SYSTEM AND METHOD FOR IDENTIFYING AND LOCATING WIRELESS DEVICES THAT ARE BEING OPERATED BY UNAUTHORIZED USERS
First Claim
Patent Images
1. A method of locating a wireless device being used by an unauthorized operator, the method comprising:
- examining biometric information of the operator of the wireless device;
determining if the operator is authorized based on the biometric information; and
transmitting a message to a remote recipient in response to determining the operator is not authorized.
4 Assignments
0 Petitions
Accused Products
Abstract
A method of locating a wireless device being operated by an unauthorized user is provided. The method comprises examining biometric information of an operator of the wireless device, determining if the operator is authorized based on the biometric information, and transmitting a message to a remote recipient in response to determining the operator is not authorized. In certain embodiments, the message can include the location of the wireless device.
29 Citations
20 Claims
-
1. A method of locating a wireless device being used by an unauthorized operator, the method comprising:
-
examining biometric information of the operator of the wireless device; determining if the operator is authorized based on the biometric information; and transmitting a message to a remote recipient in response to determining the operator is not authorized. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of providing a location of a wireless device, the method comprising:
-
the wireless device determining that an operator of the wireless device is an unauthorized user; the wireless device determining its initial location in response to the determining step; and the wireless device transmitting information indicating its initial location. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A wireless device comprising:
-
a first wireless antenna adapted to communicate with a remote recipient; a biometric sensor adapted to inspect an operator to create a first biometric reading; a memory device containing information indicative of a second biometric reading; and a system controller coupled to and adapted to control the first wireless antenna and the biometric sensor, the system controller further adapted to receive information from the memory device, to compare the first biometric reading to the second biometric reading, and to transmit information indicating unauthorized use of the wireless device using the first wireless antenna when the first and second biometric readings are not substantially the same. - View Dependent Claims (20)
-
Specification