Loading...
Please wait, while we are loading the content...
Similar Documents
Method for Detecting A Security Event on A Portable Electronic Device and Establishing Audio Transmission with A Client Computer
| Content Provider | The Lens |
|---|---|
| Abstract | Mobile devices typically have some form of audio capabilities designed to be operated by the device's user, for example to place phone calls; however, if a device is misplaced or stolen, the user may wish to operate those audio capabilities remotely. Methods are provided for detecting that a security event has occurred on a portable electronic device and then establishing an audio transmission between the device and one or more clients, and in some embodiments, sending a command to initiate the audio transmission. The detection of a security event may be based on, for example, detecting that the device has been turned on, detecting movement of the device, detecting that an incorrect password has been entered, the device camera has been used, contacts have been added or deleted, the SIM card as been removed or replaced, application programs have been installed or uninstalled from the device, or uncharacteristic behavior has been detected. |
| Related Links | https://www.lens.org/lens/patent/010-684-756-866-81X/frontpage |
| Language | English |
| Publisher Date | 2017-02-14 |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Patent |
| Jurisdiction | United States of America |
| Date Applied | 2014-07-23 |
| Agent | Dergosits & Noah Llp |
| Applicant | Lookout Inc |
| Application No. | 201414339291 |
| Claim | A method on a portable electronic device comprising: at the portable electronic device, detecting a security event occurring at the portable electronic device when a distance between a location of the portable electronic device and a reference location is greater than a threshold value indicating that the portable electronic device is missing; in response to the detected security event, at the portable electronic device, determining that an audio transmission should be established between the portable electronic device and a client computer; and at the portable electronic device, triggering the portable electronic device to initiate the audio transmission in response to the determination that the audio transmission should be established. The method of claim 1 wherein the step of detecting a security event occurring at the portable electronic device further comprises: detecting that at least one of a screen of the portable electronic device has been turned on, movement of the portable electronic device, a camera of the portable electronic device has been used, an incorrect password has been entered at the portable electronic device, a contact has been added to a directory of the portable electronic device, a contact in a directory of the portable electronic device has been deleted, and a contact in a directory of the portable electronic device has been updated. The method of claim 1 wherein the step of detecting a security event occurring at the portable electronic device further comprises: detecting that at least one of a SIM card of the portable electronic device has been removed and a SIM card of the portable electronic device has been replaced with a different SIM card. The method of claim 1 wherein the step of detecting a security event occurring at the portable electronic device further comprises: detecting that the portable electronic device has been connected to a computer. The method of claim 1 wherein the step of detecting a security event occurring at the portable electronic device further comprises: detecting at least one of an attempt to uninstall a mobile application program on the portable electronic device and detecting an attempt to delete data from the portable electronic device. The method of claim 1 wherein the step of detecting a security event occurring at the portable electronic device further comprises: detecting uncharacteristic behavior. A non-transitory computer-readable storage medium having stored thereon a plurality of instructions which, when executed by a processor, cause the processor to perform the steps of a method comprising: at a portable electronic device, detecting a security event occurring at the portable electronic device when a distance between a location of the portable electronic device and a reference location is greater than a threshold value indicating that the portable electronic device is missing; in response to the detected security event, at the portable electronic device, determining that an audio transmission should be established between the portable electronic device and a client computer; and at the portable electronic device, triggering the portable electronic device to initiate the audio transmission in response to the determination that the audio transmission should be established. The non-transitory computer-readable storage medium of claim 7 wherein the method step of detecting a security event occurring at the portable electronic device further comprises: detecting that at least one of a screen of the portable electronic device has been turned on, movement of the portable electronic device, a camera of the portable electronic device has been used, an incorrect password has been entered at the portable electronic device, a contact has been added to a directory of the portable electronic device, a contact in a directory of the portable electronic device has been deleted, and a contact in a directory of the portable electronic device has been updated. The non-transitory computer-readable storage medium of claim 7 wherein the method step of detecting a security event occurring at the portable electronic device further comprises: detecting that at least of one of a SIM card of the portable electronic device has been removed and a SIM card of the portable electronic device has been replaced with a different SIM card. The non-transitory computer-readable storage medium of claim 7 wherein the method step of detecting a security event occurring at the portable electronic device further comprises: detecting that the portable electronic device has been connected to a computer. The non-transitory computer-readable storage medium of claim 7 wherein the method step of detecting a security event occurring at the portable electronic device further comprises: detecting at least one of an attempt to uninstall a mobile application program on the portable electronic device and an attempt to delete data from the portable electronic device. The non-transitory computer-readable storage medium of claim 7 wherein the method step of detecting a security event occurring at the portable electronic device further comprises: detecting uncharacteristic behavior. The method of claim 1 wherein the step of detecting a security event occurring at the portable electronic device further comprises: generating location data from the portable electronic device indicating the location of the portable electronic device. The non-transitory computer-readable storage medium of claim 7 wherein the method step of detecting a security event occurring at the portable electronic device further comprises: generating location data from the portable electronic device indicating the location of the portable electronic device. A method on a portable electronic device comprising: at the portable electronic device, detecting a security event occurring at the portable electronic device when a distance between a location of the portable electronic device and a reference location is less than a threshold value indicating that the portable electronic device is missing; in response to the detected security event, at the portable electronic device, determining that an audio transmission should be established between the portable electronic device and a client computer; and at the portable electronic device, triggering the portable electronic device to initiate the audio transmission in response to the determination that the audio transmission should be established. The method of claim 15 wherein the method step of detecting a security event occurring at the portable electronic device further comprises: detecting that at least one of a screen of the portable electronic device has been turned on, movement of the portable electronic device, a camera of the portable electronic device has been used, an incorrect password has been entered at the portable electronic device, a contact has been added to a directory of the portable electronic device, a contact in a directory of the portable electronic device has been deleted, and a contact in a directory of the portable electronic device has been updated. The method of claim 15 wherein the method step of detecting a security event occurring at the portable electronic device further comprises: detecting that at least one of a SIM card of the portable electronic device has been removed and a SIM card of the portable electronic device has been replaced with a different SIM card. The method of claim 15 wherein the method step of detecting a security event occurring at the portable electronic device further comprises: detecting that the portable electronic device has been connected to a computer. The method of claim 15 wherein the method step of detecting a security event occurring at the portable electronic device further comprises: detecting at least one of an attempt to uninstall a mobile application program on the portable electronic device and an attempt to delete data from the portable electronic device. The method of claim 15 wherein the method step of detecting a security event occurring at the portable electronic device further comprises: detecting uncharacteristic behavior. The method of claim 15 wherein the step of detecting a security event occurring at the portable electronic device further comprises: generating location data from the portable electronic device indicating the location of the portable electronic device. |
| CPC Classification | WIRELESS COMMUNICATION NETWORKS TRANSMISSION OF DIGITAL INFORMATION; e.g. TELEGRAPHIC COMMUNICATION TELEPHONIC COMMUNICATION ELECTRIC DIGITAL DATA PROCESSING |
| Examiner | Ajit Patel |
| Extended Family | 092-184-774-328-875 140-448-573-612-031 032-779-609-570-998 010-844-674-349-245 121-752-631-268-206 033-396-840-739-571 176-726-109-126-236 033-320-664-793-059 103-306-792-892-111 113-017-620-891-579 058-022-732-768-798 183-040-723-613-39X 150-421-870-309-592 175-047-107-091-112 133-371-178-381-919 016-997-841-325-44X 140-727-304-682-252 065-496-892-448-919 121-881-639-045-892 125-745-198-054-257 176-675-355-512-557 028-316-779-095-389 010-684-756-866-81X 033-813-058-351-221 164-307-225-554-666 021-847-784-193-301 040-162-199-392-681 108-933-687-154-218 058-344-121-159-856 131-369-385-540-083 017-316-074-855-780 145-155-305-846-512 165-813-173-416-162 174-416-068-668-058 016-233-074-900-043 058-489-430-908-379 025-909-036-224-762 078-068-801-064-401 140-713-501-804-848 105-705-394-541-309 150-475-589-350-896 118-341-084-997-340 190-044-222-953-566 135-653-957-765-274 195-808-355-838-747 |
| Patent ID | 9569643 |
| Inventor/Author | Grkov Vance Richardson David Mandal Ayan Mangat Cherry Mahaffey Kevin Patrick |
| IPC | H04M1/66 G06F3/16 G06F21/88 H04L29/06 H04M1/68 H04M3/16 H04M3/42 H04W8/24 H04W12/12 |
| Status | Active |
| Owner | Lookout Inc F-secure Corporation |
| Simple Family | 033-320-664-793-059 028-316-779-095-389 010-684-756-866-81X 125-745-198-054-257 |
| CPC (with Group) | H04W12/12 H04L63/14 H04M3/42161 H04W8/245 H04W12/082 H04W12/126 G06F21/88 G06F3/165 |
| Issuing Authority | United States Patent and Trademark Office (USPTO) |
| Kind | Patent/New European patent specification (amended specification after opposition procedure) |