METHOD AND APPARATUS FOR AUTOMATICALLY DAMAGING CIRCUITRY OF A MOBILE DEVICE WHEN ONE OR MORE CONDITIONS ARE DETECTED
First Claim
1. A mobile device comprising:
- a receiver (Rx) configured to receive radio frequency (RF) signals transmitter over air from a wireless network, the Rx including receiver electrical circuitry that provides a receive channel for receiving the received RF signals;
a transmitter (Tx) configured to output RF signals for transmission over air from the mobile device to the wireless network, the Tx including transmitter electrical circuitry that provides a transmit channel for outputting an RF signal to be transmitted over air from the mobile device to the wireless network;
a memory device configured to store data and computer code;
a switching circuit coupled to the receive channel of the Rx and to the transmit channel of the Tx, wherein the switching circuit is switchable between at least a first switching state in which the switching circuit is opened and a second switching state in which the switching circuit is closed, wherein in the second switching state, the transmit channel is electrically connected to the receive channel such that an RF signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage at least part of the receiver electrical circuitry to thereby render the Rx inoperable; and
a processing device configured to perform at least one algorithm that controls the switching circuit, wherein said at least one algorithm determines whether or not at least one predetermined condition has occurred, and wherein if said at least one algorithm determines that said at least one predetermined condition has occurred, the processing device causes the switching circuit to be switched to the second switching state.
8 Assignments
0 Petitions
Accused Products
Abstract
A mobile device is configured with electrical circuitry that causes the transmit channel electrical circuitry of the transmitter (Tx) of the mobile device to be electrically coupled to the receive channel electrical circuitry of the receiver (Rx) of the mobile device when one or more predetermined conditions occur. The electrical coupling of the transmit channel circuitry to the receive channel circuitry causes the Rx to be sufficiently damaged to render the mobile device nonoperational, thereby preventing further use of the mobile device. The one or more predetermined conditions correspond to conditions that indicate the mobile device has been lost or stolen and/or that an unauthorized user is attempting to use the mobile device in some manner.
14 Citations
25 Claims
-
1. A mobile device comprising:
-
a receiver (Rx) configured to receive radio frequency (RF) signals transmitter over air from a wireless network, the Rx including receiver electrical circuitry that provides a receive channel for receiving the received RF signals; a transmitter (Tx) configured to output RF signals for transmission over air from the mobile device to the wireless network, the Tx including transmitter electrical circuitry that provides a transmit channel for outputting an RF signal to be transmitted over air from the mobile device to the wireless network; a memory device configured to store data and computer code; a switching circuit coupled to the receive channel of the Rx and to the transmit channel of the Tx, wherein the switching circuit is switchable between at least a first switching state in which the switching circuit is opened and a second switching state in which the switching circuit is closed, wherein in the second switching state, the transmit channel is electrically connected to the receive channel such that an RF signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage at least part of the receiver electrical circuitry to thereby render the Rx inoperable; and a processing device configured to perform at least one algorithm that controls the switching circuit, wherein said at least one algorithm determines whether or not at least one predetermined condition has occurred, and wherein if said at least one algorithm determines that said at least one predetermined condition has occurred, the processing device causes the switching circuit to be switched to the second switching state. - View Dependent Claims (2, 3, 4)
-
-
5. A method for preventing unauthorized use of a mobile device, the method comprising:
-
in a processing device of a mobile device, performing at least one algorithm that determines whether or not at least one predetermined condition has occurred; and if said at least one algorithm determines that said at least one predetermined condition has occurred, causing a switching circuit of the mobile device to be switched from a first switching state to a second switching state, wherein the switching circuit is coupled to a receive channel of an Rx of the mobile device and to a transmit channel of a Tx of the mobile device, wherein the switching circuit is opened in the first switching state and is closed in the second switching state, and wherein in the second switching state, the transmit channel is electrically connected to the receive channel such that an RF signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage at least part of the receiver electrical circuitry to thereby render the Rx inoperable. - View Dependent Claims (6, 7)
-
-
8. A computer-readable medium having a computer program stored thereon for use in a processing device of a mobile device to prevent unauthorized use of the mobile device, the program comprising computer instructions stored on the computer-readable medium, the instructions comprising:
-
a first set of instructions for performing at least a first algorithm in the mobile device to determine whether or not at least one predetermined condition has occurred; and a second set of instructions for performing at least a second algorithm in the mobile device if the first set of instructions determines that said at least one predetermined condition has occurred, wherein second set of instructions causes a switching circuit of the mobile device to be switched from a first switching state to a second switching state, wherein the switching circuit is coupled to a receive channel of an Rx of the mobile device and to a transmit channel of a Tx of the mobile device, wherein the switching circuit is opened in the first switching state and is closed in the second switching state, and wherein in the second switching state, the transmit channel is electrically connected to the receive channel such that an RF signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage at least part of the receiver electrical circuitry to thereby render the Rx inoperable. - View Dependent Claims (9, 10)
-
-
11. A wireless network configured to prevent an unauthorized user from using a wireless device, the network comprising:
-
at least a first network element of the wireless network configured to perform at least a first algorithm that determines whether or not at least one predetermined condition has occurred indicating that a particular mobile device has been lost or stolen; and at least a second network element of the wireless network configured to perform at least a second algorithm that causes an Rx destroy (Rx_Des) command to be sent from the wireless network to a mobile device that said at least a first algorithm has determined to be lost or stolen, wherein the Rx_Des command commands the particular mobile device to electrically connect a transmit channel of a transmitter (Tx) of the mobile device to a receive channel of a receiver (Rx) of the mobile device such that an RF signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage electrical circuitry of the Rx to thereby render the Rx inoperable. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method performed by a wireless network to prevent an unauthorized user from using a wireless device, the method comprising:
-
in a first network element of the wireless network, performing at least a first algorithm that determines whether or not at least one predetermined condition has occurred indicating that a particular mobile device has been lost or stolen; and in a second network element of the wireless network, performing at least a second algorithm that causes an Rx destroy (Rx_Des) command to be sent from the wireless network to a mobile device that said at least a first algorithm has determined to be lost or stolen, wherein the Rx_Des command commands the particular mobile device to electrically connect a transmit channel of a transmitter (Tx) of the mobile device to a receive channel of a receiver (Rx) of the mobile device such that an RF signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage electrical circuitry of the Rx to thereby render the Rx inoperable. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A computer-readable medium having a computer program stored thereon for use in a wireless network to prevent unauthorized use of the mobile device, the program comprising computer instructions stored on the computer-readable medium, the instructions comprising:
-
a first set of instructions for performing at least a first algorithm that determines whether or not at least one predetermined condition has occurred that indicates that a particular mobile device has been lost or stolen; and a second set of instructions for performing at least a second algorithm that causes an Rx destroy (Rx_Des) command to be sent from the wireless network to a mobile device that the first set of instructions has determined to be lost or stolen, wherein the Rx_Des command commands the particular mobile device to electrically connect a transmit channel of a transmitter (Tx) of the mobile device to a receive channel of a receiver (Rx) of the mobile device such that an RF signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage electrical circuitry of the Rx to thereby render the Rx inoperable. - View Dependent Claims (22, 23, 24, 25)
-
Specification