was first switched on to user details storage module that can store these details in user table .
  • user registration module can prompt original user for an alternate phone number for all communications from the company if his mobile phone gets stolen and can forward this alternate phone number also along with above information to user details storage module that can store this information in user table along with the other information for the same encrypted UHID.
  • user registration module can determine the mobile phone number (also called the original user phone number hereon after) associated with the SEVI card and the location where and date and time stamp when the SEVI card was inserted.
  • user registration module can send the original user mobile phone number, location where and date and time when the SEVI card was inserted, and encrypted UHID of the mobile phone to user details storage module that can store this information in user table along with the other information for the same encrypted UHID.
  • the original user can start his mobile phone for the first time only after inserting a SIM card.
  • user registration module can send encrypted UHID, default e-mail id of original user, original user's mobile phone number, alternate phone number (if provided by original user), location where and date and time stamp when mobile phone was first switched on to user details storage module.
  • user registration module can be part of the operating system of the mobile phone.
  • all communications between user registration module and user details storage module can be via Internet or SMS whichever available, or both.
  • user details storage module can be configured with user table.
  • user table can store information pertaining to user details of all mobile phones sold by the company.
  • user details storage module can receive from user registration module, the encrypted UHK), original user's default e-mail id, and the location where and date and time stamp when a mobile phone was first switched on and can store this data in user table.
  • user details storage module can receive an alternate phone number provided by the original user for all communications from the company if his mobile phone gets stolen (if provided by the original user when the mobile phone was first switched on) and can store this information in user table along with the other information for the same encrypted UHK).
  • user details storage module can receive the encrypted UHK), original user mobile phone number, location where and date and time stamp when the SEVI card was inserted from user registration module.
  • user details storage module can store this information in user table along with the other information for the same encrypted UHID.
  • the original user can start his mobile phone for the first time only after inserting a SEVI card.
  • user details storage module can receive encrypted UH ), default e-mail id of original user, original user's mobile phone number, alternate phone number (if provided by original user), location where and date and time stamp when mobile phone was first switched on from the user registration module and can store these details in user table.
  • user details storage module can receive information from user registration modules of different mobile phones, and can add this information to user table, each row of user table storing information of each original user containing for each original user the encrypted UHK) of his mobile phone, his registered e-mail id, original user mobile phone number, alternate phone number (if provided by user), location where and date and time stamp when the mobile phone was switched on for the first time and location where and date and time stamp when a SEVI card was inserted for the first time in the mobile phone.
  • this information dataset can be called original user information
  • user details storage module can receive new information from SEVI card change module each time the SIM card of a mobile phone is taken out and the same SEVI card with same mobile phone number, or a new SEVI card with same mobile phone number or a new SEVI card with different mobile phone number is inserted.
  • new information can contain encrypted UHID of the mobile phone, current user mobile phone number, new location where and new date and time stamp when the same SIM card with same mobile phone number, or a new SEVI card with same mobile phone number or a new SEVI card with different mobile phone number is inserted in the mobile phone.
  • user details storage module can store this new information in user table by appending this new information to existing information for same encrypted UHID.
  • user details storage module can pass this new information to user details compare module for any encrypted UHID.
  • user details storage module can pass the original user information to user details compare module for the same encrypted UHID.
  • user details storage module configured with user table can be configured on a server such as the mobile phone/device company's servers.
  • all communication between the user registration module and user details storage module can be via Internet or SMS whichever available, or both.
  • user details comparison module can be configured to receive new information from user details storage module for any encrypted UHID.
  • user details comparison module can be configured to receive original user information from user details storage module for the same encrypted UHID.
  • user details comparison module can be configured to compare new information received from user details storage module with the original user information received from user details storage module for the same encrypted UHID.
  • user details comparison module can determine if current user mobile phone number for an encrypted UHID is different from the original user mobile phone number of the same encrypted UHID and if so, can pass on location where and date and time stamp when the new SIM card with current user mobile phone number was inserted in the mobile phone to original user communication module.
  • user details comparison module can be configured on the Company's servers.
  • SEVI card change detection module can be configured to be activated any time the SIM card of a mobile phone is taken out, and either the same SEVI card or another SEVI card put back in the mobile phone.
  • SIM card change detection module can be configured to send new information containing encrypted UHID, current user mobile phone number, new location where and new date and time stamp when the same SEVI card with the same mobile phone number is put back in the mobile phone to user details storage module.
  • SIM card change detection module can be configured to send new information containing encrypted UHID, current user mobile phone number, new location where and new date and time stamp when a new SEVI card with the same mobile phone number is put back in the mobile phone to user details storage module.
  • SEVI card change detection module can be configured to send new information containing encrypted UHID, current user mobile phone number, new location where and new date and time stamp when a new SEVI card with a new mobile phone number is put back in the mobile phone to user details storage module.
  • SIM card change detection module can be configured to be part of the operating system of the mobile phone.
  • the present invention owning to the stored/secured/encrypted mapping between the UHID and the original phone number/email id, any change in such mapping can be quickly detected and action can be taken to location the stolen phone.
  • original user communication module can be configured to inform original user that "new SIM card inserted" along with location where and date and time stamp when the new SIM card was inserted when so instructed by user details change detection module using the registered E-mail id and alternate phone number of the original user (if provided by the original user when mobile phone was switched on the first time).
  • original user communication module can send such information to original user using Internet or SMS whichever available, or both.
  • original user communication module can be configured on the Company's servers.
  • original user upon receiving such information from original user communication module, original user can reach out to the Customer Care centre of the Company with proof of mobile phone purchase (such as invoice)and original mobile phone number.
  • the customer care centre can access the current mobile phone number from user table using the encrypted UHID of the mobile phone and give the current mobile phone number to the original user.
  • Original user can use this information to recover his mobile phone through proper legal procedures.
  • all communication between original user communication module and original user can take place via Internet or SMS whichever available, or both.
  • the Customer Care centre of the Company can send a signal to the mobile phone deleting all present data on it when so requested by the original user after duly authenticating him.
  • the Customer Care centre of the Company can send a signal to the mobile phone preventing its further use ('locking' it) when so requested by the original user after duly authenticating him.
  • FIG. 1 illustrates an exemplary representation of an overall architecture of the system and method in accordance with an embodiment of the present disclosure.
  • FIG. 2 illustrates exemplary functional modules of the proposed system and method in accordance with an embodiment of the present disclosure.
  • FIG. 3 A, 3B, 3C and 3D illustrate examples of the operation of the proposed system and method in accordance with an embodiment of the present disclosure.
  • FIG. 4 illustrates a sequence diagram for an exemplary implementation of the proposed system and method in accordance with an embodiment of the present disclosure.
  • FIG. 5A to 5C illustrate in a summary flow chart form exemplary representations of the working of the proposed system and method in accordance with an embodiment of the present disclosure, under different situations.
  • company server in the instant disclosure refers to the organization entrusted with implementing, updating and managing the security system as defined herein.
  • unique hardware identity key or “UHID” in the instant disclosure refers to a hardware parameter or combination of those which is provided in a mobile phone during its manufacturing and is unique to each mobile phone and which cannot be tampered with or modified/changed/deleted/altered with in any manner.
  • the term "original user” in the instant disclosure refers to a person who purchases the mobile phone for the first time from the manufacture of the mobile phone or its appointed distributors, and uses it.
  • new user in the instant disclosure refers to a person who uses the mobile phone at any time by replacing the SIM card installed in it by the original user.
  • SEVI card in the instant disclosure refers to a subscriber identity module which is an integrated circuit chip to securely store the international mobile subscriber identity (IMSI) number and its related key, which are used to identify and authenticate subscribers on mobile telephony devices.
  • IMSI international mobile subscriber identity
  • Embodiments of the present invention include various steps, which will be described below.
  • the steps may be performed by hardware components or may be embodied in machine-executable instructions, which may be used to cause a general-purpose or special- purpose processor programmed with the instructions to perform the steps.
  • steps may be performed by a combination of hardware, software, and firmware and/or by human operators.
  • Embodiments of the present invention may be provided as a computer program product, which may include a machine-readable storage medium tangibly embodying thereon instructions, which may be used to program a computer (or other electronic devices) toperform a process.
  • the machine-readable medium may include, but is not limited to, fixed (hard) drives, magnetic tape, floppy diskettes, optical disks, compact disc read-only memories (CD-ROMs), and magneto-optical disks, semiconductor memories, such as ROMs, PROMs, random access memories (RAMs), programmable read-only memories (PROMs), erasable PROMs (EPROMs), electrically erasable PROMs (EEPROMs), flash memory, magnetic or optical cards, or other type of media/machine-readable medium suitable for storing electronic instructions (e.g., computer programming code, such as software or firmware).
  • Various methods described herein may be practiced by combining one or more machine-readable storage media containing the code according to the present invention with appropriate standard computer hardware to execute the code contained therein.
  • An apparatus for practicing various embodiments of the present invention may involve one or more computers (or one or more processors within a single computer) and storage systems containing or having network access to computer program(s) coded in accordance with various methods described herein, and the method steps of the invention could be accomplished by modules, routines, subroutines, or subparts of a computer program product.
  • the present disclosure generally relates to Internet, wireless technologies and mobile phones. More particularly, the present disclosure relates to a system and method to make a mobile phone theft proof.
  • the system and method of the present disclosure includes a unique hardware identifier (UHID) encryption module, user registration module, user details storage module with user information table, user details comparison module, SEVI card change detection module, and original user communication module.
  • UHID unique hardware identifier
  • each mobile phone can be configured with a unique hardware identifier (UHID) encryption module that can be configured to encrypt the UHID of the mobile phone when the mobile phone is started for the first time by an original user using an encoding function whose definition can change after a fixed time period that can be determined by the operating system of the mobile phone.
  • UHID unique hardware identifier
  • Unique hardware identifier (UHID) encryption module can send the encrypted UHID to user registration module.
  • the unique hardware identifier (UHID) of the mobile phone can be a hardware identifier that cannot be change/manipulated in any manner and is associated with the core hardware of the device such as with the processor and/or memory.
  • UHID can be a unique code that is different for each mobile phone/smart phone, and can be of a defined length but is configured such that no manipulation of the same can ever be done.
  • the UHID can be the central processing unit (CPU) or SoC (System on Chip) Serial Number, ICCID (Integrated CircuitCard Identifier) or any other hardware identity or combinations of these.
  • the UHID of the mobile phone can be configured in such a fashion that it is not possible to change, remove or duplicate it.
  • system and method of the present disclosure can be so configured that no user can change the UHID of the mobile phone, even when they insert a new SEVI card in the mobile phone or factory reset the mobile phone.
  • unique hardware id (UfflD) encryption module can be part of the operating system of the mobile phone.
  • each mobile phone can be configured with a user registration module that can receive the encrypted UfflD from unique hardware id (UfflD) encryption module when the mobile phone is switched on for the first time, wherein the registration module can, at the time, prompt original user for a default e-mail id for all communications from the company if the mobile phone gets stolen, which can be as part of the user creating an account with the operating system/mobile phone, which is a usual procedure for most current mobile phones.
  • user registration module can be so configured that providing of this default e-mail id by the original user can be an essential requirement to proceed with further usage of the mobile phone as it forms part of the account registration/creation stage.
  • user registration module can store this default e-mail id.
  • user registration module can be configured to determine the location where, and date and time stamp when, the mobile phone was first switched on by the original user.
  • user registration module can store the location where and date and time stamp when mobile phone was first switched on.
  • user registration module can send the encrypted UfflD, original user's default e-mail id, and the location where and date and time stamp when mobile phone was first switched on to user details storage module that can store these details in user table .
  • user registration module can prompt original user for an alternate phone number for all communications from the company if his mobile phone gets stolen and can forward this alternate phone number also along with above information to user details storage module that can store this information in user table along with the other information for the same encrypted UfflD.
  • user registration module can determine the mobile phone number (also called the original user phone number hereon after) associated with the SEVI card and the location where and date and time stamp when the SEVI card was inserted.
  • user registration module can send the original user mobile phone number, location where and date and time when the SEVI card was inserted, and encrypted UHID of the mobile phone to user details storage module that can store this information in user table along with the other information for the same encrypted UHK).
  • the original user can start his mobile phone for the first time only after inserting a SIM card.
  • user registration module can send encrypted UHID, default e-mail id of original user, original user's mobile phone number, alternate phone number (if provided by original user), location where and date and time stamp when mobile phone was first switched on to user details storage module.
  • user registration module can be part of the operating system of the mobile phone.
  • all communications between user registration module and user details storage module can be via Internet or SMS whichever available, or both.
  • user details storage module can be configured with user table.
  • user table can store information pertaining to user details of all mobile phones sold by the company.
  • user details storage module can receive from user registration module, the encrypted UHK), original user's default e-mail id, and the location where and date and time stamp when a mobile phone was first switched on and can store this data in user table.
  • user details storage module can receive an alternate phone number provided by the original user for all communications from the company if his mobile phone gets stolen (if provided by the original user when the mobile phone was first switched on) and can store this information in user table along with the other information for the same encrypted UHK).
  • user details storage module can receive the encrypted UHK), original user mobile phone number, location where and date and time stamp when the SEVI card was inserted from user registration module.
  • user details storage module can store this information in user table along with the other information for the same encrypted UHID.
  • the original user can start his mobile phone for the first time only after inserting a SEVI card.
  • user details storage module can receive encrypted UHID, default e-mail id of original user, original user's mobile phone number, alternate phone number (if provided by original user), location where and date and time stamp when mobile phone was first switched on from the user registration module and can store these details in user table.
  • provision of alternate phone number is not mandatory and is only an embodiment, wherein the details of the new SEVI can always also be sent to the registered email address of the user at the server or through any other means that the proposed system may configure, all of which are well within the scope of the present disclosure.
  • user details storage module can receive information from user registration modules of different mobile phones, and can add this information to user table, each row of user table storing information of each original user containing for each original user the encrypted UHID of his mobile phone, his registered e-mail id, original user mobile phone number, alternate phone number (if provided by user), location where and date and time stamp when the mobile phone was switched on for the first time and location where and date and time stamp when a SEVI card was inserted for the first time in the mobile phone.
  • this information dataset can be called original user information
  • user details storage module can receive new information from SEVI card change module each time the SIM card of a mobile phone is taken out and the same SEVI card with same mobile phone number, or a new SEVI card with same mobile phone number or a new SEVI card with different mobile phone number is inserted.
  • new information can contain encrypted UHID of the mobile phone, current user mobile phone number, new location where and new date and time stamp when the same SIM card with same mobile phone number, or a new SEVI card with same mobile phone number or a new SEVI card with different mobile phone number is inserted in the mobile phone.
  • user details storage module can store this new information in user table by appending this new information to existing information for same encrypted UHID.
  • user details storage module can pass this new information to user details compare module for any encrypted UHID.
  • user details storage module can pass the original user information to user details compare module for the same encrypted UHID.
  • user details storage module configured with user table can be configured on a server such as the mobile phone/device company's servers.
  • all communication between the user registration module and user details storage module can be via Internet or SMS whichever available, or both.
  • user details comparison module can be configured to receive new information from user details storage module for any encrypted UHID.
  • user details comparison module can be configured to receive original user information from user details storage module for the same encrypted UHID.
  • user details comparison module can be configured to compare new information received from user details storage module with the original user information received from user details storage module for the same encrypted UHID.
  • user details comparison module can determine if current user mobile phone number for an encrypted UHID is different from the original user mobile phone number of the same encrypted UHID and if so, can pass on location where and date and time stamp when the new SIM card with current user mobile phone number was inserted in the mobile phone to original user communication module.
  • user details comparison module can be configured on the Company's servers.
  • SEVI card change detection module can be configured to be activated any time the SIM card of a mobile phone is taken out, and either the same SEVI card or another SEVI card put back in the mobile phone.
  • SIM card change detection module can be configured to send new information containing encrypted UHID, current user mobile phone number, new location where and new date and time stamp when the same SEVI card with the same mobile phone number is put back in the mobile phone to user details storage module.
  • SIM card change detection module can be configured to send new information containing encrypted UHID, current user mobile phone number, new location where and new date and time stamp when a new SEVI card with the same mobile phone number is put back in the mobile phone to user details storage module.
  • SEVI card change detection module can be configured to send new information containing encrypted UHID, current user mobile phone number, new location where and new date and time stamp when a new SEVI card with a new mobile phone number is put back in the mobile phone to user details storage module.
  • SIM card change detection module can be configured to be part of the operating system of the mobile phone.
  • mapping between email id, original users phone number, and UHID is stored, and a comparison can be made to determine that the stored phone number mapped to the UHID is different from the new phone number of the user.
  • the email id that the original user registered with would be different from the new email id that the thief would register himself/herself with, and hence such incorrect mapping can easily be detected, based on which a flag/alarm can be raised and information can be sent to the alternate phone number of the user giving details of the location, new phone number of the mobile phone. Therefore, the present invention, owning to the stored/secured/encrypted mapping between the UHID and the original phone number/email id, any change in such mapping can be quickly detected and action can be taken to location the stolen phone.
  • original user communication module can be configured to inform original user that "new SEVI card inserted" along with location where and date and time stamp when the new SEVI card was inserted when so instructed by user details change detection module using the registered E-mail id and alternate phone number of the original user (if provided by the original user when mobile phone was switched on the first time).
  • original user communication module can send such information to original user using Internet or SMS whichever available, or both.
  • original user communication module can be configured on the Company's servers.
  • original user upon receiving such information from original user communication module, original user can reach out to the Customer Care centre of the Company with proof of mobile phone purchase (such as invoice) and original mobile phone number.
  • the customer care centre can access the current mobile phone number from user table using the encrypted UHID of the mobile phone and give the current mobile phone number to the original user.
  • Original user can use this information to recover his mobile phone through proper legal procedures.
  • all communication between original user communication module and original user can take place via Internet or SMS whichever available, or both.
  • the Customer Care centre of the Company can send a signal to the mobile phone deleting all present data on it when so requested by the original user after duly authenticating him.
  • the Customer Care centre of the Company can send a signal to the mobile phone preventing its further use ('locking' it) when so requested by the original user after duly authenticating him.
  • FIG. 1 illustrates an exemplary representation of an overall architecture of the system and method in accordance with an embodiment of the present disclosure.
  • Architecture 100 can include a plurality of mobile phones of which one is illustrated as 102.
  • Mobile phone 102 can be operatively connected to a server 104 having a user table 106.
  • each mobile phonel02 can have a unique hardware identification key (also called UHID herein after) provided by the manufacturer of the mobile phone.
  • the UHID can be a long alphanumeric identifier of mobile phone 102 ranging anywhere but not limited to ten to sixteen characters. It can be configured to be unchangeable, not dependent on any application software and unique for every mobile phone.
  • the unique hardware id (UHID) of mobile phone 102 can be, for instance, a central processing unit (CPU) or SoC (System on Chip) Serial Number, ICCID (Integrated CircuitCard Identifier) or any other hardware identity or combinations of these.
  • the UHID of the mobile phone can be configured in such a fashion that it is not possible to remove or spoof it.
  • system and method of the present disclosure can be so configured that no user can change the UHID of the mobile phone even when they insert a new SIM card in the mobile phone or factory reset the mobile phone.
  • the operating system of mobile phonel02 can be configured to encrypt the UHID.
  • the operating system of mobile phone 102 can prompt original user for a default e-mail id (as part of account creation process) for all communications from the company if mobile phone 102 gets stolen.
  • operating system of mobile phone 102 can be so configured that providing of this default e-mail id by the original user can be an essential requirement to proceed with further usage of mobile phone 102.
  • operating system of mobile phone 102 can store this default e-mail id.
  • the operating system of mobile phone 102 when original user starts mobile phone 102 for the first time , can be configured to determine the location where and date and time stamp when mobile phone 102 was first switched on. In another aspect operating system of mobile phone 102 can store the location where and date and time stamp when mobile phone 102 was first switched on.
  • operating system of mobile phone 102 can be configured to send the encrypted UfflD, original user's default e-mail id, and the location where and date and time stamp when mobile phone 102 was first switched on to servers 104 maintained by the manufacturer/company which can be configured to store this information in user table 106.
  • operating system of mobile phone 102 can prompt original user for an alternate phone number for all communications from the company if mobile phone 102 gets stolen and forward this alternate phone number also along with above information to servers 104 maintained by the Company that can be configured to store this information in user table 106 along with the other information for the same encrypted UfflD.
  • the operating system of mobile phone 102 can be configured to determine mobile phone 102number (also called the original user mobile phone number hereon after) associated with the SEVI card and the location where and date and time stamp when the SIM card was inserted.
  • the operating system of mobile phone 102 can be configured to send the original user mobile phone number, location where and date and time when the SEVI card was inserted and encrypted UfflD of mobile phone 102to the company's servers 104.
  • the company servers 104 can be configured to store this information in user table 106 along with the other information for the same encrypted UfflD.
  • the original user can start his mobile phone for the first time only after inserting a SIM card.
  • the operating system of phone 102 can be configured to send encrypted UfflD of mobile phone 102, default e-mail id of original user, original user's mobile phone number, alternate phone number (if provided by original user), location where and date and time stamp when mobile phone 102 was first switched on to the company's servers 104 that can be configured to store this information in user table 106.1n such a fashion, user table 106 can store information regarding encrypted UHID, default e-mail id of original user, original user mobile phone number, alternate phone number and the location where and date and time stamp when the SIM card was inserted for the first time in mobile phone 102. In an aspect this information can be called original user information.
  • the operating system of mobile phone 102 can be configured to enable all communications between mobile phone 102 and company servers 104 using Internet or SMS whichever available, or both.
  • Mobile phone 102 can get stolen or misplaced. In both these scenarios, it can get in the hands of current user who can then attempt to use it. The user who has stolen the phone can, of course, use it only by putting in a new SIM card with a different mobile phone number, and when such a user who has stolen the phone (current user), the operating system of mobile phone 102 can detect that a new SIM card has been inserted into mobile phone 102.
  • operating system of mobile phone 102 can be configured to send encrypted UHID, current user mobile phone number and the location where and date and time stamp whenever a new SIM card is inserted into mobile phone 102 to company servers 104 that can be configured to store this information in user table 106 along with the other information for the same encrypted UHID.
  • this information can be called new user information.
  • such information may not be stored but compared against the earlier information stored for the UHID, and matched to confirm if there is a change, and if affirmative, can send an email/notify the original user on the alternate number that a new SEVI has been inserted into the mobile phone.
  • company servers 104 can be configured to compare original user information to current/new/thief user information, and determine if the current user mobile phone number is different from original user mobile phone number. In such a case, company servers 104 can be configured to inform original user that " new SEVI card inserted" along with the location where and date and time stamp when the new SIM card was inserted into mobile phone 102, using the default e-mail id of original user and alternate phone number if provided by him at the time when mobile phone 102 was first started. In an aspect, all communication between company server 104 and original user can take place via Internet or SMS whichever available, or both.
  • the Customer Care centre 108 of the Company upon receiving such information from the company, original user can reach out to the Customer Care centre 108 of the Company with proof of mobile phone purchase (such as invoice) and original mobile phone number. Upon receipt of such proof, the customer care centre can access the current mobile phone number from user table 106 using the encrypted UfflD of mobile phone 102 and give the current mobile phone number to the original user. Original user can use this information to recover his mobile phone through proper legal procedures.
  • the Customer Care centre 108 of the Company can send a signal to the mobile phone deleting all present data on it when so requested by the original user after duly authenticating him.
  • the Customer Care centre 108 of the Company can send a signal to the mobile phone preventing its further use ('locking' it ) when so requested by the original user after duly authenticating him.
  • FIG. 2 illustrates exemplary functional modules of the proposed system and method in accordance with an embodiment of the present disclosure.
  • system and method of the present disclosure can include unique hardware id (UHID) encryption module 202, user registration module 204, user details storage module 206 with user information table 212, user details comparison module 208, SEVI card change detection module 210, and original user communication module 214.
  • UHID unique hardware id
  • each mobile phone can be configured with a unique hardware id (UHID) encryption module 202.
  • Unique hardware id (UHID) encryption module 202 can be configured to encrypt the UHID of the mobile phone when the mobile phone is started for the first time by the original user.
  • unique hardware id (UHID) encryption module 202 can apply an encoding function to the UHID of the mobile phone to generate an encrypted UHID.
  • the definition of the encoding function can change after every fixed time period. In an aspect this fixed time period can be determined by the operating system of the mobile phone.
  • unique hardware id (UHID) encryption module 202 can generate an encrypted UHID which can be very difficult to modify without the encoding function.
  • unique hardware id (UHID) encryption module 202 can send the encrypted UHID to user registration module 204.
  • unique hardware id (UHID) encryption module 202 can be part of the operating system of the phone.
  • each mobile phone can be configured with a user registration module 204.
  • user registration module 204 when original user switches on his mobile phone for the first time, user registration module 204 can receive the encrypted UHID from unique hardware id encryption module 202.
  • user registration module 204 when original user switches on his mobile phone for the first time, user registration module 204 can prompt original user for a default e-mail id for all communications from the company if the mobile phone gets stolen.
  • user registration module 204 can be so configured that providing of this default e-mail id by the original user can be an essential requirement to proceed with further usage of the mobile phone.
  • user registration module 204 can store this default e-mail id.
  • user registration module 204 can be configured to determine the location where and date and time stamp when the mobile phone was first switched on by the original user. In another aspect user registration module 204 can store the location where and date and time stamp when mobile phone 102 was first switched on. In an aspect, user registration module 204 can send the encrypted UHID, original user's default e-mail id and the location where and date and time stamp when mobile phone was first switched on to user details storage module 206 that can store these details in user table 212.
  • user registration module 204 can prompt original user for an alternate phone number for all communications from the company if his mobile phone gets stolen and can forward this alternate phone number also along with above information to user details storage module 206 that can store this information in user table 212 along with the other information for the same encrypted UHID.
  • user registration module 204 can determine the mobile phone number (also called the original user phone number hereon after) associated with the SIM card and the location where and date and time stamp when the SIM card was inserted.
  • user registration module 204 can send the original user mobile phone number, location where and date and time when the SIM card was inserted and encrypted UHID of the mobile phone to user details storage module 206 that can store this information in user table 212 along with the other information for the same encrypted UHID.
  • the original user can start his mobile phone for the first time only after inserting a SIM card.
  • user registration module 204 can send encrypted UHID, default e-mail id of original user, original user's mobile phone number, alternate phone number (if provided by original user), location where and date and time stamp when mobile phone was first switched on to user details storage module 206 that can store this information in user table 212.
  • user registration module 204 can be part of the operating system of the mobile phone. In an aspect all communication between user registration module 204 and user details storage module 206 can be via Internet or SMS whichever available, or both.
  • user details storage module 206 can be configured with user table 212.
  • user table 212 can store information pertaining to user details of all mobile phones sold by the company.
  • user details storage module 206 can receive from user registration module 204the encrypted UHID, original user's default e-mail id and the location where and date and time stamp when a mobile phone was first switched on and can store this data in user table 212.1n another aspect, user details storage module 206 can receive an alternate phone number provided by the original user for all communications from the company if his mobile phone gets stolen (if provided by the original user when the mobile phone was first switched on) and can store this information in user table 212 along with the other information for the same encrypted UHID.
  • user details storage module 206 can receive the encrypted UHID, original user mobile phone number, location where and date and time stamp when the SIM card was inserted from user registration module 204. In an aspect, user details storage module 206 can store this information in user table 212 along with the other information for the same encrypted UHID. In an aspect, the original user can start his mobile phone for the first time only after inserting a SIM card.
  • user details storage module 206 can receive encrypted UHID, default e-mail id of original user, original user's mobile phone number, alternate phone number (if provided by original user), location where and date and time stamp when mobile phone was first switched on from the user registration module 204 and can store these details in user table 212.
  • user details storage module 206 can receive information from user registration modules204of different mobile phones and can add this information to user table 212, each row of user table 212 storing information of each original user containing for each original user the encrypted UHID of his mobile phone, his registered e- mail id, original user mobile phone number, alternate phone number (if provided by user), location where and date and time stamp when the mobile phone was switched on for the first time and location where and date and time stamp when a SEVI card was inserted for the first time in the mobile phone.
  • this information dataset can be called original user information.
  • user details storage module 206 can receive new information from SEVI card change module 210 each time the SIM card of a mobile phone is taken out and the same SEVI card with same mobile phone number, or a new SIM card with same mobile phone number or a new SEVI card with different mobile phone number is inserted.
  • new information can contain the encrypted UHID of the mobile phone, current user mobile phone number, new location where and new date and time stamp when the same SEVI card with same mobile phone number, or a new SIM card with same mobile phone number or a new SIM card with different mobile phone number is inserted in the mobile phone.
  • user details storage module 206 can store this new information in user table 212 by appending this new information to existing information for same encrypted UHID.
  • user details storage module 206 can pass this new information to user details comparison module 208 for any encrypted UHID.
  • user details storage module 206 can pass the original user information to user details comparison module 208 for the same encrypted UHK).
  • user table 212 may also be configured not to store the new information before the same is compared/verified and found to be correct.
  • user details storage module 206 configured with user table 212 can be configured on the Company's servers.
  • all communication between the user registration module 204 and user details storage module 206 can be via Internet or SMS whichever available, or both.
  • user details comparison module 208 can receive new information from user details storage module 206 for any encrypted UHID. In another aspect, user details comparison module 208can receive original user information from user details storage module 206 for the same encrypted UHID.
  • user details comparison module 208 can compare new information received from user details storage module 206 with the original user information received from user details storage module 206 for the same encrypted UHID. In another aspect, on such comparison, user details comparison module 208 can determine if current user mobile phone number for an encrypted UHID is different from the original user mobile phone number of the same encrypted UHID and if so, can pass on location where and date and time stamp when the new SIM card with current user mobile phone number was inserted in the mobile phone to original user communication module 214.
  • user details comparison module 208 can be configured on the Company's servers.
  • SIM card change detection module 210 can be configured to be activated any time the SIM card of a mobile phone is taken out and either the same SEVI card or another SEVI card put back in the mobile phone.
  • SIM card change detection module 210 can be configured to send new information containing encrypted UHK), current user mobile phone number, new location where and new date and time stamp when the same SIM card with the same mobile phone number is put back in the mobile phone to user details storage module 206.
  • SIM card change detection module 210 can be configured to send new information containing encrypted UfflD, current user mobile phone number, new location where and new date and time stamp when a new SIM card with the same mobile phone number is put back in the mobile phone to user storage module 206.
  • SIM card change detection module 210 can be configured to send new information containing encrypted UfflD, current user mobile phone number, new location where and new date and time stamp when a new SIM card with a new mobile phone number is put back in the mobile phone to user details storage module 206.
  • SIM card change detection module 210 can be configured to be part of the operating system of the mobile phone.
  • original user communication module 214 can inform original user that "new SIM card inserted" along with location where and date and time stamp when the new SIM card was inserted when so instructed by user details compare module 208 using the registered E-mail id and alternate phone number of the original user (if provided by the original user when mobile phone was switched on the first time).
  • original user communication module 214 can send such information to original user using Internet or SMS whichever available, or both.
  • original user communication module 214 can be configured on the Company's servers.
  • original user upon receiving such information from original user communication module 214, original user can reach out to the Customer Care centre of the Company with proof of mobile phone purchase (such as invoice ) and original mobile phone number.
  • the customer care centre can access the current mobile phone number from user table 212 using the encrypted UfflD of the mobile phone and give the current mobile phone number to the original user.
  • Original user can use this information to recover his mobile phone through proper legal procedures.
  • all communication between original user communication module 214 and original user can take place via Internet or SMS whichever available, or both.
  • each mobile phone sold by the company can have a UHK) that can be encrypted by unique hardware id encryption module 202 in the mobile phone to generate an encrypted UHK) when the mobile phone is switched on for the first time by its original user.
  • Each mobile phone can have a user registration module 204 which can receive the encrypted UHK) from unique hardware id encryption module 202.
  • user registration module 204 can prompt the original user to provide a default e-mail id for all communications from the company if the mobile phone gets stolen, can store the default e-mail id and can also determine and store the location where and date and time stamp when mobile phone was first switched on.
  • the user registration module 204 can send the encrypted UtKD, original user's default e-mail id and the location where and date and time stamp when mobile phone was first switched on to user details storage module 206 that can store these details in user table 212.
  • user registration module 204 can also prompt the original user for an alternate phone number for all communications from the company if his/her mobile phone gets stolen, and can forward this alternate phone number also along with above information to user details storage module 206 that can store this information along with the other information for the same encrypted UHK).
  • user registration module 204 can determine the mobile phone number (also called the original user mobile phone number) associated with the SEVI card and the location where and date and time stamp when the SEVI card was inserted and can send the original user mobile phone number, location where and date and time when the SEVI card was inserted and encrypted UtKD of the mobile phone to user details storage module 206 that can store this information in user table 212 along with the other information for the same encrypted UHID.
  • the mobile phone number also called the original user mobile phone number
  • user details storage module 206 can store this information in user table 212 along with the other information for the same encrypted UHID.
  • user details storage module 206 can receive information from user registration modules 204 of different mobile phones and can add this information to user table 212, each row of user table 212 storing information of each original user containing for each original user the encrypted UHID of his mobile phone, his registered e-mail id, original user mobile phone number, alternate phone number (if provided by user), location where and date and time stamp when the mobile phone was switched on for the first time and location where and date and time stamp when a SEVI card was inserted for the first time in the mobile phone.
  • this information dataset can be called original user information.
  • Each mobile phone can have a SEVI card change detection module 210 that can be activated any time a SIM card is taken out from the mobile phone and either the same or a new SEVI card inserted with either the same or a new mobile phone number.
  • SIM card change detection module can send new information to user details storage module 206.
  • This new information can include encrypted UHID of the mobile phone, current user mobile phone number, new location where and new date and time stamp when the same SEVI card with same mobile phone number, or a new SIM card with same mobile phone number or a new SEVI card with different mobile phone number is inserted in the mobile phone.
  • the user details storage module 206 can store this new information in user table 212 by appending this new information to existing information for same encrypted UHID.
  • the user details comparison module 208 can compare original user information to the new information each time a SEVI card is inserted in any mobile phone. If the user details module 208 finds that the current user mobile phone information is different from original user information, it can instruct the original user communication module 214 to inform original user that "new SEVI card inserted" along with location where and date and time stamp when the new SEVI card was inserted. Upon receiving such information from original user communication module 214, original user can reach out to the Customer Care centre of the Company with proof of mobile phone purchase (such as invoice) and original mobile phone number. Upon receipt of such proof, the customer care centre can access the current mobile phone number from user table 212 using the encrypted UHID of the mobile phone and give the current mobile phone number to the original user.
  • user registration module 204 and SIM card change detection module 210 can be part of the operating system of the mobile phone.
  • user details storage module 206 with user table 212, user details comparison module208, and original user communication module 214 can be configured to be on company servers or any other server/computing device.
  • all communication between user registration module 204 and user details storage module 206 can be via Internet or SMS whichever available or both.
  • all communication between original user communication module 214 and original user can take place via Internet or SMS whichever available, or both.
  • FIGs. 3A, 3B, 3C and 3D illustrate examples of the operation of the proposed system and method in accordance with an embodiment of the present disclosure.
  • FIG. 3A illustrates the how the proposed system and method can operate when an original user takes out his mobile phone's SFM card and simply reinserts it.
  • FIG. 3B illustrates the how the proposed system and method can operate when an original user takes out his mobile phone's SFM card and reinserts a new SFM card but with the same mobile phone number as that of the earlier SFM card.
  • new information of location where and date and time stamp when SFM card was reinserted is recorded in server, and compared with original user information. Since no change is found in the user mobile phone number information, no communication is sent to the original user.
  • FIG. 3C illustrates the how the proposed system and method can operate when an original user takes out his mobile phone's SFM card and reinserts a new SFM card with a new mobile phone number.
  • new information of location where and date and time stamp when SFM card was reinserted is recorded in server, and compared with original user information. Since a change is found in the user mobile phone number information, a communication is sent to the original user saying " New SFM card inserted" and providing the location where and date and time stamp when the new SIM card was inserted. Since the original user knows about it, he ignores this communication and the process ends.
  • 3D illustrates the how the proposed system and method can operate when an original user has lost his mobile phone or it has been stolen and a new user tries to use the mobile phone by inserting a new SIM card with a new mobile phone number, with or without factory resetting the mobile phone.
  • new information of location where and date and time stamp when SIM card was reinserted is recorded in server, and compared with original user information. Since a change is found in the user mobile phone number information, a communication is sent to the original user saying " New SIM card inserted" and providing the location where and date and time stamp when the new SIM card was inserted.
  • the user Since the original user knows that he/she has misplaced his mobile phone or that the same has been stolen, the user can contact customer care department of the Company, which customer care department can authenticate the original user by means such as purchase invoice data, original user mobile phone number etc. and then issue the user the new user's/current users/thief mobile phone number. The original user can use the new user mobile phone number to recover his mobile phone by due process of law.
  • FIG. 4 illustrates via a sequence diagram an exemplary implementation of the method of the proposed system in accordance with an embodiment of the present disclosure.
  • the method includes original user inserting a SFM card in his mobile phone and then switching it on for the first time.
  • the method includes the mobile phone generating original user data that can include encrypted UHID, default e-mail id as provided by original user, original user mobile phone number, alternate phone number (if provided by original user), location, date and time stamp when mobile phone first switched on and location, date and time stamp when first SIM card inserted in it; and sending it to Company Server.
  • the method includes the server storing the original user data for each original user.
  • the method includes a new user inserting a new SFM card with a new mobile phone number and switching on the mobile phone.
  • the method includes the mobile phone detecting such a change and generating new information comprising encrypted UHID, new mobile phone number, location, date and time stamp when new SIM card was inserted in the mobile phone and mobile phone switched on; and sending it to Company Server.
  • the method includes server receiving and storing the new information.
  • the method includes server comparing original user data to the new information each time a SIM card is inserted in the mobile phone and determining if current user mobile phone number information is different from original user mobile phone number in original user information.
  • the method includes sending a message to original user saying "new SIM card inserted" along with location where and date and time stamp when the new SIM card was inserted, if the current user mobile phone number information is different from original user mobile phone number in original user information.
  • the method includes original user receiving this message on his default E-mail id and alternate phone number (if provided by original user) by Internet or SMS whichever available, or both.
  • FIG. 5A to 5C illustrate in summary flow chart form exemplary representations of the working of the proposed system and method in accordance with an embodiment of the present disclosure, under different situations.
  • step 502 original user can switch on the mobile phone without inserting a SFM card for the first time.
  • the system can prompt him for his default e-mail id which then the operating system of the mobile phone can send to the company server, along with encrypted UHID, location and date and time stamp the mobile phone was first started as shown at step 506.1n another aspect, the operating system of the mobile phone can also prompt original user for an alternate phone and can send the same also along with encrypted UHID, location and date and time stamp the mobile phone was first started to the company server.
  • step 508 original user can insert a SFM card into the mobile phone and start it after such insertion for the first time.
  • the system can send encrypted UHID, original user mobile phone number, location and date and time stamp when the SIM card was inserted the first time to company server.
  • a user can start the mobile phone after inserting a SFM card.
  • the operating system can send encrypted UHID, current mobile phone number, location and date and time stamp the SFM card was inserted to company server, as shown at step 514.
  • step 502 and step 508 can happen together, that is, original user can insert a SIM card and then start his phone for the first time and then provide his default e-mail id when prompted.
  • the operating system of the mobile phone can send all the information together viz, encrypted UHID of the mobile phone, location and date and time stamp the mobile phone was first started, alternate phone (if provided by original user) and original user mobile phone number to company server.
  • any user can insert a new SEVI card in the mobile phone at step 522 and can switch it on as shown in step 524. Then, as shown in step 526, the operating system of the mobile phone can send new information comprising encrypted UHID, current user mobile phone number, location, date and time stamp when new SIM card was inserted to company server.
  • company server can check current user mobile phone number sent by the mobile phone to that previously stored. As shown at step 530, if the current user mobile phone number is the same as earlier original user mobile phone number, the process ends and company server just makes a note of the location, date and time stamp new SEVI card was inserted as shown at step 534. However, if the current user mobile phone number is not the same as earlier original user mobile phone number, company server can send a message to original user saying "A new SIM card inserted into Mobile Phone" with location, date and time stamp the new SEVI card was inserted, as shown at step 532.
  • step 542 original user can get a message notifying him that a new SEVI card has been inserted into his mobile phone along location, date and time stamp the new SEVI card was inserted.
  • original user can take different actions depending upon whether his mobile phone is stolen or not. If not, he simply need not do anything and the process ends as shown in step 550. But if his phone is stolen, original user can contact company customer care department with purchase invoice as shown in step 546. After verifying original user credentials based upon the purchase invoice details, company customer care department can give original user the new mobile phone number which his mobile phone is now using. Original user can use this information to contact the new user or to make further attempts to recover his mobile phone by process of law.
  • all communication between the mobile phone and company server can take place via internet or SMS whichever available, or both.
  • all communication between company server and original user can take place via Internet or SMS whichever available, or both.
  • the term “coupled to” is intended to include both direct coupling (in which two elements that are coupled to each other contact each other) and indirect coupling (in which at least one additional element is located between the two elements). Therefore, the terms “coupled to” and “coupled with” are used synonymously.
  • Coupled to and “coupled with” are also used euphemistically to mean “communicatively coupled with” over a network, where two or more devices are able to exchange data with each other over the network, possibly via one or more intermediary device.
  • the present disclosure provides for a system and method that can help easily locate a stolen mobile phone.
  • the present disclosure provides for a system and method that does not require the user to install any application.
  • the system and method uses the operating system itself of the phone and hence cannot be tampered with or removed even when the mobile phone is "factory reset" or all its data is wiped clean.
  • the present disclosure provides for a system and method that does not depend upon any parameter of the mobile phone that can be duplicated or removed, and instead relies upon hardware identifiers or their combinations that are further encrypted, making it impossible for anyone to duplicate or remove such identifiers and still keep the mobile phone operational.
  • the present disclosure provides for a system and method that informs the original user as soon as anyone else starts using his phone and also provides the location where his phone is being used, based on which the original user can find out the new phone number which is being used with his mobile phone and so can easily recover his phone by proper legal procedure.

Abstract

The present disclosure relates to a system for locating a stolen mobile phone that enables an original user to register based on user information comprising email identifier, original phone number, and an alternate phone number, and enables the user information to be stored along with a unique hardware identifier (UHID) of the mobile phone in a server. The system detects when a new SIM card is inserted into the mobile phone, and sends new information comprising UHID, new phone number, location/date/time stamp when the new SIM card was inserted in the mobile phone to the server. The system further compares the new information with the original user information to evaluate if original phone number is different from the new phone number, and sends a notification to the original user on the alternate phone number that a difference in original phone number has been determined along with sending location information.

Description

LOCATING STOLEN MOBILE PHONE BASED ON UNIQUE HARDWARE
IDENTIFIER
FIELD OF DISCLOSURE
[0001] The present disclosure generally relates to Internet, wireless technologies and mobile phones. More particularly, the present disclosure relates to a system and method to easily locate a stolen mobile phone.
BACKGROUND OF THE DISCLOSURE
[0002] The background description includes information that may be useful in understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art.
[0003] Mobile phones nowadays have become an important, perhaps even a vital accessory for people. The high end and expensive mobile phones are more powerful than even some configurations of Personal Computers and can store large amounts of a person's data such as a music collection, documents, contacts, notes, reminders, calendar dates, pictures, video, and much more. This data can also include confidential data such as Credit Card Numbers, Bank Account details etc.
[0004] Further, these mobile phones may include many different application programs or apps that people have bought for the mobile phone such as productivity apps, games, news apps, and so forth. These apps have provided new ways for consumers to access content, connect with others, improve productivity, relax, and discover new things-just to name a few examples.
[0005] A key feature of such mobile phones is that they are small and relatively lightweight. So, people can often be found using them in public such as on subways, on buses, while walking outside, in coffee shops, in restaurants, and so forth. Since such mobile phones are also expensive, they are particularly attractive to thieves. For example, a common method of theft on subways is to snatch mobile phones away from unsuspecting owners right before the subway doors close. Once the mobile phone has been stolen, it can take just minutes for the thief to wipe it clean and ready the device for resale. Recovery of a stolen mobile phone hence is very difficult.
[0006] The high price and demand of a mobile phone can also tempt a non-thief who finds a lost mobile phone to keep the device rather than search for its rightful owner. Alternatively, a person who finds a lost mobile phone and intends to return it may find it difficult to locate the owner.
[0007] Some existing systems seek to address this problem by sending an SMS to the mobile phone to lock it down. However, it needs an application installed in the mobile phone and the new user needs to be still using the old SEVI card. But this is a very improbable case since one of the first things a thief will do is a "factory reset" of the mobile phone which will clear it of all installed applications, and discard the earlier SIM card.
[0008] Some other systems require an application to be installed on the mobile phone which provides the location of a stolen phone once it connects to the Internet and this location can be tracked by the original owner. Again, this works only as long as the thief does not do a "factory reset" or does not delete the application which does this, and is connected to the internet and does not turn off the location feature of the mobile phone or the mobile phone itself.
[0009] Other systems allow for erasing the mobile phone remotely so that personal or sensitive data stored on the mobile phone is protected. One problem with remotely erasing a mobile phone is that often the mobile phone is no longer locatable after the device is erased. As an unintended consequence, remotely wiping a mobile phone can actually help a thief by making the device harder to find or identify.
[00010] Some other systems rely upon the IMEI code (International Mobile Station Equipment Identity code), which is a unique number to identify mobile phones. However, expert thieves can easily remove an IMEI code from a stolen mobile phone or provide it with another one thus making it untraceable.
[00011] Thus there is a requirement in the art for a system and method that addresses above problems, and makes recovery of a stolen mobile phone fool-proof and quick, thus lowering the temptation for thieves to steal such mobile phones while also providing additional reassurance to the customers of mobile phones having such a system. [00012] All publications herein are incorporated by reference to the same extent as if each individual publication or patent application were specifically and individually indicated to be incorporated by reference. Where a definition or use of a term in an incorporated reference is inconsistent or contrary to the definition of that term provided herein, the definition of that term provided herein applies and the definition of that term in the reference does not apply.
[00013] In some embodiments, the numbers expressing quantities or dimensions of items, and so forth, used to describe and claim certain embodiments of the invention are to be understood as being modified in some instances by the term "about." Accordingly, in some embodiments, the numerical parameters set forth in the written description and attached claims are approximations that can vary depending upon the desired properties sought to be obtained by a particular embodiment. In some embodiments, the numerical parameters should be construed in light of the number of reported significant digits and by applying ordinary rounding techniques. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of some embodiments of the invention are approximations, the numerical values set forth in the specific examples are reported as precisely as practicable. The numerical values presented in some embodiments of the invention may contain certain errors necessarily resulting from the standard deviation found in their respective testing measurements.
[00014] As used in the description herein and throughout the claims that follow, the meaning of "a," "an," and "the" includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein, the meaning of "in" includes "in" and "on" unless the context clearly dictates otherwise.
[00015] The recitation of ranges of values herein is merely intended to serve as a shorthand method of referring individually to each separate value falling within the range. Unless otherwise indicated herein, each individual value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g. "such as") provided with respect to certain embodiments herein is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention otherwise claimed. No language in the specification should be construed as indicating any non-claimed element essential to the practice of the invention.
OBJECTS OF THE INVENTION
[00016] It is an object of the present disclosure to provide for a system and method to easily locate a stolen mobile phone.
[00017] It is an object of the present disclosure to provide for a system and method to easily locate a stolen mobile phone that is part of the operating system itself of the phone.
[00018] It is an object of the present disclosure to provide for a system and method to easily locate a stolen mobile phone that does not require the original user to install any special application to work.
[00019] It is an object of the present disclosure to provide for a system and method to easily locate a stolen mobile phone that does not depend upon any parameter of the phone that can be duplicated or removed.
[00020] It is an object of the present disclosure to provide for a system and method to easily locate a stolen mobile phone that enables the original user to be informed as soon as another person starts using his mobile phone.
[00021] It is an object of the present disclosure to provide for a system and method to easily locate a stolen mobile phone that enables the original user to get all relevant data by which the present user of the phone can be tracked or contacted.
SUMMARY
[00022] The present disclosure generally relates to Internet, wireless technologies and mobile phones. More particularly, the present disclosure relates to a system and method to make a mobile phone theft proof.
[00023] The system and method of the present disclosure includes a unique hardware identifier (UHID) encryption module, user registration module, user details storage module with user information table, user details comparison module, SEVI card change detection module, and original user communication module.
[00024] In an aspect, each mobile phone can be configured with a unique hardware identifier (UfflD) encryption module that can be configured to encrypt the UHID of the mobile phone when the mobile phone is started for the first time by an original user using an encoding function whose definition can change after a fixed time period that can be determined by the operating system of the mobile phone. Unique hardware identifier (UHID) encryption module can send the encrypted UHID to user registration module.
[00025] In an aspect, the unique hardware identifier (UHID) of the mobile phone can be a hardware identifier that cannot be change/manipulated in any manner and is associated with the core hardware of the device such as with the processor and/or memory. UHID can be a unique code that is different for each mobile phone/smart phone, and can be of a defined length but is configured such that no manipulation of the same can ever be done. In an aspect, the UHID can be the central processing unit (CPU) or SoC (System on Chip) Serial Number, ICCID (Integrated CircuitCard Identifier) or any other hardware identity or combinations of these. The UHID of the mobile phone can be configured in such a fashion that it is not possible to change, remove or duplicate it. In an aspect, the system and method of the present disclosure can be so configured that no user can change the UHID of the mobile phone, even when they insert a new SEVI card in the mobile phone or factory reset the mobile phone.
[00026] In an aspect, unique hardware id (UHID) encryption module can be part of the operating system of the mobile phone.
[00027] In another aspect, each mobile phone can be configured with a user registration module that can receive the encrypted UHID from unique hardware id (UHID) encryption module when the mobile phone is switched on for the first time, wherein the registration module can, at the time, prompt original user for a default e-mail id for all communications from the company if the mobile phone gets stolen, which can be as part of the user creating an account with the operating system/mobile phone, which is a usual procedure for most current mobile phones. In an aspect, user registration module can be so configured that providing of this default e-mail id by the original user can be an essential requirement to proceed with further usage of the mobile phone as it forms part of the account registration/creation stage. In another aspect, user registration module can store this default e-mail id.
[00028] In an aspect, user registration module can be configured to determine the location where, and date and time stamp when, the mobile phone was first switched on by the original user. In another aspect, user registration module can store the location where and date and time stamp when mobile phone was first switched on.
[00029] In an aspect, user registration module can send the encrypted UHID, original user's default e-mail id, and the location where and date and time stamp when mobile phone was first switched on to user details storage module that can store these details in user table .
[00030] In another aspect, when original user switches on his mobile phone for the first time, user registration module can prompt original user for an alternate phone number for all communications from the company if his mobile phone gets stolen and can forward this alternate phone number also along with above information to user details storage module that can store this information in user table along with the other information for the same encrypted UHID.
[00031] In another aspect, when original user inserts his SEVI card for the first time and switches on his mobile phone, user registration module can determine the mobile phone number (also called the original user phone number hereon after) associated with the SEVI card and the location where and date and time stamp when the SEVI card was inserted.
[00032] In another aspect, user registration module can send the original user mobile phone number, location where and date and time when the SEVI card was inserted, and encrypted UHID of the mobile phone to user details storage module that can store this information in user table along with the other information for the same encrypted UHID.
[00033] In another aspect, the original user can start his mobile phone for the first time only after inserting a SIM card. In this aspect, user registration module can send encrypted UHID, default e-mail id of original user, original user's mobile phone number, alternate phone number (if provided by original user), location where and date and time stamp when mobile phone was first switched on to user details storage module.
[00034] In an aspect user registration module can be part of the operating system of the mobile phone. [00035] In an aspect, all communications between user registration module and user details storage module can be via Internet or SMS whichever available, or both.
[00036] In an aspect, user details storage module can be configured with user table. In another aspect, user table can store information pertaining to user details of all mobile phones sold by the company.
[00037] In an aspect, user details storage module can receive from user registration module, the encrypted UHK), original user's default e-mail id, and the location where and date and time stamp when a mobile phone was first switched on and can store this data in user table.
[00038] In another aspect, user details storage module can receive an alternate phone number provided by the original user for all communications from the company if his mobile phone gets stolen (if provided by the original user when the mobile phone was first switched on) and can store this information in user table along with the other information for the same encrypted UHK).
[00039] In another aspect, when the original user enters his SEVI card in his mobile phone for the first time and switches it on, user details storage module can receive the encrypted UHK), original user mobile phone number, location where and date and time stamp when the SEVI card was inserted from user registration module.
[00040] In an aspect, user details storage module can store this information in user table along with the other information for the same encrypted UHID.
[00041] In an aspect, the original user can start his mobile phone for the first time only after inserting a SEVI card. In this aspect, user details storage module can receive encrypted UH ), default e-mail id of original user, original user's mobile phone number, alternate phone number (if provided by original user), location where and date and time stamp when mobile phone was first switched on from the user registration module and can store these details in user table.
[00042] In another aspect, in such a fashion user details storage module can receive information from user registration modules of different mobile phones, and can add this information to user table, each row of user table storing information of each original user containing for each original user the encrypted UHK) of his mobile phone, his registered e-mail id, original user mobile phone number, alternate phone number (if provided by user), location where and date and time stamp when the mobile phone was switched on for the first time and location where and date and time stamp when a SEVI card was inserted for the first time in the mobile phone. In an aspect, this information dataset can be called original user information
[00043] In an aspect, user details storage module can receive new information from SEVI card change module each time the SIM card of a mobile phone is taken out and the same SEVI card with same mobile phone number, or a new SEVI card with same mobile phone number or a new SEVI card with different mobile phone number is inserted.
[00044] In another aspect, new information can contain encrypted UHID of the mobile phone, current user mobile phone number, new location where and new date and time stamp when the same SIM card with same mobile phone number, or a new SEVI card with same mobile phone number or a new SEVI card with different mobile phone number is inserted in the mobile phone.
[00045] In an aspect, user details storage module can store this new information in user table by appending this new information to existing information for same encrypted UHID.
[00046] In an aspect, user details storage module can pass this new information to user details compare module for any encrypted UHID. In another aspect, user details storage module can pass the original user information to user details compare module for the same encrypted UHID.
[00047] In an aspect, user details storage module configured with user table can be configured on a server such as the mobile phone/device company's servers.
[00048] In an aspect, all communication between the user registration module and user details storage module can be via Internet or SMS whichever available, or both.
[00049] In an aspect, user details comparison module can be configured to receive new information from user details storage module for any encrypted UHID. In another aspect, user details comparison module can be configured to receive original user information from user details storage module for the same encrypted UHID. In another aspect, user details comparison module can be configured to compare new information received from user details storage module with the original user information received from user details storage module for the same encrypted UHID. In another aspect, on such comparison, user details comparison module can determine if current user mobile phone number for an encrypted UHID is different from the original user mobile phone number of the same encrypted UHID and if so, can pass on location where and date and time stamp when the new SIM card with current user mobile phone number was inserted in the mobile phone to original user communication module. In an aspect user details comparison module can be configured on the Company's servers.
[00050] In an aspect, SEVI card change detection module can be configured to be activated any time the SIM card of a mobile phone is taken out, and either the same SEVI card or another SEVI card put back in the mobile phone. In an aspect, SIM card change detection module can be configured to send new information containing encrypted UHID, current user mobile phone number, new location where and new date and time stamp when the same SEVI card with the same mobile phone number is put back in the mobile phone to user details storage module. In another aspect, SIM card change detection module can be configured to send new information containing encrypted UHID, current user mobile phone number, new location where and new date and time stamp when a new SEVI card with the same mobile phone number is put back in the mobile phone to user details storage module. In another aspect, SEVI card change detection module can be configured to send new information containing encrypted UHID, current user mobile phone number, new location where and new date and time stamp when a new SEVI card with a new mobile phone number is put back in the mobile phone to user details storage module. In yet another aspect, SIM card change detection module can be configured to be part of the operating system of the mobile phone.
[00051] In an exemplary implementation, when a thief steals the mobile phone and inserts a new SEVI card and also resets the phone settings, when the user switches on the phone, a communication would be sent to server where mapping between email id, original users phone number, and UHID is stored, and a comparison can be made to determine that the stored phone number mapped to the UHID is different from the new phone number of the user. Even the email id that the original user registered with would be different from the new email id that the thief would register himself/herself with, and hence such incorrect mapping can easily be detected, based on which a flag/alarm can be raised and information can be sent to the alternate phone number of the user giving details of the location, new phone number of the mobile phone. Therefore, the present invention, owning to the stored/secured/encrypted mapping between the UHID and the original phone number/email id, any change in such mapping can be quickly detected and action can be taken to location the stolen phone.
[00052] In an aspect, original user communication module can be configured to inform original user that "new SIM card inserted" along with location where and date and time stamp when the new SIM card was inserted when so instructed by user details change detection module using the registered E-mail id and alternate phone number of the original user (if provided by the original user when mobile phone was switched on the first time). In another aspect, original user communication module can send such information to original user using Internet or SMS whichever available, or both. In an aspect original user communication module can be configured on the Company's servers.
[00053] In an exemplary embodiment of the disclosure, upon receiving such information from original user communication module, original user can reach out to the Customer Care centre of the Company with proof of mobile phone purchase (such as invoice)and original mobile phone number. Upon receipt of such proof, the customer care centre can access the current mobile phone number from user table using the encrypted UHID of the mobile phone and give the current mobile phone number to the original user. Original user can use this information to recover his mobile phone through proper legal procedures. In an aspect, all communication between original user communication module and original user can take place via Internet or SMS whichever available, or both.
[00054] In an embodiment of the present disclosure, the Customer Care centre of the Company can send a signal to the mobile phone deleting all present data on it when so requested by the original user after duly authenticating him. In another embodiment of the present disclosure, the Customer Care centre of the Company can send a signal to the mobile phone preventing its further use ('locking' it) when so requested by the original user after duly authenticating him.
[00055] Various objects, features, aspects and advantages of the present disclosure will become more apparent from the following detailed description of preferred embodiments, along with the accompanying drawing figures in which like numerals represent like features.
BRIEF DESCRIPTION OF DRAWINGS [00056] The diagrams are for illustration only, which thus is not a limitation of the present disclosure, and wherein:
[00057] FIG. 1 illustrates an exemplary representation of an overall architecture of the system and method in accordance with an embodiment of the present disclosure.
[00058] FIG. 2 illustrates exemplary functional modules of the proposed system and method in accordance with an embodiment of the present disclosure.
[00059] FIG. 3 A, 3B, 3C and 3D illustrate examples of the operation of the proposed system and method in accordance with an embodiment of the present disclosure.
[00060] FIG. 4 illustrates a sequence diagram for an exemplary implementation of the proposed system and method in accordance with an embodiment of the present disclosure.
[00061] FIG. 5A to 5C illustrate in a summary flow chart form exemplary representations of the working of the proposed system and method in accordance with an embodiment of the present disclosure, under different situations.
DETAILED DESCRIPTION OF DRAWINGS
[00062] The description hereinafter, of the specific embodiment will so fully reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify or adapt or perform both for various applications such specific embodiment without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation.
[00063] Various terms as used herein are defined below. To the extent a term used in a claim is not defined below, it should be given the broadest definition persons in the pertinent art have given that term as reflected in printed publications and issued patents at the time of filing.
Definitions;
[00064] The expression "company server" in the instant disclosure refers to the organization entrusted with implementing, updating and managing the security system as defined herein. [00065] The term "unique hardware identity key" or "UHID" in the instant disclosure refers to a hardware parameter or combination of those which is provided in a mobile phone during its manufacturing and is unique to each mobile phone and which cannot be tampered with or modified/changed/deleted/altered with in any manner.
[00066] The term "original user" in the instant disclosure refers to a person who purchases the mobile phone for the first time from the manufacture of the mobile phone or its appointed distributors, and uses it.
[00067] The term "new user" in the instant disclosure refers to a person who uses the mobile phone at any time by replacing the SIM card installed in it by the original user.
[00068] The term "SEVI card" in the instant disclosure refers to a subscriber identity module which is an integrated circuit chip to securely store the international mobile subscriber identity (IMSI) number and its related key, which are used to identify and authenticate subscribers on mobile telephony devices.
[00069] In the following description, numerous specific details are set forth in order to provide a thorough understanding of embodiments of the present invention. It will be apparent to one skilled in the art that embodiments of the present invention may be practiced without some of these specific details.
[00070] Embodiments of the present invention include various steps, which will be described below. The steps may be performed by hardware components or may be embodied in machine-executable instructions, which may be used to cause a general-purpose or special- purpose processor programmed with the instructions to perform the steps. Alternatively, steps may be performed by a combination of hardware, software, and firmware and/or by human operators.
[00071] Embodiments of the present invention may be provided as a computer program product, which may include a machine-readable storage medium tangibly embodying thereon instructions, which may be used to program a computer (or other electronic devices) toperform a process. The machine-readable medium may include, but is not limited to, fixed (hard) drives, magnetic tape, floppy diskettes, optical disks, compact disc read-only memories (CD-ROMs), and magneto-optical disks, semiconductor memories, such as ROMs, PROMs, random access memories (RAMs), programmable read-only memories (PROMs), erasable PROMs (EPROMs), electrically erasable PROMs (EEPROMs), flash memory, magnetic or optical cards, or other type of media/machine-readable medium suitable for storing electronic instructions (e.g., computer programming code, such as software or firmware).
[00072] Various methods described herein may be practiced by combining one or more machine-readable storage media containing the code according to the present invention with appropriate standard computer hardware to execute the code contained therein. An apparatus for practicing various embodiments of the present invention may involve one or more computers (or one or more processors within a single computer) and storage systems containing or having network access to computer program(s) coded in accordance with various methods described herein, and the method steps of the invention could be accomplished by modules, routines, subroutines, or subparts of a computer program product.
[00073] If the specification states a component or feature "may", "can", "could", or "might" be included or have a characteristic, that particular component or feature is not required to be included or have the characteristic.
[00074] Exemplary embodiments will now be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. These embodiments are provided so that this disclosure will be thorough and complete and will fully convey the scope of the invention to those of ordinary skill in the art. Moreover, all statements herein reciting embodiments of the invention, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future (i.e., any elements developed that perform the same function, regardless of structure).
[00075] Thus, for example, it will be appreciated by those of ordinary skill in the art that the diagrams, schematics, illustrations, and the like represent conceptual views or processes illustrating systems and methods embodying this invention. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software. Similarly, any switches shown in the figures are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the entity implementing this invention. Those of ordinary skill in the art further understand that the exemplary hardware, software, processes, methods, and/or operating systems described herein are for illustrative purposes and, thus, are not intended to be limited to any particular named element.
[00076] The present disclosure generally relates to Internet, wireless technologies and mobile phones. More particularly, the present disclosure relates to a system and method to make a mobile phone theft proof.
[00077] The system and method of the present disclosure includes a unique hardware identifier (UHID) encryption module, user registration module, user details storage module with user information table, user details comparison module, SEVI card change detection module, and original user communication module.
[00078] In an aspect, each mobile phone can be configured with a unique hardware identifier (UHID) encryption module that can be configured to encrypt the UHID of the mobile phone when the mobile phone is started for the first time by an original user using an encoding function whose definition can change after a fixed time period that can be determined by the operating system of the mobile phone. Unique hardware identifier (UHID) encryption module can send the encrypted UHID to user registration module.
[00079] In an aspect, the unique hardware identifier (UHID) of the mobile phone can be a hardware identifier that cannot be change/manipulated in any manner and is associated with the core hardware of the device such as with the processor and/or memory. UHID can be a unique code that is different for each mobile phone/smart phone, and can be of a defined length but is configured such that no manipulation of the same can ever be done. In an aspect, the UHID can be the central processing unit (CPU) or SoC (System on Chip) Serial Number, ICCID (Integrated CircuitCard Identifier) or any other hardware identity or combinations of these. The UHID of the mobile phone can be configured in such a fashion that it is not possible to change, remove or duplicate it. In an aspect, the system and method of the present disclosure can be so configured that no user can change the UHID of the mobile phone, even when they insert a new SEVI card in the mobile phone or factory reset the mobile phone. [00080] In an aspect, unique hardware id (UfflD) encryption module can be part of the operating system of the mobile phone.
[00081] In another aspect, each mobile phone can be configured with a user registration module that can receive the encrypted UfflD from unique hardware id (UfflD) encryption module when the mobile phone is switched on for the first time, wherein the registration module can, at the time, prompt original user for a default e-mail id for all communications from the company if the mobile phone gets stolen, which can be as part of the user creating an account with the operating system/mobile phone, which is a usual procedure for most current mobile phones. In an aspect, user registration module can be so configured that providing of this default e-mail id by the original user can be an essential requirement to proceed with further usage of the mobile phone as it forms part of the account registration/creation stage. In another aspect, user registration module can store this default e-mail id.
[00082] In an aspect, user registration module can be configured to determine the location where, and date and time stamp when, the mobile phone was first switched on by the original user. In another aspect, user registration module can store the location where and date and time stamp when mobile phone was first switched on.
[00083] In an aspect, user registration module can send the encrypted UfflD, original user's default e-mail id, and the location where and date and time stamp when mobile phone was first switched on to user details storage module that can store these details in user table .
[00084] In another aspect, when original user switches on his mobile phone for the first time, user registration module can prompt original user for an alternate phone number for all communications from the company if his mobile phone gets stolen and can forward this alternate phone number also along with above information to user details storage module that can store this information in user table along with the other information for the same encrypted UfflD.
[00085] In another aspect, when original user inserts his SEVI card for the first time and switches on his mobile phone, user registration module can determine the mobile phone number (also called the original user phone number hereon after) associated with the SEVI card and the location where and date and time stamp when the SEVI card was inserted.
[00086] In another aspect, user registration module can send the original user mobile phone number, location where and date and time when the SEVI card was inserted, and encrypted UHID of the mobile phone to user details storage module that can store this information in user table along with the other information for the same encrypted UHK).
[00087] In another aspect, the original user can start his mobile phone for the first time only after inserting a SIM card. In this aspect, user registration module can send encrypted UHID, default e-mail id of original user, original user's mobile phone number, alternate phone number (if provided by original user), location where and date and time stamp when mobile phone was first switched on to user details storage module.
[00088] In an aspect user registration module can be part of the operating system of the mobile phone.
[00089] In an aspect, all communications between user registration module and user details storage module can be via Internet or SMS whichever available, or both.
[00090] In an aspect, user details storage module can be configured with user table. In another aspect, user table can store information pertaining to user details of all mobile phones sold by the company.
[00091] In an aspect, user details storage module can receive from user registration module, the encrypted UHK), original user's default e-mail id, and the location where and date and time stamp when a mobile phone was first switched on and can store this data in user table.
[00092] In another aspect, user details storage module can receive an alternate phone number provided by the original user for all communications from the company if his mobile phone gets stolen (if provided by the original user when the mobile phone was first switched on) and can store this information in user table along with the other information for the same encrypted UHK).
[00093] In another aspect, when the original user enters his SEVI card in his mobile phone for the first time and switches it on, user details storage module can receive the encrypted UHK), original user mobile phone number, location where and date and time stamp when the SEVI card was inserted from user registration module.
[00094] In an aspect, user details storage module can store this information in user table along with the other information for the same encrypted UHID.
[00095] In an aspect, the original user can start his mobile phone for the first time only after inserting a SEVI card. In this aspect, user details storage module can receive encrypted UHID, default e-mail id of original user, original user's mobile phone number, alternate phone number (if provided by original user), location where and date and time stamp when mobile phone was first switched on from the user registration module and can store these details in user table. In an aspect, it would be appreciated that provision of alternate phone number is not mandatory and is only an embodiment, wherein the details of the new SEVI can always also be sent to the registered email address of the user at the server or through any other means that the proposed system may configure, all of which are well within the scope of the present disclosure.
[00096] In another aspect, in such a fashion user details storage module can receive information from user registration modules of different mobile phones, and can add this information to user table, each row of user table storing information of each original user containing for each original user the encrypted UHID of his mobile phone, his registered e-mail id, original user mobile phone number, alternate phone number (if provided by user), location where and date and time stamp when the mobile phone was switched on for the first time and location where and date and time stamp when a SEVI card was inserted for the first time in the mobile phone. In an aspect, this information dataset can be called original user information
[00097] In an aspect, user details storage module can receive new information from SEVI card change module each time the SIM card of a mobile phone is taken out and the same SEVI card with same mobile phone number, or a new SEVI card with same mobile phone number or a new SEVI card with different mobile phone number is inserted.
[00098] In another aspect, new information can contain encrypted UHID of the mobile phone, current user mobile phone number, new location where and new date and time stamp when the same SIM card with same mobile phone number, or a new SEVI card with same mobile phone number or a new SEVI card with different mobile phone number is inserted in the mobile phone.
[00099] In an aspect, user details storage module can store this new information in user table by appending this new information to existing information for same encrypted UHID.
[000100] In an aspect, user details storage module can pass this new information to user details compare module for any encrypted UHID. In another aspect, user details storage module can pass the original user information to user details compare module for the same encrypted UHID. [000101] In an aspect, user details storage module configured with user table can be configured on a server such as the mobile phone/device company's servers.
[000102] In an aspect, all communication between the user registration module and user details storage module can be via Internet or SMS whichever available, or both.
[000103] In an aspect, user details comparison module can be configured to receive new information from user details storage module for any encrypted UHID. In another aspect, user details comparison module can be configured to receive original user information from user details storage module for the same encrypted UHID. In another aspect, user details comparison module can be configured to compare new information received from user details storage module with the original user information received from user details storage module for the same encrypted UHID. In another aspect, on such comparison, user details comparison module can determine if current user mobile phone number for an encrypted UHID is different from the original user mobile phone number of the same encrypted UHID and if so, can pass on location where and date and time stamp when the new SIM card with current user mobile phone number was inserted in the mobile phone to original user communication module. In an aspect user details comparison module can be configured on the Company's servers.
[000104] In an aspect, SEVI card change detection module can be configured to be activated any time the SIM card of a mobile phone is taken out, and either the same SEVI card or another SEVI card put back in the mobile phone. In an aspect, SIM card change detection module can be configured to send new information containing encrypted UHID, current user mobile phone number, new location where and new date and time stamp when the same SEVI card with the same mobile phone number is put back in the mobile phone to user details storage module. In another aspect, SIM card change detection module can be configured to send new information containing encrypted UHID, current user mobile phone number, new location where and new date and time stamp when a new SEVI card with the same mobile phone number is put back in the mobile phone to user details storage module. In another aspect, SEVI card change detection module can be configured to send new information containing encrypted UHID, current user mobile phone number, new location where and new date and time stamp when a new SEVI card with a new mobile phone number is put back in the mobile phone to user details storage module. In yet another aspect, SIM card change detection module can be configured to be part of the operating system of the mobile phone.
[000105] In an exemplary implementation, when a thief steals the mobile phone and inserts a new SIM card and also resets the phone settings, when the user switches on the phone, a communication would be sent to server where mapping between email id, original users phone number, and UHID is stored, and a comparison can be made to determine that the stored phone number mapped to the UHID is different from the new phone number of the user. Even the email id that the original user registered with would be different from the new email id that the thief would register himself/herself with, and hence such incorrect mapping can easily be detected, based on which a flag/alarm can be raised and information can be sent to the alternate phone number of the user giving details of the location, new phone number of the mobile phone. Therefore, the present invention, owning to the stored/secured/encrypted mapping between the UHID and the original phone number/email id, any change in such mapping can be quickly detected and action can be taken to location the stolen phone.
[000106] In an aspect, original user communication module can be configured to inform original user that "new SEVI card inserted" along with location where and date and time stamp when the new SEVI card was inserted when so instructed by user details change detection module using the registered E-mail id and alternate phone number of the original user (if provided by the original user when mobile phone was switched on the first time). In another aspect, original user communication module can send such information to original user using Internet or SMS whichever available, or both. In an aspect original user communication module can be configured on the Company's servers.
[000107] In an exemplary embodiment of the disclosure, upon receiving such information from original user communication module, original user can reach out to the Customer Care centre of the Company with proof of mobile phone purchase (such as invoice) and original mobile phone number. Upon receipt of such proof, the customer care centre can access the current mobile phone number from user table using the encrypted UHID of the mobile phone and give the current mobile phone number to the original user. Original user can use this information to recover his mobile phone through proper legal procedures. In an aspect, all communication between original user communication module and original user can take place via Internet or SMS whichever available, or both.
[000108] In an embodiment of the present disclosure, the Customer Care centre of the Company can send a signal to the mobile phone deleting all present data on it when so requested by the original user after duly authenticating him. In another embodiment of the present disclosure, the Customer Care centre of the Company can send a signal to the mobile phone preventing its further use ('locking' it) when so requested by the original user after duly authenticating him.
[000109] FIG. 1 illustrates an exemplary representation of an overall architecture of the system and method in accordance with an embodiment of the present disclosure.
[000110] Architecture 100 can include a plurality of mobile phones of which one is illustrated as 102. Mobile phone 102 can be operatively connected to a server 104 having a user table 106.
[000111] In an aspect, each mobile phonel02 can have a unique hardware identification key (also called UHID herein after) provided by the manufacturer of the mobile phone. The UHID can be a long alphanumeric identifier of mobile phone 102 ranging anywhere but not limited to ten to sixteen characters. It can be configured to be unchangeable, not dependent on any application software and unique for every mobile phone.
[000112] In an aspect, the unique hardware id (UHID) of mobile phone 102 can be, for instance, a central processing unit (CPU) or SoC (System on Chip) Serial Number, ICCID (Integrated CircuitCard Identifier) or any other hardware identity or combinations of these. The UHID of the mobile phone can be configured in such a fashion that it is not possible to remove or spoof it.
[000113] In an aspect, the system and method of the present disclosure can be so configured that no user can change the UHID of the mobile phone even when they insert a new SIM card in the mobile phone or factory reset the mobile phone.
[000114] In an aspect, when original user starts mobile phone 102 for the first time, the operating system of mobile phonel02 can be configured to encrypt the UHID.
[000115] In another aspect, when original user starts mobile phone 102 for the first time, the operating system of mobile phone 102 can prompt original user for a default e-mail id (as part of account creation process) for all communications from the company if mobile phone 102 gets stolen. In an aspect, operating system of mobile phone 102 can be so configured that providing of this default e-mail id by the original user can be an essential requirement to proceed with further usage of mobile phone 102. In another aspect, operating system of mobile phone 102 can store this default e-mail id.
[000116] In another aspect, when original user starts mobile phone 102 for the first time , the operating system of mobile phone 102 can be configured to determine the location where and date and time stamp when mobile phone 102 was first switched on. In another aspect operating system of mobile phone 102 can store the location where and date and time stamp when mobile phone 102 was first switched on.
[000117] In an aspect, operating system of mobile phone 102 can be configured to send the encrypted UfflD, original user's default e-mail id, and the location where and date and time stamp when mobile phone 102 was first switched on to servers 104 maintained by the manufacturer/company which can be configured to store this information in user table 106.
[000118] In another aspect, when original user starts mobile phone 102 for the first time, operating system of mobile phone 102 can prompt original user for an alternate phone number for all communications from the company if mobile phone 102 gets stolen and forward this alternate phone number also along with above information to servers 104 maintained by the Company that can be configured to store this information in user table 106 along with the other information for the same encrypted UfflD.
[000119] In another aspect, when the original user inserts his SEVI card for the first time, the operating system of mobile phone 102 can be configured to determine mobile phone 102number (also called the original user mobile phone number hereon after) associated with the SEVI card and the location where and date and time stamp when the SIM card was inserted. In another aspect, the operating system of mobile phone 102 can be configured to send the original user mobile phone number, location where and date and time when the SEVI card was inserted and encrypted UfflD of mobile phone 102to the company's servers 104. The company servers 104 can be configured to store this information in user table 106 along with the other information for the same encrypted UfflD. [000120] In an aspect, the original user can start his mobile phone for the first time only after inserting a SIM card. In this aspect, the operating system of phone 102 can be configured to send encrypted UfflD of mobile phone 102, default e-mail id of original user, original user's mobile phone number, alternate phone number (if provided by original user), location where and date and time stamp when mobile phone 102 was first switched on to the company's servers 104 that can be configured to store this information in user table 106.1n such a fashion, user table 106 can store information regarding encrypted UHID, default e-mail id of original user, original user mobile phone number, alternate phone number and the location where and date and time stamp when the SIM card was inserted for the first time in mobile phone 102. In an aspect this information can be called original user information. In an aspect, the operating system of mobile phone 102 can be configured to enable all communications between mobile phone 102 and company servers 104 using Internet or SMS whichever available, or both.
[000121] Mobile phone 102 can get stolen or misplaced. In both these scenarios, it can get in the hands of current user who can then attempt to use it. The user who has stolen the phone can, of course, use it only by putting in a new SIM card with a different mobile phone number, and when such a user who has stolen the phone (current user), the operating system of mobile phone 102 can detect that a new SIM card has been inserted into mobile phone 102. In an aspect, operating system of mobile phone 102 can be configured to send encrypted UHID, current user mobile phone number and the location where and date and time stamp whenever a new SIM card is inserted into mobile phone 102 to company servers 104 that can be configured to store this information in user table 106 along with the other information for the same encrypted UHID. In an aspect this information can be called new user information. In an aspect, such information may not be stored but compared against the earlier information stored for the UHID, and matched to confirm if there is a change, and if affirmative, can send an email/notify the original user on the alternate number that a new SEVI has been inserted into the mobile phone.
[000122] In an aspect, company servers 104 can be configured to compare original user information to current/new/thief user information, and determine if the current user mobile phone number is different from original user mobile phone number. In such a case, company servers 104 can be configured to inform original user that " new SEVI card inserted" along with the location where and date and time stamp when the new SIM card was inserted into mobile phone 102, using the default e-mail id of original user and alternate phone number if provided by him at the time when mobile phone 102 was first started. In an aspect, all communication between company server 104 and original user can take place via Internet or SMS whichever available, or both.
[000123] In an exemplary embodiment of the disclosure, upon receiving such information from the company, original user can reach out to the Customer Care centre 108 of the Company with proof of mobile phone purchase (such as invoice) and original mobile phone number. Upon receipt of such proof, the customer care centre can access the current mobile phone number from user table 106 using the encrypted UfflD of mobile phone 102 and give the current mobile phone number to the original user. Original user can use this information to recover his mobile phone through proper legal procedures. In an embodiment of the present disclosure, the Customer Care centre 108 of the Company can send a signal to the mobile phone deleting all present data on it when so requested by the original user after duly authenticating him. In another embodiment of the present disclosure, the Customer Care centre 108 of the Company can send a signal to the mobile phone preventing its further use ('locking' it ) when so requested by the original user after duly authenticating him.
[000124] FIG. 2 illustrates exemplary functional modules of the proposed system and method in accordance with an embodiment of the present disclosure. As shown, in an exemplary implementation, system and method of the present disclosure can include unique hardware id (UHID) encryption module 202, user registration module 204, user details storage module 206 with user information table 212, user details comparison module 208, SEVI card change detection module 210, and original user communication module 214.
Unique Hardware II) ( I I II) ) encryption module 202
[000125] In an aspect, each mobile phone can be configured with a unique hardware id (UHID) encryption module 202. Unique hardware id (UHID) encryption module 202 can be configured to encrypt the UHID of the mobile phone when the mobile phone is started for the first time by the original user. In another aspect, unique hardware id (UHID) encryption module 202 can apply an encoding function to the UHID of the mobile phone to generate an encrypted UHID. In another aspect the definition of the encoding function can change after every fixed time period. In an aspect this fixed time period can be determined by the operating system of the mobile phone. In such a fashion, unique hardware id (UHID) encryption module 202 can generate an encrypted UHID which can be very difficult to modify without the encoding function. In an aspect, unique hardware id (UHID) encryption module 202 can send the encrypted UHID to user registration module 204. In an aspect unique hardware id (UHID) encryption module 202 can be part of the operating system of the phone.
User registration module 204
[000126] In an aspect, each mobile phone can be configured with a user registration module 204. In an aspect, when original user switches on his mobile phone for the first time, user registration module 204 can receive the encrypted UHID from unique hardware id encryption module 202. In an aspect, when original user switches on his mobile phone for the first time, user registration module 204 can prompt original user for a default e-mail id for all communications from the company if the mobile phone gets stolen. In an aspect user registration module 204 can be so configured that providing of this default e-mail id by the original user can be an essential requirement to proceed with further usage of the mobile phone. In another aspect user registration module 204 can store this default e-mail id. In an aspect, user registration module 204 can be configured to determine the location where and date and time stamp when the mobile phone was first switched on by the original user. In another aspect user registration module 204 can store the location where and date and time stamp when mobile phone 102 was first switched on.In an aspect, user registration module 204 can send the encrypted UHID, original user's default e-mail id and the location where and date and time stamp when mobile phone was first switched on to user details storage module 206 that can store these details in user table 212.
[000127] In another aspect, when original user switches on his mobile phone for the first time, user registration module 204 can prompt original user for an alternate phone number for all communications from the company if his mobile phone gets stolen and can forward this alternate phone number also along with above information to user details storage module 206 that can store this information in user table 212 along with the other information for the same encrypted UHID. In another aspect, when original user inserts his SEVI card for the first time and switches on his mobile phone, user registration module 204 can determine the mobile phone number (also called the original user phone number hereon after) associated with the SIM card and the location where and date and time stamp when the SIM card was inserted. In another aspect, user registration module 204 can send the original user mobile phone number, location where and date and time when the SIM card was inserted and encrypted UHID of the mobile phone to user details storage module 206 that can store this information in user table 212 along with the other information for the same encrypted UHID. In another aspect, the original user can start his mobile phone for the first time only after inserting a SIM card. In this aspect, user registration module 204 can send encrypted UHID, default e-mail id of original user, original user's mobile phone number, alternate phone number (if provided by original user), location where and date and time stamp when mobile phone was first switched on to user details storage module 206 that can store this information in user table 212.
[000128] In an aspect user registration module 204 can be part of the operating system of the mobile phone. In an aspect all communication between user registration module 204 and user details storage module 206 can be via Internet or SMS whichever available, or both.
User details storage module 206 and user table 212
[000129] In an aspect, user details storage module 206 can be configured with user table 212. In another aspect, user table 212 can store information pertaining to user details of all mobile phones sold by the company. In an aspect, user details storage module 206 can receive from user registration module 204the encrypted UHID, original user's default e-mail id and the location where and date and time stamp when a mobile phone was first switched on and can store this data in user table 212.1n another aspect, user details storage module 206 can receive an alternate phone number provided by the original user for all communications from the company if his mobile phone gets stolen (if provided by the original user when the mobile phone was first switched on) and can store this information in user table 212 along with the other information for the same encrypted UHID.
[000130] In another aspect, when the original user enters his SEVI card in his mobile phone for the first time and switches it on, user details storage module 206 can receive the encrypted UHID, original user mobile phone number, location where and date and time stamp when the SIM card was inserted from user registration module 204. In an aspect, user details storage module 206 can store this information in user table 212 along with the other information for the same encrypted UHID. In an aspect, the original user can start his mobile phone for the first time only after inserting a SIM card. In this aspect, user details storage module 206 can receive encrypted UHID, default e-mail id of original user, original user's mobile phone number, alternate phone number (if provided by original user), location where and date and time stamp when mobile phone was first switched on from the user registration module 204 and can store these details in user table 212.
[000131] In another aspect, in such a fashion user details storage module 206 can receive information from user registration modules204of different mobile phones and can add this information to user table 212, each row of user table 212 storing information of each original user containing for each original user the encrypted UHID of his mobile phone, his registered e- mail id, original user mobile phone number, alternate phone number (if provided by user), location where and date and time stamp when the mobile phone was switched on for the first time and location where and date and time stamp when a SEVI card was inserted for the first time in the mobile phone. In an aspect, this information dataset can be called original user information.
[000132] In an aspect, user details storage module 206 can receive new information from SEVI card change module 210 each time the SIM card of a mobile phone is taken out and the same SEVI card with same mobile phone number, or a new SIM card with same mobile phone number or a new SEVI card with different mobile phone number is inserted. In another aspect, new information can contain the encrypted UHID of the mobile phone, current user mobile phone number, new location where and new date and time stamp when the same SEVI card with same mobile phone number, or a new SIM card with same mobile phone number or a new SIM card with different mobile phone number is inserted in the mobile phone.
[000133] In an aspect, user details storage module 206 can store this new information in user table 212 by appending this new information to existing information for same encrypted UHID. In an aspect, user details storage module 206 can pass this new information to user details comparison module 208 for any encrypted UHID. In another aspect, user details storage module 206 can pass the original user information to user details comparison module 208 for the same encrypted UHK). In an aspect, user table 212 may also be configured not to store the new information before the same is compared/verified and found to be correct.
[000134] In an aspect user details storage module 206 configured with user table 212 can be configured on the Company's servers. In an aspect, all communication between the user registration module 204 and user details storage module 206 can be via Internet or SMS whichever available, or both.
User details compare module 208
[000135] In an aspect, user details comparison module 208can receive new information from user details storage module 206 for any encrypted UHID. In another aspect, user details comparison module 208can receive original user information from user details storage module 206 for the same encrypted UHID.
[000136] In an aspect, user details comparison module 208can compare new information received from user details storage module 206 with the original user information received from user details storage module 206 for the same encrypted UHID. In another aspect, on such comparison, user details comparison module 208 can determine if current user mobile phone number for an encrypted UHID is different from the original user mobile phone number of the same encrypted UHID and if so, can pass on location where and date and time stamp when the new SIM card with current user mobile phone number was inserted in the mobile phone to original user communication module 214.
[000137] In an aspect user details comparison module 208 can be configured on the Company's servers.
SIM card change detection module 210
[000138] In an aspect, SIM card change detection module 210 can be configured to be activated any time the SIM card of a mobile phone is taken out and either the same SEVI card or another SEVI card put back in the mobile phone. [000139] In an aspect, SIM card change detection module 210 can be configured to send new information containing encrypted UHK), current user mobile phone number, new location where and new date and time stamp when the same SIM card with the same mobile phone number is put back in the mobile phone to user details storage module 206.
[000140] In an aspect, SIM card change detection module 210 can be configured to send new information containing encrypted UfflD, current user mobile phone number, new location where and new date and time stamp when a new SIM card with the same mobile phone number is put back in the mobile phone to user storage module 206.
[000141] In an aspect, SIM card change detection module 210 can be configured to send new information containing encrypted UfflD, current user mobile phone number, new location where and new date and time stamp when a new SIM card with a new mobile phone number is put back in the mobile phone to user details storage module 206.
[000142] In an aspect, SIM card change detection module 210 can be configured to be part of the operating system of the mobile phone.
Original user communication module 214
[000143] In an aspect, original user communication module 214 can inform original user that "new SIM card inserted" along with location where and date and time stamp when the new SIM card was inserted when so instructed by user details compare module 208 using the registered E-mail id and alternate phone number of the original user (if provided by the original user when mobile phone was switched on the first time). In another aspect, original user communication module 214can send such information to original user using Internet or SMS whichever available, or both.
[000144] In an aspect original user communication module 214 can be configured on the Company's servers.
[000145] In an exemplary embodiment of the disclosure, upon receiving such information from original user communication module 214, original user can reach out to the Customer Care centre of the Company with proof of mobile phone purchase ( such as invoice ) and original mobile phone number. Upon receipt of such proof, the customer care centre can access the current mobile phone number from user table 212 using the encrypted UfflD of the mobile phone and give the current mobile phone number to the original user. Original user can use this information to recover his mobile phone through proper legal procedures.
[000146] In an aspect, all communication between original user communication module 214 and original user can take place via Internet or SMS whichever available, or both.
Working of the System
[000147] In an exemplary embodiment of the present disclosure, each mobile phone sold by the company can have a UHK) that can be encrypted by unique hardware id encryption module 202 in the mobile phone to generate an encrypted UHK) when the mobile phone is switched on for the first time by its original user. Each mobile phone can have a user registration module 204 which can receive the encrypted UHK) from unique hardware id encryption module 202. When the mobile phone is switched on for the first time, user registration module 204can prompt the original user to provide a default e-mail id for all communications from the company if the mobile phone gets stolen, can store the default e-mail id and can also determine and store the location where and date and time stamp when mobile phone was first switched on. The user registration module 204 can send the encrypted UtKD, original user's default e-mail id and the location where and date and time stamp when mobile phone was first switched on to user details storage module 206 that can store these details in user table 212.
[000148] In another aspect, user registration module 204 can also prompt the original user for an alternate phone number for all communications from the company if his/her mobile phone gets stolen, and can forward this alternate phone number also along with above information to user details storage module 206 that can store this information along with the other information for the same encrypted UHK).
[000149] When original user inserts his SEVI card for the first time and switches on his mobile phone, user registration module 204 can determine the mobile phone number (also called the original user mobile phone number) associated with the SEVI card and the location where and date and time stamp when the SEVI card was inserted and can send the original user mobile phone number, location where and date and time when the SEVI card was inserted and encrypted UtKD of the mobile phone to user details storage module 206 that can store this information in user table 212 along with the other information for the same encrypted UHID. [000150] In such a fashion, user details storage module 206 can receive information from user registration modules 204 of different mobile phones and can add this information to user table 212, each row of user table 212 storing information of each original user containing for each original user the encrypted UHID of his mobile phone, his registered e-mail id, original user mobile phone number, alternate phone number (if provided by user), location where and date and time stamp when the mobile phone was switched on for the first time and location where and date and time stamp when a SEVI card was inserted for the first time in the mobile phone. In an aspect, this information dataset can be called original user information.
[000151] Each mobile phone can have a SEVI card change detection module 210 that can be activated any time a SIM card is taken out from the mobile phone and either the same or a new SEVI card inserted with either the same or a new mobile phone number. SIM card change detection module can send new information to user details storage module 206. This new information can include encrypted UHID of the mobile phone, current user mobile phone number, new location where and new date and time stamp when the same SEVI card with same mobile phone number, or a new SIM card with same mobile phone number or a new SEVI card with different mobile phone number is inserted in the mobile phone. The user details storage module 206 can store this new information in user table 212 by appending this new information to existing information for same encrypted UHID.
[000152] The user details comparison module 208 can compare original user information to the new information each time a SEVI card is inserted in any mobile phone. If the user details module 208 finds that the current user mobile phone information is different from original user information, it can instruct the original user communication module 214 to inform original user that "new SEVI card inserted" along with location where and date and time stamp when the new SEVI card was inserted. Upon receiving such information from original user communication module 214, original user can reach out to the Customer Care centre of the Company with proof of mobile phone purchase (such as invoice) and original mobile phone number. Upon receipt of such proof, the customer care centre can access the current mobile phone number from user table 212 using the encrypted UHID of the mobile phone and give the current mobile phone number to the original user. Original user can use this information to recover his mobile phone through proper legal procedures. [000153] In an aspect, user registration module 204 and SIM card change detection module 210 can be part of the operating system of the mobile phone. In another aspect, user details storage module 206 with user table 212, user details comparison module208, and original user communication module 214 can be configured to be on company servers or any other server/computing device. In yet another aspect, all communication between user registration module 204 and user details storage module 206 can be via Internet or SMS whichever available or both. In yet another aspect, all communication between original user communication module 214 and original user can take place via Internet or SMS whichever available, or both.
[000154] FIGs. 3A, 3B, 3C and 3D illustrate examples of the operation of the proposed system and method in accordance with an embodiment of the present disclosure.
[000155] FIG. 3A illustrates the how the proposed system and method can operate when an original user takes out his mobile phone's SFM card and simply reinserts it.
[000156] In such an instance, new information of location where and date and time stamp when SIM card was reinserted is recorded in server, and compared with original user information. Since no change is found in the user mobile phone number information, no communication is sent to the original user.
[000157] FIG. 3B illustrates the how the proposed system and method can operate when an original user takes out his mobile phone's SFM card and reinserts a new SFM card but with the same mobile phone number as that of the earlier SFM card. In such an instance, new information of location where and date and time stamp when SFM card was reinserted is recorded in server, and compared with original user information. Since no change is found in the user mobile phone number information, no communication is sent to the original user.
[000158] FIG. 3C illustrates the how the proposed system and method can operate when an original user takes out his mobile phone's SFM card and reinserts a new SFM card with a new mobile phone number. In such an instance, new information of location where and date and time stamp when SFM card was reinserted is recorded in server, and compared with original user information. Since a change is found in the user mobile phone number information, a communication is sent to the original user saying " New SFM card inserted" and providing the location where and date and time stamp when the new SIM card was inserted. Since the original user knows about it, he ignores this communication and the process ends. [000159] FIG. 3D illustrates the how the proposed system and method can operate when an original user has lost his mobile phone or it has been stolen and a new user tries to use the mobile phone by inserting a new SIM card with a new mobile phone number, with or without factory resetting the mobile phone. In such an instance, new information of location where and date and time stamp when SIM card was reinserted is recorded in server, and compared with original user information. Since a change is found in the user mobile phone number information, a communication is sent to the original user saying " New SIM card inserted" and providing the location where and date and time stamp when the new SIM card was inserted.
[000160] Since the original user knows that he/she has misplaced his mobile phone or that the same has been stolen, the user can contact customer care department of the Company, which customer care department can authenticate the original user by means such as purchase invoice data, original user mobile phone number etc. and then issue the user the new user's/current users/thief mobile phone number. The original user can use the new user mobile phone number to recover his mobile phone by due process of law.
[000161] FIG. 4 illustrates via a sequence diagram an exemplary implementation of the method of the proposed system in accordance with an embodiment of the present disclosure.
[000162] As shown, at step 402 the method includes original user inserting a SFM card in his mobile phone and then switching it on for the first time. At step 404, the method includes the mobile phone generating original user data that can include encrypted UHID, default e-mail id as provided by original user, original user mobile phone number, alternate phone number (if provided by original user), location, date and time stamp when mobile phone first switched on and location, date and time stamp when first SIM card inserted in it; and sending it to Company Server. At step 406, the method includes the server storing the original user data for each original user. At step 408, the method includes a new user inserting a new SFM card with a new mobile phone number and switching on the mobile phone. At step 410, the method includes the mobile phone detecting such a change and generating new information comprising encrypted UHID, new mobile phone number, location, date and time stamp when new SIM card was inserted in the mobile phone and mobile phone switched on; and sending it to Company Server. At step 412, the method includes server receiving and storing the new information. At step 414, the method includes server comparing original user data to the new information each time a SIM card is inserted in the mobile phone and determining if current user mobile phone number information is different from original user mobile phone number in original user information. At step 416, the method includes sending a message to original user saying "new SIM card inserted" along with location where and date and time stamp when the new SIM card was inserted, if the current user mobile phone number information is different from original user mobile phone number in original user information. At step 418, the method includes original user receiving this message on his default E-mail id and alternate phone number (if provided by original user) by Internet or SMS whichever available, or both.
[000163] FIG. 5A to 5C illustrate in summary flow chart form exemplary representations of the working of the proposed system and method in accordance with an embodiment of the present disclosure, under different situations.
[000164] As illustrated in FIG. 5A, at step 502 original user can switch on the mobile phone without inserting a SFM card for the first time. At step 504, the system can prompt him for his default e-mail id which then the operating system of the mobile phone can send to the company server, along with encrypted UHID, location and date and time stamp the mobile phone was first started as shown at step 506.1n another aspect, the operating system of the mobile phone can also prompt original user for an alternate phone and can send the same also along with encrypted UHID, location and date and time stamp the mobile phone was first started to the company server.
[000165] At step 508, original user can insert a SFM card into the mobile phone and start it after such insertion for the first time. As shown in step 510, the system can send encrypted UHID, original user mobile phone number, location and date and time stamp when the SIM card was inserted the first time to company server. At step 512, at anytime thereafter a user can start the mobile phone after inserting a SFM card. Then the operating system can send encrypted UHID, current mobile phone number, location and date and time stamp the SFM card was inserted to company server, as shown at step 514.
[000166] In an embodiment, step 502 and step 508 can happen together, that is, original user can insert a SIM card and then start his phone for the first time and then provide his default e-mail id when prompted. In such a case, the operating system of the mobile phone can send all the information together viz, encrypted UHID of the mobile phone, location and date and time stamp the mobile phone was first started, alternate phone (if provided by original user) and original user mobile phone number to company server.
[000167] As illustrated in FIG.5B, any user can insert a new SEVI card in the mobile phone at step 522 and can switch it on as shown in step 524. Then, as shown in step 526, the operating system of the mobile phone can send new information comprising encrypted UHID, current user mobile phone number, location, date and time stamp when new SIM card was inserted to company server.
[000168] As shown in step 528, based upon the same encrypted UHID, company server can check current user mobile phone number sent by the mobile phone to that previously stored. As shown at step 530, if the current user mobile phone number is the same as earlier original user mobile phone number, the process ends and company server just makes a note of the location, date and time stamp new SEVI card was inserted as shown at step 534. However, if the current user mobile phone number is not the same as earlier original user mobile phone number, company server can send a message to original user saying "A new SIM card inserted into Mobile Phone" with location, date and time stamp the new SEVI card was inserted, as shown at step 532.
[000169] As shown in FIG. 5C, at step 542 original user can get a message notifying him that a new SEVI card has been inserted into his mobile phone along location, date and time stamp the new SEVI card was inserted. As shown in step 544, original user can take different actions depending upon whether his mobile phone is stolen or not. If not, he simply need not do anything and the process ends as shown in step 550. But if his phone is stolen, original user can contact company customer care department with purchase invoice as shown in step 546. After verifying original user credentials based upon the purchase invoice details, company customer care department can give original user the new mobile phone number which his mobile phone is now using. Original user can use this information to contact the new user or to make further attempts to recover his mobile phone by process of law.
[000170] In an aspect, all communication between the mobile phone and company server can take place via internet or SMS whichever available, or both. In another aspect, all communication between company server and original user can take place via Internet or SMS whichever available, or both. [000171] As used herein, and unless the context dictates otherwise, the term "coupled to" is intended to include both direct coupling (in which two elements that are coupled to each other contact each other) and indirect coupling (in which at least one additional element is located between the two elements). Therefore, the terms "coupled to" and "coupled with" are used synonymously. Within the context of this document terms "coupled to" and "coupled with" are also used euphemistically to mean "communicatively coupled with" over a network, where two or more devices are able to exchange data with each other over the network, possibly via one or more intermediary device.
[000172] It should be apparent to those skilled in the art that many more modifications besides those already described are possible without departing from the inventive concepts herein. The inventive subject matter, therefore, is not to be restricted except in the spirit of the appended claims. Moreover, in interpreting both the specification and the claims, all terms should be interpreted in the broadest possible manner consistent with the context. In particular, the terms "comprises" and "comprising" should be interpreted as referring to elements, components, or steps in a non-exclusive manner, indicating that the referenced elements, components, or steps may be present, or utilized, or combined with other elements, components, or steps that are not expressly referenced. Where the specification claims refers to at least one of something selected from the group consisting of A, B, C .... and N, the text should be interpreted as requiring only one element from the group, not A plus N, or B plus N, etc. The foregoing description of the specific embodiments will so fully reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modification within the spirit and scope of the appended claims.
[000173] While embodiments of the present disclosure have been illustrated and described, it will be clear that the disclosure is not limited to these embodiments only. Numerous modifications, changes, variations, substitutions, and equivalents will be apparent to those skilled in the art, without departing from the spirit and scope of the disclosure, as described in the claims.
ADVANTAGES OF THE INVENTION
[000174] The present disclosure provides for a system and method that can help easily locate a stolen mobile phone.
[000175] The present disclosure provides for a system and method that does not require the user to install any application. The system and method uses the operating system itself of the phone and hence cannot be tampered with or removed even when the mobile phone is "factory reset" or all its data is wiped clean.
[000176] The present disclosure provides for a system and method that does not depend upon any parameter of the mobile phone that can be duplicated or removed, and instead relies upon hardware identifiers or their combinations that are further encrypted, making it impossible for anyone to duplicate or remove such identifiers and still keep the mobile phone operational.
[000177] The present disclosure provides for a system and method that informs the original user as soon as anyone else starts using his phone and also provides the location where his phone is being used, based on which the original user can find out the new phone number which is being used with his mobile phone and so can easily recover his phone by proper legal procedure.

Claims

We Claim:
1. A system for locating a stolen mobile phone, said system comprising:
a user registration module configured to enable an original user to register with the system based on user information comprising one or a combination of email identifier of the original user, original phone number of the original user, and an alternate phone number of the original user, wherein the user registration module is configured to enable user information to be mapped to and stored along with a unique hardware identifier (UHID) of the mobile phone in a first computing device;
a SEVI card change detection module configured to detect when a new SIM card is inserted into the mobile phone, and accordingly, send new information comprising one or a combination of UHID, new phone number, location, date and time stamp when the new SEVI card was inserted in the mobile phone to the first computing device;
a user details comparison module configured to compare the new information with original user information to evaluate, based on common UHID, if original phone number is different from the new phone number; and
an original user communication module configured to send a notification to the original user on the alternate phone number/email identifier that a difference in original phone number has been determined, along with sending location where and date and time stamp when the new SEVI card was inserted in the mobile phone.
2. The system of claim 1, wherein the system further comprises a unique hardware ID (UHID) encryption module that is configured to enable the UHID to be encrypted and then stored in the first computing device.
3. The system of claims 1, wherein the first computing device is a server.
4. The system of claim 1 , wherein the user information further comprises location, date and time stamp when the mobile phone was first switched on and location, date and time stamp when the first SEVI was inserted in the mobile phone.
5. The system of claim 1, wherein the original user uses the notification to track the mobile phone and/or proceed legally to acquire the phone through customer care/court.
6. The system of claim 1, wherein the user information and/or the new information is sent by operating system of the mobile phone, and stored in a table of the first computing device.
7. The system of claim 1, wherein the UHID is configured with the hardware of the mobile phone such that the same is not accessible and/or is tamper-proof.
8. A method for locating a stolen mobile phone, said method comprising the steps of:
enabling an original user to register with the system based on user information comprising one or a combination of email identifier of the original user, original phone number of the original user, and an alternate phone number of the original user, wherein the user information is mapped to and stored along with a unique hardware identifier (UHID) of the mobile phone in a first computing device;
detecting when a new SEVI card is inserted into the mobile phone, and accordingly, send new information comprising one or a combination of UHID, new phone number, location, date and time stamp when the new SEVI card was inserted in the mobile phone to the first computing device;
comparing the new information with original user information to evaluate, based on common UHID, if original phone number is different from the new phone number; and sending a notification to the original user on the alternate phone number/email identifier that a difference in original phone number has been determined, along with sending location where and date and time stamp when the new SEVI card was inserted in the mobile phone to the original user.
9. The method of claim 1 , wherein the user information further comprises location, date and time stamp when the mobile phone was first switched on and location, date and time stamp when the first SEVI was inserted in the mobile phone.
10. The method of claim 1, wherein the original user uses the notification to track the mobile phone and/or proceed legally to acquire the phone through customer care/court.
PCT/IB2016/056789 2015-11-26 2016-11-11 Locating stolen mobile phone based on unique hardware identifier WO2017089922A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN6341/CHE/2015 2015-11-26
IN6341CH2015 2015-11-26

Publications (1)

Publication Number Publication Date
WO2017089922A1 true WO2017089922A1 (en) 2017-06-01

Family

ID=58764016

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2016/056789 WO2017089922A1 (en) 2015-11-26 2016-11-11 Locating stolen mobile phone based on unique hardware identifier

Country Status (1)

Country Link
WO (1) WO2017089922A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109982268A (en) * 2017-12-28 2019-07-05 富泰华工业(深圳)有限公司 Electronic device, lost article searching device and lost article recover method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140323115A1 (en) * 2008-11-25 2014-10-30 Broadcom Corporation Communication Method And Infrastructure Supporting Device Security And Tracking Of Mobile And Portable Multimedia Devices
WO2015077947A1 (en) * 2013-11-28 2015-06-04 任明 System for recovering lost device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140323115A1 (en) * 2008-11-25 2014-10-30 Broadcom Corporation Communication Method And Infrastructure Supporting Device Security And Tracking Of Mobile And Portable Multimedia Devices
WO2015077947A1 (en) * 2013-11-28 2015-06-04 任明 System for recovering lost device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109982268A (en) * 2017-12-28 2019-07-05 富泰华工业(深圳)有限公司 Electronic device, lost article searching device and lost article recover method

Similar Documents

Publication Publication Date Title
US11704134B2 (en) Device locator disable authentication
US9306944B2 (en) Secure information handling system matrix bar code
CN103347131B (en) A kind of intelligent mobile phone anti-theft method and system
US7448087B2 (en) System for preventing unauthorized use of recording media
US9070000B2 (en) Secondary information for an information handling system matrix bar code function
CN105279449A (en) Context based data access control
CN105550591A (en) Security protection device and method for user data in mobile terminal
US9497189B2 (en) Method and system for verification of presence
CN108171137B (en) Face recognition method and system
CN102694920A (en) Mobile phone antitheft method
US10958665B2 (en) Consumer and business anti-counterfeiting services using identification tags
CN107995200B (en) Certificate issuing method, identity authentication method and system based on smart card
US20150094023A1 (en) Retroactively Securing a Mobile Device From a Remote Source
US20150169855A1 (en) Method and system for encryption and/or decryption
CN104899496B (en) data reading method and terminal thereof
CN109617703B (en) Key management method and device, electronic equipment and storage medium
KR101638787B1 (en) Mobile ticket security system and method of based location information and terminal unique number
CN105830079A (en) Authentication information management system, authentication information management device, program, recording medium, and authentication information management method
CN108234126B (en) System and method for remote account opening
WO2017089922A1 (en) Locating stolen mobile phone based on unique hardware identifier
WO2016045168A1 (en) Data processing method and data processing apparatus
CN109064197A (en) A kind of supply chain opening registration and Verification System and method based on block chain
CN108024018B (en) Anti-theft and anti-loss mobile phone system, identity recognition firmware and application thereof
CN106991308A (en) Safety certifying method, apparatus and system
CN108270735A (en) A kind of data leakage prevention method and equipment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16868104

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16868104

Country of ref document: EP

Kind code of ref document: A1