Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused
First Claim
1. A method of displaying owner information for security applications in a secure mode operation of a mobile phone, comprising the steps of:
- checking a SIM card;
displaying a PIN code query if the PIN code query is “
on”
, receiving a user PIN code, and checking the PIN code; and
either starting up the mobile phone so a user can operate the mobile phone normally if the SIM card is recognized as a mobile phone owner'"'"'s SIM card known by the mobile phone and if the PIN code is successfully entered, or locking the mobile phone and displaying a phone display message with owner information if the code PIN query is cancelled.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus is provided for controlling a mobile phone when it has been lost or stolen in order to prevent its use except to help the owner find it. Controlling the phone remotely may be implemented via a known Short Messaging System, for example. The security features provided are as follows: (1) Displaying contact information (phone number) of the owner on screen when the mobile phone can not start up normally, for example, due to an incorrect security code entry; (2) Setting the mobile phone in a secure state where it can only be used to call one number (Emergency calls are of course always possible.); and (3) Commanding the mobile phone to send information about its location and usage via SMS to a given number.
922 Citations
56 Claims
-
1. A method of displaying owner information for security applications in a secure mode operation of a mobile phone, comprising the steps of:
-
checking a SIM card;
displaying a PIN code query if the PIN code query is “
on”
, receiving a user PIN code, and checking the PIN code; and
either starting up the mobile phone so a user can operate the mobile phone normally if the SIM card is recognized as a mobile phone owner'"'"'s SIM card known by the mobile phone and if the PIN code is successfully entered, or locking the mobile phone and displaying a phone display message with owner information if the code PIN query is cancelled. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
requesting a security code from the user if the SIM card is not recognized as a mobile phone owner'"'"'s SIM card known by the mobile phone, and the PIN code is entered correctly, and checking the security code; and
either starting up the mobile phone so the user can operate the mobile phone normally if the security code is entered correctly, or locking the mobile phone and displaying the phone display message with owner information if a security code request is cancelled, or if a wrong security code is given.
-
-
3. A method according to claim 1, wherein the step of locking the mobile phone comprises the steps of:
only allowing a phone call to an owner'"'"'s phone number displayed in the phone display message; and
disabling any other use of the mobile phone, except for emergency calls.
-
4. A method according to claim 3, wherein the method includes requesting the owner information from the user and storing the owner information in the memory.
-
5. A method according to claim 1, wherein the method further comprises the steps of:
receiving a control message via a telecommunications signal from an owner of the mobile phone with a phone lost command for locking the mobile phone and displaying the phone display message.
-
6. A method according to claim 5, wherein the phone display message includes a phone locked display message containing the text “
- Phone is locked. Call the owner.”
, as well as an owner'"'"'s telephone number stored in a memory of the mobile phone.
- Phone is locked. Call the owner.”
-
7. A method according to claim 5, wherein the control message includes an owner telephone number for displaying in the phone display message to reach the owner of the mobile phone.
-
8. A method according to claim 5, wherein the phone display message includes a phone lost display message containing the text “
- This phone is lost. Call the owner.”
, and an owner'"'"'s telephone number that is provided in the control message.
- This phone is lost. Call the owner.”
-
9. A method according to claim 5, wherein the method includes the steps of:
-
switching the mobile phone off; and
either restarting the mobile phone so the user can operate the mobile phone normally if the PIN code and security code are entered correctly, or locking the mobile phone if the PIN code and security code are not entered correctly, and displaying the phone display message as a phone lost display message containing the text “
This phone is lost. Call the owner.”
, and an owner'"'"'s telephone number that is provided in the control message.
-
-
10. A method according to claim 5, wherein the phone display message includes a phone lost display message containing the text “
- This phone is stolen. Call the owner.”
, and an owner'"'"'s telephone number that is either stored in a memory of the mobile phone or provided in the control message.
- This phone is stolen. Call the owner.”
-
11. A method according to claim 5, wherein the method includes the step of:
transferring the control message from the user using a short message system.
-
12. A method according to claim 11, wherein the step of transferring includes sending the control message with any mobile phone having the short message system.
-
13. A method according to claim 11, wherein the method includes the step of:
enabling the mobile phone to automatically receive the control message when the mobile phone is “
on” and
in contact with the network.
-
14. A method according to claim 5, wherein the method includes the step of:
using a control language for sending the control messages to the mobile phone that has commands and parameters separated by nonprinting characters.
-
15. A method according to claim 5, wherein the method includes the step of:
using a control language for sending the control message to the mobile phone that starts with a command having a keyword SECURITY followed by the security code of the mobile phone.
-
16. A method according to claim 5, wherein the method includes the steps of:
-
receiving a short message that is a part of the control message; and
checking the mobile phone at the beginning of the short message, and if a keyword with a matching security code is found, then interpreting the control message and adapting the mobile phone accordingly.
-
-
17. A method according to claim 1, wherein the method further comprises the steps of:
-
receiving a phone status request from a remote source; and
providing a status message with information about the mobile phone in response thereto.
-
-
18. A method according to claim 17, wherein the phone status request includes a phone number to which the status message is to be sent.
-
19. A method according to claim 17, wherein the status message includes information about a position location of the mobile phone.
-
20. A method according to claim 17, wherein the status message includes information about usage of the mobile phone, including data about a last usage.
-
21. A method according to claim 1, wherein the method includes storing owner information in a memory of the mobile phone.
-
22. A method according to claim 1, wherein the phone display message is a phone locked display message containing the text “
- Phone is locked. Call the owner.”
, and the owner'"'"'s telephone number.
- Phone is locked. Call the owner.”
-
23. A method for locking a mobile phone, comprising the steps of:
-
receiving either a user security input signal and a personal identification input signal, or a telecommunication control signal, or a combination thereof, the telecommunication signal being a remote owner status request message signal via a telecommunication network from an owner of the mobile phone requesting status information;
locking the mobile phone in response thereto; and
providing a status message signal via the telecommunications network to the owner with information about the mobile phone. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
transferring the telecommunication control signal from the owner using a short message system.
-
-
34. A mobile phone for communicating in a telecommunications network, the mobile phone comprising:
security and control modules, responsive to either a user security input signal and a personal identification input signal, or a telecommunication control signal, or a combination thereof, for locking the mobile phone in response thereto, the security and control modules including a status message module that receives the telecommunication control signal in the form of a remote owner status request message signal from an owner of the mobile phone requesting status information, for providing a status message telecommunication signal to the owner with information about the mobile phone. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
45. A method for remotely locking a mobile phone, comprising the steps of:
-
receiving a telecommunication control signal;
locking the mobile phone if the telecommunication control signal contains a control message with a phone stolen instruction therein;
requesting a security code from a user if a SIM card is not recognizer as a mobile phone owner'"'"'s SIM card known by the mobile phone, and a PIN code is entered correctly, and checking a security code; and
either starting up the mobile phone so the user can operate the mobile phone normally if the security code is entered correctly, or locking the mobile phone and displaying the phone display message with owner information if a security code request is cancelled, or if a wrong security code is given. - View Dependent Claims (46, 47, 48, 49, 50, 51)
only allowing a phone call to the owner'"'"'s phone number displayed in the phone display message; and
disabling any other use of the mobile phone, except for emergency calls.
-
-
47. A method according to claim 45, wherein the method further comprises the steps of:
receiving a control message from the owner of the mobile phone with a phone lost command for locking the mobile phone and displaying the phone display message in the form of a phone lost display message.
-
48. A method according to claim 45, wherein the method includes the step of displaying the phone display message in the form of a phone locked display message with the text:
- “
This phone is locked. Call the owner.”
, as well as the phone number of the owner of the mobile phone.
- “
-
49. A method according to claim 45, wherein the method includes the step of displaying the phone display message in the form of a phone lost display message with the text:
- “
This phone is lost. Call the owner.”
, as well as the phone number of the owner of the mobile phone.
- “
-
50. A method according to claim 45, wherein the method includes the step of displaying the phone display message in the form of a phone stolen display message with the text:
- “
This phone is stolen. Call the owner.”
, as well as the phone number of the owner of the mobile phone.
- “
-
51. A method according to claim 45, wherein the method includes the step of:
transferring the telecommunication control signal using a short message system.
-
52. A method for remotely locking a mobile phone comprising the steps of:
-
receiving a telecommunication control signal;
locking the mobile phone and displaying a phone display message with owner information for contacting an owner of the mobile phone if the communication control signal contains a control message with a phone stolen instruction therein;
receiving a phone status request via a telecommunications network from a remote source; and
providing a status message via the telecommunications network with information about the mobile phone back to the remote source. - View Dependent Claims (53, 54, 55)
-
-
56. A method for remotely locking a mobile phone comprising the steps of:
-
receiving a telecommunication control signal;
locking the mobile phone and displaying a phone display message with owner information for contacting an owner of the mobile phone if the telecommunication control signal contains a control message with a phone stolen instruction therein; and
sending via the communication control signal a remote PIN code command to the mobile phone to request a PIN code from a user.
-
Specification