WO2018047203A1 - Système et procédé de verrouillage d'un dispositif de communication portable perdu - Google Patents

Système et procédé de verrouillage d'un dispositif de communication portable perdu Download PDF

Info

Publication number
WO2018047203A1
WO2018047203A1 PCT/IN2017/050391 IN2017050391W WO2018047203A1 WO 2018047203 A1 WO2018047203 A1 WO 2018047203A1 IN 2017050391 W IN2017050391 W IN 2017050391W WO 2018047203 A1 WO2018047203 A1 WO 2018047203A1
Authority
WO
WIPO (PCT)
Prior art keywords
portable communication
communication device
locking
lock
otp
Prior art date
Application number
PCT/IN2017/050391
Other languages
English (en)
Inventor
Rohit Rathi
Original Assignee
Smartron India Private Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Smartron India Private Limited filed Critical Smartron India Private Limited
Publication of WO2018047203A1 publication Critical patent/WO2018047203A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning

Definitions

  • the embodiment herein is generally related to the field of mobile communication devices.
  • the embodiment herein is particularly related to a system and method for preventing misuse of lost portable communication device by an unauthorized user.
  • the embodiment herein is more particularly related to a system and method for sending a message to lock a lost (misplaced or stolen) portable communication device.
  • SIM subscriber identity module
  • IMEI equipment identifier
  • Each mobile communication device carries a unique device-id (device identification) which is known as International Mobile Equipment Identity (IMEI) in Global System for Mobile Communications (GSM).
  • IMEI International Mobile Equipment Identity
  • GSM Global System for Mobile Communications
  • This device-id can be used by a network service provider to trace/track the mobile communication device and to block the mobile communication device, if the mobile communication device is stolen and reused by somebody else.
  • GSM network architecture has a node defined in the network called Equipment Identification Register (EIR), which maintains a list of black listed, white listed and grey listed mobile communication devices.
  • EIR Equipment Identification Register
  • the existing methods involves in blocking the IMEI number by communicating with a network provider.
  • the method is deployed to track the IMEI of the devices under service in a network and further map the IMEI with a database of stolen devices. This method is strenuous and does not provide sufficient protection.
  • the primary object of the embodiment herein is to provide a system and method for data security in a portable communication device by providing options for locking the device.
  • Another object of the embodiment herein is to provide a system and method for enabling a biometric scanner to prevent an unauthorized user from flashing the portable communication device.
  • Yet another object of the embodiment herein is to provide a method and system for initiating a trigger message including locking request and device location, when an attempt is made to replace existing SIM (Subscriber Identity Module), thereby preventing misuse of the device.
  • SIM Subscriber Identity Module
  • Yet another object of the embodiment herein is to provide a method and system for initiating a locking of a stolen or lost portable communication device when a SIM is replaced or biometric authentication fails.
  • Yet another object of the embodiment herein is to provide a method and system for locking a lost portable communication device by sending a short media message (SMS).
  • SMS short media message
  • Yet another object of the embodiment herein is to provide a method and system for locking the lost portable communication device by a message that directly communicates with the IMEI number.
  • Yet another object of the embodiment herein is to provide a method and system for locking the lost portable communication device by sending a short media message with lock command.
  • Yet another object of the embodiment herein is to provide a method and system for locking the lost portable communication device by initiating a trigger message from the lost communication device to a registered mobile number with a location information and a lock request.
  • the various embodiments of the embodiment herein disclose a system and method for immediately locking a lost portable communication device by sending a short media service (SMS).
  • SMS initiates a lock command that directly communicates with the IMEI number of the portable communication device.
  • a method for providing data security in a portable communication device is disclosed.
  • a security module is installed under an operating system of the mobile device operating system, wherein each security module comprises components that implement locking function.
  • a user is enabled to initiate a message from a registered mobile device when the portable communication device is lost, wherein the message comprises a lock command.
  • a biometric scanner is activated on initiating a flash request on the portable communication device. The biometric scanner authenticates a user accessing the portable communication device and prevent unauthorized access.
  • a trigger message is initiated from the portable communication device to a registered mobile number when an attempt is made to replace existing SIM.
  • the trigger message comprises a lock request confirmation and a location information of the portable communication device.
  • a One Time Password is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request.
  • the locking application is configured to generate OTP.
  • the locking application is embedded in the factory setting.
  • the registered mobile number is asked to resend the OTP.
  • the locking command application is configured to authenticate and verify the OTP received from the registered number.
  • the application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.
  • a locking of the portable communication device is activated when a SIM is replaced or biometric authentication fails. Thus, locking of the portable communication device provides data security.
  • the message sent from the registered mobile number directly communicates with the IMEI number of the portable communication device to activate locking command.
  • the lock command restricts the functionality of the device.
  • the biometric authentication is at least one of voice analysis, facial recognition, and finger print verification.
  • the step of activating a biometric scanner further comprises enabling the user to access the portable communication device when the biometric authentication is a success.
  • the step of enabling a user to initiate a message further comprises sending a request to a server with contact details and password corresponding to the portable communication device. Further, the portable communication device associated with the contact details is identified. Thereafter, a message is sent from the server to the identified portable communication device.
  • the location information is a GPS location of the device provided by the GPS module.
  • the system for providing data security in a portable communication device comprises an IMEI module, a biometric scanner, a security module, and a GSM module.
  • the security module is installed under an operating system of the mobile device operating system.
  • the security module communicates with a hardware processor coupled to a memory containing instructions configured for implanting locking function.
  • the security module is configured to enable a user to initiate a message from a registered mobile device when the portable communication device is lost, wherein the message comprises a lock command.
  • the security module is configured to activate a biometric scanner on initiating a flash request on the portable communication device.
  • the biometric scanner authenticates a user accessing the portable communication device and prevent unauthorized access.
  • the security module is configured to initiate a trigger message from the portable communication device to a registered mobile number when an attempt is made to replace existing SIM.
  • the trigger message comprises a lock request confirmation and a location information of the portable communication device.
  • the security module is further configured to initiate a locking of the portable communication device when a SIM is replaced or biometric authentication fails.
  • a One Time Password (OTP) is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request.
  • the locking application is configured to generate OTP.
  • the locking application is embedded in the factory setting.
  • the registered mobile number is asked to resend the OTP.
  • the locking command application is configured to authenticate and verify the OTP received from the registered number.
  • the application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.
  • the system further comprises a IMEI module configured to receive message that directly communicates with the IMEI number of the portable communication device.
  • the lock command restricts the functionality of the device.
  • the system further comprises a biometric scanner configured to perform biometric authentication through one of voice analysis, facial recognition, and finger print verification.
  • the system includes a Global Positioning system or GPS module for determining location information.
  • a method for locking a lost portable communication device during an attempt to change SIM (Subscriber Identity Module) in GSM based devices.
  • SIM Subscriber Identity Module
  • the embodiment herein prevents an unauthorized user from removing the SIM.
  • the portable communication device sends a trigger message to a registered number when the unauthorized user removes SIM from the device.
  • the trigger message is any one of an email, and a SMS.
  • a user blocks the SIM in the device so that an authorized person does not misuse the SIM.
  • a method is provided for locking a lost portable communication device during an attempt to flash CDMA based devices.
  • the embodiment herein provides a data security and prevents an unauthorized user from flashing the portable communication device.
  • the portable communication device verifies any user accessing the device using biometrics authentication.
  • the biometric authentication is selected from a group consisting of a voice analysis, a facial recognition, and a finger print verification.
  • the device initiates a lock command when the user fails to verify the identity using biometric data. The lock command restricts the functionality of the device.
  • the security module provides data security and prevents an unauthorized user from using the portable communication device. Further, the security module enables a user to send a lock message to initiate a locking of the lost mobile device, thereby preventing a misuse of the portable communication device.
  • the server permits access to the owner upon submitting a command to lock the device when the mobile device is lost or stolen, by using the contact details and the password of the owner of the lost mobile device.
  • the serial number and/or telephone number of the mobile device is automatically stored in the server for registering with the lock service so that the device is identified when an instruction for locking the mobile device is received from the registered user of the mobile device.
  • a One Time Password is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request.
  • the locking application is configured to generate OTP.
  • the locking application is embedded in the factory setting.
  • the registered mobile number is asked to resend the OTP.
  • the locking command application is configured to authenticate and verify the OTP received from the registered number.
  • the application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.
  • a method for locking a lost portable communication device comprises providing a user interface (UI) to the registered user of the mobile device to provide an option to register for a locking service of a remote device. Further, the registered owner of the mobile device enters an emergency contact number and a password during the registering of the device with the device manufacturer. When a loss of the mobile device is reported, the method involves sending a trigger message to the emergency contact number when an unauthorized user accesses the mobile device.
  • the trigger message includes a location information of the device and a confirmation request to lock the device.
  • the location information is a GPS location of the device.
  • the lock command in the trigger message is a remotely initiated instruction sent via a server to the lost mobile device to stop either a partial of fully operational functionalities of the lost mobile device remotely.
  • a One Time Password (OTP) is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request.
  • the locking application is configured to generate OTP.
  • the locking application is embedded in the factory setting. The registered mobile number is asked to resend the OTP.
  • the locking command application is configured to authenticate and verify the OTP received from the registered number.
  • the application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.
  • FIG. 1 is a flowchart explaining a method for providing data security in a portable communication device.
  • FIG. 2 illustrates a flowchart explaining a method for locking a lost portable device through SMS message, according to one embodiment of the embodiment herein.
  • FIG. 3 illustrates a flowchart explaining a method of locking a lost portable communication device during an attempt to flash
  • FIG. 4 illustrates a flowchart explaining a method of locking a lost portable communication device during an attempt to change SIM (Subscriber Identity Module), according to one embodiment of the embodiment herein.
  • FIG. 5 is a block diagram of a system for providing data security.
  • the various embodiments of the embodiment herein disclose a system and method for immediately locking a lost portable communication device by sending a short media service (SMS).
  • SMS initiates a lock command that directly communicates with the IMEI number of the portable communication device.
  • a method for providing data security in a portable communication device is disclosed.
  • a security module is installed under an operating system of the mobile device operating system, wherein each security module comprises components that implement locking function.
  • a user is enabled to initiate a message from a registered mobile device when the portable communication device is lost, wherein the message comprises a lock command.
  • a biometric scanner is activated on initiating a flash request on the portable communication device. The biometric scanner authenticates a user accessing the portable communication device and prevent unauthorized access.
  • a trigger message is initiated from the portable communication device to a registered mobile number when an attempt is made to replace existing SIM.
  • the trigger message comprises a lock request confirmation and a location information of the portable communication device.
  • a locking of the portable communication device is activated when a SIM is replaced or biometric authentication fails.
  • locking of the portable communication device provides data security.
  • the message sent from the registered mobile number directly communicates with the IMEI number of the portable communication device to activate locking command.
  • the lock command restricts the functionality of the device.
  • the biometric authentication is at least one of voice analysis, facial recognition, and finger print verification.
  • the step of activating a biometric scanner further comprises enabling the user to access the portable communication device when the biometric authentication is a success.
  • the step of enabling a user to initiate a message further comprises sending a request to a server with contact details and password corresponding to the portable communication device. Further, the portable communication device associated with the contact details is identified. Thereafter, a message is sent from the server to the identified portable communication device.
  • a One Time Password is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request.
  • the locking application is configured to generate OTP.
  • the locking application is embedded in the factory setting.
  • the registered mobile number is asked to resend the OTP.
  • the locking command application is configured to authenticate and verify the OTP received from the registered number.
  • the application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.
  • the location information is a GPS location of the device provided by the GPS module.
  • the system for providing data security in a portable communication device comprises an IMEI module, a biometric scanner, a security module, and a GSM module.
  • the security module is installed under an operating system of the mobile device operating system.
  • the security module communicates with a hardware processor coupled to a memory containing instructions configured for implanting locking function.
  • the security module is configured to enable a user to initiate a message from a registered mobile device when the portable communication device is lost, wherein the message comprises a lock command.
  • the security module is configured to activate a biometric scanner on initiating a flash request on the portable communication device.
  • the biometric scanner authenticates a user accessing the portable communication device and prevent unauthorized access.
  • the security module is configured to initiate a trigger message from the portable communication device to a registered mobile number when an attempt is made to replace existing SIM.
  • the trigger message comprises a lock request confirmation and a location information of the portable communication device.
  • the security module is further configured to initiate a locking of the portable communication device when a SIM is replaced or biometric authentication fails.
  • a One Time Password (OTP) is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request.
  • the locking application is configured to generate OTP.
  • the locking application is embedded in the factory setting.
  • the registered mobile number is asked to resend the OTP.
  • the locking command application is configured to authenticate and verify the OTP received from the registered number.
  • the application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.
  • the system further comprises a IMEI module configured to receive message that directly communicates with the IMEI number of the portable communication device.
  • the lock command restricts the functionality of the device.
  • the system further comprises a biometric scanner configured to perform biometric authentication through one of voice analysis, facial recognition, and finger print verification.
  • the system includes a Global Positioning system or GPS module for determining location information.
  • a method for locking a lost portable communication device during an attempt to change SIM (Subscriber Identity Module) in GSM based devices.
  • SIM Subscriber Identity Module
  • the embodiment herein prevents an unauthorized user from removing the SIM.
  • the portable communication device sends a trigger message to a registered number when the unauthorized user removes SIM from the device.
  • the trigger message is any one of an email, and a SMS.
  • a One Time Password is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request.
  • the locking application is configured to generate OTP.
  • the locking application is embedded in the factory setting.
  • the registered mobile number is asked to resend the OTP.
  • the locking command application is configured to authenticate and verify the OTP received from the registered number.
  • the application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.
  • the security module provides data security and prevents an unauthorized user from using the portable communication device. Further, the security module enables a user to send a lock message to initiate a locking of the lost mobile device, thereby preventing a misuse of the portable communication device.
  • the server permits access to the owner upon submitting a command to lock the device when the mobile device is lost or stolen, by using the contact details and the password of the owner of the lost mobile device.
  • the serial number and/or telephone number of the mobile device is automatically stored in the server for registering with the lock service so that the device is identified when an instruction for locking the mobile device is received from the registered user of the mobile device.
  • a method for locking a lost portable communication device comprises providing a user interface (UI) to the registered user of the mobile device to provide an option to register for a locking service of a remote device. Further, the registered owner of the mobile device enters an emergency contact number and a password during the registering of the device with the device manufacturer.
  • the method involves sending a trigger message to the emergency contact number when an unauthorized user accesses the mobile device.
  • the trigger message includes a location information of the device and a confirmation request to lock the device.
  • the location information is a GPS location of the device.
  • the lock command in the trigger message is a remotely initiated instruction sent via a server to the lost mobile device to stop either a partial of fully operational functionalities of the lost mobile device remotely.
  • a One Time Password is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request.
  • the locking application is configured to generate OTP.
  • the locking application is embedded in the factory setting.
  • the registered mobile number is asked to resend the OTP.
  • the locking command application is configured to authenticate and verify the OTP received from the registered number.
  • the application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.
  • FIG. 1 is a flowchart explaining a method for providing data security in a portable communication device.
  • a security module is installed under an operating system of the mobile device operating system, wherein each security module comprises components that implement locking function (100).
  • a user is enabled to initiate a message from a registered mobile device when the portable communication device is lost (102).
  • the message comprises a lock command.
  • a biometric scanner is activated on initiating a flash request on the portable communication device (104).
  • the biometric scanner authenticates a user accessing the portable communication device and prevent unauthorized access.
  • a trigger message is initiated from the portable communication device to a registered mobile number when an attempt is made to replace existing SIM (106).
  • the trigger message comprises a lock request confirmation and a location information of the portable communication device.
  • a locking of the portable communication device is activated when a SIM is replaced or biometric authentication fails (108).
  • locking of the portable communication device provides data security.
  • the message sent from the registered mobile number directly communicates with the IMEI number of the portable communication device to activate locking command.
  • the lock command restricts the functionality of the device.
  • the biometric authentication is at least one of voice analysis, facial recognition, and finger print verification.
  • the step of activating a biometric scanner further comprises enabling the user to access the portable communication device when the biometric authentication is a success.
  • the step of enabling a user to initiate a message further comprises sending a request to a server with contact details and password corresponding to the portable communication device. Further, the portable communication device associated with the contact details is identified. Thereafter, a message is sent from the server to the identified portable communication device.
  • a One Time Password is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request.
  • the locking application is configured to generate OTP.
  • the locking application is embedded in the factory setting.
  • the registered mobile number is asked to resend the OTP.
  • the locking command application is configured to authenticate and verify the OTP received from the registered number.
  • the application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.
  • the location information is a GPS location of the device provided by the GPS module.
  • FIG. 2 is a flowchart illustrating the steps of locking a lost portable communication device with an SMS, according to one embodiment of the embodiment herein.
  • the embodiment herein provides data security and prevents an unauthorized user from using the lost (stolen or misplaced) portable communication device a portable communication device, hereinafter referred to as a device.
  • the mobile device is identified using an equipment identifier known as an internal mobile equipment identity (IMEI). Each IMEI number is mapped with a user profile. A user registers his ⁇ her mobile device with the Digital Identity Management Service (DIMS). Further, the Digital Identity Management Service (DIMS) is designed to keep the records of the IMEI number of phones.
  • IMEI equipment identifier
  • DIMS Digital Identity Management Service
  • the device provides an owner to pre-register with a device lock service.
  • the system includes a server permitting access to the owner upon submitting a command to lock the device when the registered mobile device is later lost or stolen, by using the contact details and the password of the registered owner.
  • the serial number and/or telephone number of registered mobile device is automatically stored in the server for registering with the lock service so that the registered device is identified, when an instruction for locking the registered device is received from an authorized/registered owner of the mobile device.
  • the method for locking a lost portable communication device with an SMS comprises the following steps of processes.
  • the portable mobile device displays a user interface (UI) for providing the owner with an option to register for a remote device lock service. Further, the owner enters the emergency contact number and a password during the registration of the mobile device with the respective device manufacturer.
  • the loss of the mobile device is reported.
  • an unauthorized user access the lost mobile device and attempts to use the lost mobile device by changing the carrier or by flashing the device.
  • the lost mobile device sends a trigger message to the emergency contact number using the security module.
  • the trigger message includes a location information of the lost mobile device and a confirmation request to lock the lost mobile device.
  • the address comprises a GPS location of the lost mobile device.
  • the method enables the user to track the lost mobile device with the GPS location.
  • the registered owner of the lost mobile device sends an SMS with a lock command.
  • the lock command is a remotely initiated instruction sent via a server to the lost mobile device to stop the operational functionalities of the lost mobile device either fully or partially.
  • the lock command will be a kill switch.
  • the lock command disables every functions, but displays a telephone number to call to report that the lost mobile device has been found, or an email address to contact, or both.
  • the lost mobile device is permitted only to contact this number or email, without being permitted to contact other emails or numbers, except perhaps an emergency services number.
  • a One Time Password is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request.
  • the locking application is configured to generate OTP.
  • the locking application is embedded in the factory setting.
  • the registered mobile number is asked to resend the OTP.
  • the locking command application is configured to authenticate and verify the OTP received from the registered number.
  • the application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.
  • the mobile device provides an owner to subscribe to lock service following theft or loss of a device.
  • the system receives a request to lock the device, which is received by the registered owner via a terminal.
  • the server establishes a communication link with the device, which is initiated either by the lost mobile device or the server.
  • the server sends a lock command to the lost mobile device.
  • the lock command results in a reduction of functionality available on the lost mobile device.
  • the device is limited to calling a specified number to inform a responsible party of the whereabouts of the device, when the device is a mobile phone.
  • the lost device is simply configured to display a number to call or an email address to contact.
  • the system for locking the device with the SMS automatically publishes the device and its identifying details, such as a serial number, in the lost and found database.
  • the details may already be stored there and a flag is simply be set to indicate that the device is now lost or stolen, which results in publishing the details of the lost or stolen device.
  • a single command is used/ sufficient for sending a request for locking the lost mobile device and publishing the details of the locked mobile device that is lost and found in a database.
  • the system for locking a lost device further enables a person to retrieve the lost mobile device after the lost mobile device is found.
  • the system receives a notification that the mobile device which is reported and published as lost or stolen has been found.
  • the finder of the mobile device is verified, for example, that the serial number of the device matches the serial number displayed on a website that presents information about devices marked in the database as lost or stolen.
  • the system and method of embodiment herein provides a data security and helps to retrieve the lost mobile device.
  • the system enables the authorized/registered user to send a message with the lock command and stop the functionality of the lost mobile device.
  • FIG. 3 illustrates a flowchart explaining a method of locking a lost portable communication device during an attempt to flash, according to one embodiment of the embodiment herein.
  • the embodiment herein provides data security and prevents an unauthorized user from flashing the portable communication device.
  • the portable communication device verifies any user accessing the device using biometrics authentication.
  • the biometric authentication is any one of voice analysis, facial recognition, and finger print verification.
  • the user is permitted to access the device only if he is authenticated using biometrics.
  • a user registers his ⁇ her biometric profile data including his ⁇ her voice and facial image with the Digital Identity Management Service (DIMS). Further, the Digital Identity Management Service (DIMS) is used to keep records of the IMEI number of phones.
  • the mobile device is identified using an equipment identifier known as an internal mobile equipment identity (IMEI). Each IMEI number is mapped with a biometric profile.
  • IMEI equipment identifier
  • Each IMEI number is mapped with a biometric profile.
  • a portable communication device is reported as lost (stolen or misplaced).
  • an unauthorized user access the lost device and attempts to use the lost device by changing the carrier.
  • the user initiates flashing of the lost device.
  • the lost device requests for biometric authentication to initiate flashing.
  • the biometric data is compared to the biometric profile registered with the respective device.
  • the user is denied access to flash the lost device if the biometric data does not match with the biometric profile.
  • the lost device initiates a lock command when user fails to verify the identity using biometnc data. The lock command restricts the functionality of the lost device.
  • the lock command is a remotely initiated instruction sent via a server to the lost device to stop operation of the lost device, either in full or partially. It may mean 'killing' the device so that it becomes completely inoperable, in which case the lock command will be a kill switch. Alternately, the lock command disables every functions, but displays a telephone number to call to report that the lost device has been found, or an email address to contact, or both. The lost device is permitted to contact this number or email, without being permitted to contact other emails or numbers, except perhaps an emergency services number.
  • Non-limiting examples of a device include a laptop, cell phone, personal digital assistant, smart phone, memory stick, personal media device, gaming device, personal computer, tablet computer, electronic book, and netbook.
  • a One Time Password is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request.
  • the locking application is configured to generate OTP.
  • the locking application is embedded in the factory setting.
  • the registered mobile number is asked to resend the OTP.
  • the locking command application is configured to authenticate and verify the OTP received from the registered number.
  • the application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.
  • FIG. 4 illustrates a flowchart explaining a method of locking a lost portable communication device during an attempt to change SIM (Subscriber Identity Module), according to one embodiment of the embodiment herein.
  • SIM Subscriber Identity Module
  • the embodiment herein prevents an unauthorized user from removing SIM.
  • the portable communication device sends a trigger message to a registered number when the unauthorized user removes SIM from the lost device.
  • the trigger message is one of an email, and a SMS.
  • an unauthorized user attempts to replace the existing SIM with a new SIM in the lost device.
  • the new SIM enables the unauthorized user to perform cellular functions in the lost device.
  • a trigger message is sent to the registered number in response to change in existing SIM.
  • the registered number is the number of an authorized user's friend or relative.
  • the trigger message includes the location information of the lost device and confirmation request to lock the device.
  • the authorized user responds to the trigger message by sending a confirmation message to lock the lost device.
  • the lost device is locked.
  • the lock command restricts the functionality of the lost device.
  • the lock command is a remotely initiated instruction sent via a server to the lost device to stop the functioning of the lost device and software in the lost device, either in full or partially.
  • a One Time Password is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request.
  • the locking application is configured to generate OTP.
  • the locking application is embedded in the factory setting.
  • the registered mobile number is asked to resend the OTP.
  • the locking command application is configured to authenticate and verify the OTP received from the registered number.
  • the application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.
  • FIG. 5 is a block diagram of the system for providing data security.
  • the system for providing data security in a portable communication device comprises security module 502, biometric scanner 504, IMEI module 506, and GPS module 508.
  • the security module 502 is installed under an operating system of the mobile device operating system.
  • the security module 502 communicates with a hardware processor coupled to a memory containing instructions configured for implanting locking function.
  • the security module 502 is configured to enable a user to initiate a message from a registered mobile device when the portable communication device is lost, wherein the message comprises a lock command. Further, the security module 502 is configured to activate a biometric scanner on initiating a flash request on the portable communication device.
  • the biometric scanner 504 authenticates a user accessing the portable communication device and prevent unauthorized access.
  • the security module 502 is configured to initiate a trigger message from the portable communication device to a registered mobile number when an attempt is made to replace existing SIM.
  • the trigger message comprises a lock request confirmation and a location information of the portable communication device.
  • the security module 502 is further configured to initiate a locking of the portable communication device when a SIM is replaced or biometric authentication fails.
  • the system further comprises the IMEI module 506 configured to receive message that directly communicates with the IMEI number of the portable communication device.
  • the lock command restricts the functionality of the device.
  • the system further comprises the biometric scanner 504 configured to perform biometric authentication through one of voice analysis, facial recognition, and finger print verification.
  • the system includes a Global Positioning system or GPS module 508 for determining location information.
  • a One Time Password is generated and shared to the registered mobile number upon receiving the trigger message comprising lock request.
  • the locking application is configured to generate OTP.
  • the locking application is embedded in the factory setting.
  • the registered mobile number is asked to resend the OTP.
  • the locking command application is configured to authenticate and verify the OTP received from the registered number.
  • the application is configured to issue a lock command and kill command to lock and kill the personal data, when the OTP received from the registered mobile number is verified and authenticated.
  • the embodiments herein provide a system and method for providing data security and prevents an unauthorized user from using the lost or stolen portable communication device.
  • the system and method of embodiment herein provides data security and helps to retrieve the device. In case, the device is not able to be retrieved, the system enables the user to send a message with the lock command and stop the functionality of the device.

Abstract

L'invention concerne un système et un procédé destinés à assurer la sécurité de données et à verrouiller un dispositif de communication portable perdu. Le procédé lance un message court de média (SMS) comprenant une consigne de verrouillage qui communique directement avec le numéro IMEI du dispositif de communication portable. La consigne de verrouillage restreint la fonctionnalité du dispositif. Le système assure la sécurité des données et empêche un utilisateur non autorisé de flasher le dispositif de communication portable. Le système de verrouillage de dispositif de communication portable comprend un module d'IMEI, un module de sécurité, un serveur et un module de GSM.
PCT/IN2017/050391 2016-09-10 2017-09-09 Système et procédé de verrouillage d'un dispositif de communication portable perdu WO2018047203A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
IN201641008329 2016-09-10
IN201641008329 2016-09-10
IN201641008754 2016-09-14
IN201641008754 2016-09-14

Publications (1)

Publication Number Publication Date
WO2018047203A1 true WO2018047203A1 (fr) 2018-03-15

Family

ID=61562531

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2017/050391 WO2018047203A1 (fr) 2016-09-10 2017-09-09 Système et procédé de verrouillage d'un dispositif de communication portable perdu

Country Status (1)

Country Link
WO (1) WO2018047203A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10993107B2 (en) 2019-03-01 2021-04-27 At&T Intellectual Property I, L.P. Multi-factor autonomous SIM lock

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100151822A1 (en) * 2008-12-12 2010-06-17 Microsoft Corporation Security Protocols for Mobile Operator Networks
US20140032691A1 (en) * 2011-10-11 2014-01-30 Citrix Systems, Inc. Policy-Based Application Management

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100151822A1 (en) * 2008-12-12 2010-06-17 Microsoft Corporation Security Protocols for Mobile Operator Networks
US20140032691A1 (en) * 2011-10-11 2014-01-30 Citrix Systems, Inc. Policy-Based Application Management

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10993107B2 (en) 2019-03-01 2021-04-27 At&T Intellectual Property I, L.P. Multi-factor autonomous SIM lock
US11558751B2 (en) 2019-03-01 2023-01-17 At&T Intellectual Property I, L.P. Multi-factor autonomous sim lock

Similar Documents

Publication Publication Date Title
US11669338B2 (en) Device locator disable authentication
US9112905B2 (en) Authentication of access terminal identities in roaming networks
US10440034B2 (en) Network assisted fraud detection apparatus and methods
EP2196045B1 (fr) Système et procédé pour la protection de données dans des dispositifs sans fil
EP2266070B1 (fr) Système permettant d'enrayer l'utilisation non autorisée d'un dispositif
US9916481B2 (en) Systems and methods for mitigating the unauthorized use of a device
US8204475B2 (en) Method and apparatus for preventing unauthorized use of computing devices
US9143922B2 (en) Method and system for controlling communication between an UICC and an external application
CA3038884C (fr) Protection de dispositifs mobiles contre des reinitialisations de dispositif non autorisees
US20120149330A1 (en) System and method to dynamically authenticate mobile devices
EP3166294B1 (fr) Systèmes et procédés de surveillance et de gestion de l'utilisation de dispositifs électroniques mobiles
KR100766020B1 (ko) 이동통신 단말기와 그 제어 방법 및 이동통신 서비스 제어방법
US20120144470A1 (en) User authentication method using location information
WO2018047203A1 (fr) Système et procédé de verrouillage d'un dispositif de communication portable perdu
CN111209561B (zh) 终端设备的应用调用方法、装置与终端设备
KR100923909B1 (ko) 이동 통신 단말기의 원격 제어 방법 및 장치
CN106162630B (zh) 一种终端设备的加密防护方法
WO2014027242A1 (fr) Systèmes et procédés permettant de réduire l'utilisation non autorisée d'un dispositif
US10104078B1 (en) Method and apparatus for associating sim card with a group of mobile communications devices
CN111465004B (zh) 设备激活启用
EP3783938A1 (fr) Procédé de remise à zéro d'un code personnel d'un utilisateur de terminal de télécommunication et applet et serveur correspondants

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17848310

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17848310

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 17848310

Country of ref document: EP

Kind code of ref document: A1