METHODS AND SYSTEMS FOR CAUSING MOBILE COMMUNICATIONS DEVICES TO EMIT SOUNDS WITH ENCODED INFORMATION
First Claim
Patent Images
1. A method comprising:
- detecting, by a first security component on a mobile communications device, a usage of the mobile communications device;
comparing, by the first security component, the detected usage to a stored usage pattern associated with an authorized user of the mobile communications device to determine if there is a difference between the detected usage and the stored usage pattern;
associating, by the first security component, a measure with the stored usage pattern when there is a difference between the detected usage and the stored usage pattern;
determining, by the first security component, that the detected usage was not caused by the authorized user of the mobile communications device when the associated measure is beyond a threshold measure; and
in response to the determination, issuing a command by the first security component, the command causing the mobile communications device to emit a sound encoded with information identifying the mobile communications device, the encoded information decodable only by an electronic device.
9 Assignments
0 Petitions
Accused Products
Abstract
A method is provided for comparing a usage of a mobile communications device to a stored pattern of usage. When a measure associated with a difference between the usage and the stored usage pattern exceeds a threshold, the mobile communications device is caused to emit a sound encoded with information that may be decoded by another electronic device.
11 Citations
20 Claims
-
1. A method comprising:
-
detecting, by a first security component on a mobile communications device, a usage of the mobile communications device; comparing, by the first security component, the detected usage to a stored usage pattern associated with an authorized user of the mobile communications device to determine if there is a difference between the detected usage and the stored usage pattern; associating, by the first security component, a measure with the stored usage pattern when there is a difference between the detected usage and the stored usage pattern; determining, by the first security component, that the detected usage was not caused by the authorized user of the mobile communications device when the associated measure is beyond a threshold measure; and in response to the determination, issuing a command by the first security component, the command causing the mobile communications device to emit a sound encoded with information identifying the mobile communications device, the encoded information decodable only by an electronic device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
detecting, by a first security component on a first server, a usage of a mobile communications device; comparing, by the first security component, the detected usage to a stored usage pattern associated with an authorized user of the mobile communications device to determine if there is a difference between the detected usage and the stored usage pattern; associating, by the first security component, a measure with the stored usage pattern when there is a difference between the detected usage and the stored usage pattern; determining, by the first security component, that the detected usage was not caused by the authorized user of the first mobile communications device when the associated measure is beyond a threshold measure; and in response to the determination, issuing a command by the first security component, the command causing the first mobile communications device to emit a sound encoded with information identifying the first mobile communications device, the encoded information decodable only by an electronic device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification