Methods and systems for causing mobile communications devices to emit sounds with encoded information
First Claim
Patent Images
1. A method comprising:
- detecting, by a first security component on a first mobile communications device, a usage of the first mobile communications device;
comparing, by the first security component, the detected usage to a stored usage pattern associated with an authorized user of the first mobile communications device to determine if there is a difference between the detected usage and the stored usage pattern;
associating, by the first security component, a measure with the stored usage pattern, the measure representing a difference between the detected usage and the stored usage pattern;
determining, by the first security component using the measure, that the detected usage was not caused by the authorized user of the first mobile communications device; and
in response to the determination, issuing a command by the first security component, the command causing the first mobile communications device to emit a sound encoded with information identifying the first mobile communications device and with information identifying a location of the first mobile communications device, the encoded information decodable only by electronic devices, the emitted sound having no specified recipient, wherein emitting the sound by the first mobile communication device initiates;
decoding the emitted sound by an electronic device programmed to decode the encoded information within the sound; and
sending, by the electronic device, the decoded information to a first server.
9 Assignments
0 Petitions
Accused Products
Abstract
A method is provided for comparing a usage of a mobile communications device to a stored pattern of usage. When a measure associated with a difference between the usage and the stored usage pattern exceeds a threshold, the mobile communications device is caused to emit a sound encoded with information that may be decoded by another electronic device.
389 Citations
24 Claims
-
1. A method comprising:
-
detecting, by a first security component on a first mobile communications device, a usage of the first mobile communications device; comparing, by the first security component, the detected usage to a stored usage pattern associated with an authorized user of the first mobile communications device to determine if there is a difference between the detected usage and the stored usage pattern; associating, by the first security component, a measure with the stored usage pattern, the measure representing a difference between the detected usage and the stored usage pattern; determining, by the first security component using the measure, that the detected usage was not caused by the authorized user of the first mobile communications device; and in response to the determination, issuing a command by the first security component, the command causing the first mobile communications device to emit a sound encoded with information identifying the first mobile communications device and with information identifying a location of the first mobile communications device, the encoded information decodable only by electronic devices, the emitted sound having no specified recipient, wherein emitting the sound by the first mobile communication device initiates; decoding the emitted sound by an electronic device programmed to decode the encoded information within the sound; and sending, by the electronic device, the decoded information to a first server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
detecting, by a first security component on a first server, a usage of a first mobile communications device; comparing, by the first security component, the detected usage to a stored usage pattern associated with an authorized user of the first mobile communications device to determine if there is a difference between the detected usage and the stored usage pattern; associating, by the first security component, a measure with the stored usage pattern, the measure representing a difference between the detected usage and the stored usage pattern; determining, by the first security component using the measure, that the detected usage was not caused by the authorized user of the first mobile communications device; and in response to the determination, issuing a command by the first security component, the command causing the first mobile communications device to emit a sound encoded with information identifying the first mobile communications device and with information identifying a location of the first mobile communications device, the encoded information decodable only by electronic devices, the sound having no specified recipient, wherein emitting the sound by the first mobile communication device initiates; decoding the emitted sound by an electronic device programmed to decode the encoded information within the sound; and sending, by the electronic device, the decoded information to the first server. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory, computer-readable storage medium having stored thereon a plurality of instructions, which, when executed by a processor of a mobile communications device, cause the mobile communications device to:
-
detect a usage of the first mobile communications device; compare the detected usage to a stored usage pattern associated with an authorized user of the first mobile communications device to determine if there is a difference between the detected usage and the stored usage pattern; associate a measure with the stored usage pattern, the measure representing a difference between the detected usage and the stored usage pattern; determine using the measure, that the detected usage was not caused by the authorized user of the first mobile communications device; and in response to the determination, issue a command by the first security component, the command causing the first mobile communications device to emit a sound encoded with information identifying the first mobile communications device and with information identifying a location of the first mobile communications device, the encoded information decodable only by electronic devices, the emitted sound having no specified recipient, wherein emitting the sound by the first mobile communication device initiates; decoding the emitted sound by an electronic device programmed to decode the encoded information within the sound; and sending, by the electronic device, the coded information to a first server. - View Dependent Claims (20, 21)
-
-
22. A system, comprising a mobile communications device with at least one processor and memory and instructions that when executed by the at least one processor cause the mobile communications device to:
-
detect a usage of the first mobile communications device; compare the detected usage to a stored usage pattern associated with an authorized user of the first mobile communications device to determine if there is a difference between the detected usage and the stored usage pattern; associate a measure with the stored usage pattern, the measure representing a difference between the detected usage and the stored usage pattern; determine using the measure, that the detected usage was not caused by the authorized user of the first mobile communications device; and in response to the determination, issue a command by the first security component, the command causing the first mobile communications device to emit a sound encoded with information identifying the first mobile communications device and with information identifying a location of the first mobile communications device, the encoded information decodable only by electronic devices, the emitted sound having no specified recipient, wherein emitting the sound by the first mobile communication device initiates; decoding the emitted sound by an electronic device programmed to decode the encoded information within the sound; and sending, by the electronic device over a network interface, the decoded information to a. first server. - View Dependent Claims (23, 24)
-
Specification