Unauthorized Location Detection and Countermeasures
First Claim
1. A mobile device operable to communicate with a wireless network and configured to detect unauthorized location attempts, comprising:
- a processor; and
a memory coupled to the processor, the memory including instructions that upon execution cause the processor to execute an operational procedure, the memory comprising;
instructions for identifying a sequence of events that includes an event indicating that a location subsystem of the mobile device was activated;
instructions for determining that the sequence of events is indicative of an unauthorized attempt to locate the mobile device; and
instructions for logging the sequence of events as an unauthorized attempt to locate the mobile device.
2 Assignments
0 Petitions
Accused Products
Abstract
A location sentry system is provided for use within a mobile device. The sentry system can be configured to detect unauthorized attempts to locate mobile devices by monitoring messages passed between the mobile device and the wireless network and/or messages passed between components of the mobile device, and determining that one or more of the messages is/are indicative of an attempt to locate the mobile device. In response to a determination that an unauthorized attempt has been detected, the location sentry can be configured to take one or more actions. For example, the location sentry system could prevent location information from being sent back to the wireless network and/or the location sentry system could cause incorrect information to be sent to the wireless network.
93 Citations
60 Claims
-
1. A mobile device operable to communicate with a wireless network and configured to detect unauthorized location attempts, comprising:
-
a processor; and a memory coupled to the processor, the memory including instructions that upon execution cause the processor to execute an operational procedure, the memory comprising; instructions for identifying a sequence of events that includes an event indicating that a location subsystem of the mobile device was activated; instructions for determining that the sequence of events is indicative of an unauthorized attempt to locate the mobile device; and instructions for logging the sequence of events as an unauthorized attempt to locate the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer-readable storage medium including a location sentry system for use in a mobile device, the computer-readable storage medium comprising:
-
instructions for logging a group of events in a database of the mobile device; instructions for detecting, in the group of events, an event indicating that location information was placed in an outgoing message queue for transmission to a base station; instructions for determining that the sequence of events is indicative of an unauthorized attempt to locate the mobile device; and instructions for logging the group of events as an attempt to locate the mobile device. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. A location sentry method for use in a mobile device, comprising:
-
analyzing, by a first location sentry module encapsulating a wireless receiver application program interface, message traffic for messages indicative of requests for location information; and displaying an alert on a user interface of the mobile device indicating that an unauthorized attempt to locate the mobile device was detected in response to detecting a message indicative of a request for location information. - View Dependent Claims (48, 49)
-
-
50. A mobile device configured to detect unauthorized location attempts, comprising:
-
means for emulating a wireless radio transmitter subsystem for a wireless receiver configured to receive messages from a wireless radio transmitter subsystem for transmission to a wireless network and analyze the messages for attempts to transmit location information to a wireless network; and means for causing an alert to be displayed on a user interface responsive to a determination that an attempt to transmit location information was detected. - View Dependent Claims (51, 52)
-
-
53. A computer-readable medium for use in a mobile device including a location sentry configured to detect unauthorized attempts to locate the mobile device, comprising:
-
instructions for a location subsystem application program interface configured to receive requests to access the location subsystem and monitor the requests for unauthorized attempts to access the location subsystem; and instructions for displaying an alert on a user interface in response to detecting an unauthorized attempt to access the location subsystem. - View Dependent Claims (54, 55)
-
-
56. A mobile device configured to operate within a wireless network and configured to detect unauthorized attempts to locate the mobile device, comprising:
-
a processor; and a memory coupled to the processor, wherein the memory includes instructions that upon execution cause the processor to; detect an unauthorized attempt to locate the mobile device; and send incorrect information to the wireless network in responsive to the detection of the unauthorized attempt to locate the mobile device. - View Dependent Claims (57, 58, 59, 60)
-
Specification