Method and apparatus for automatically damaging circuitry of a mobile device when one or more conditions are detected
First Claim
1. A mobile device that is configurable to damage itself to prevent unauthorized use, the mobile device comprising:
- a receiver (Rx) configured to receive radio frequency (RF) signals transmitter over air from a wireless network, the Rx including receiver electrical circuitry that provides a receive channel for receiving the received RF signals;
a transmitter (Tx) configured to output RF signals for transmission over air from the mobile device to the wireless network, the Tx including transmitter electrical circuitry that provides a transmit channel for outputting an RF signal to be transmitted over air from the mobile device to the wireless network;
a memory device configured to store data and computer code;
a switching circuit coupled to the receive channel of the Rx and to the transmit channel of the Tx, wherein the switching circuit is switchable between at least a first switching state in which the switching circuit is opened and a second switching state in which the switching circuit is closed, wherein in the second switching state, the transmit channel is electrically connected to the receive channel such that an RF signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage at least part of the receiver electrical circuitry to thereby render the Rx inoperable;
a processing device configured to perform at least one algorithm that controls the switching circuit, wherein said at least one algorithm determines whether or not a message received by the Rx from the wireless network includes an Rx destroy (Destroy_Rx) command; and
wherein if said at least one algorithm determines that a message received by the Rx from the wireless network includes a Destroy_Rx command, the processing device causes the switching circuit to be switched to the second switching state.
8 Assignments
0 Petitions
Accused Products
Abstract
A mobile device is configured with electrical circuitry that causes the transmit channel electrical circuitry of the transmitter (Tx) of the mobile device to be electrically coupled to the receive channel electrical circuitry of the receiver (Rx) of the mobile device when one or more predetermined conditions occur. The electrical coupling of the transmit channel circuitry to the receive channel circuitry causes the Rx to be sufficiently damaged to render the mobile device nonoperational, thereby preventing further use of the mobile device. The one or more predetermined conditions correspond to conditions that indicate the mobile device has been lost or stolen and/or that an unauthorized user is attempting to use the mobile device in some manner.
-
Citations
19 Claims
-
1. A mobile device that is configurable to damage itself to prevent unauthorized use, the mobile device comprising:
-
a receiver (Rx) configured to receive radio frequency (RF) signals transmitter over air from a wireless network, the Rx including receiver electrical circuitry that provides a receive channel for receiving the received RF signals; a transmitter (Tx) configured to output RF signals for transmission over air from the mobile device to the wireless network, the Tx including transmitter electrical circuitry that provides a transmit channel for outputting an RF signal to be transmitted over air from the mobile device to the wireless network; a memory device configured to store data and computer code; a switching circuit coupled to the receive channel of the Rx and to the transmit channel of the Tx, wherein the switching circuit is switchable between at least a first switching state in which the switching circuit is opened and a second switching state in which the switching circuit is closed, wherein in the second switching state, the transmit channel is electrically connected to the receive channel such that an RF signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage at least part of the receiver electrical circuitry to thereby render the Rx inoperable; a processing device configured to perform at least one algorithm that controls the switching circuit, wherein said at least one algorithm determines whether or not a message received by the Rx from the wireless network includes an Rx destroy (Destroy_Rx) command; and wherein if said at least one algorithm determines that a message received by the Rx from the wireless network includes a Destroy_Rx command, the processing device causes the switching circuit to be switched to the second switching state. - View Dependent Claims (2)
-
-
3. A method for preventing unauthorized use of a mobile device, the method comprising:
in a processing device of a mobile device, performing at least one algorithm that determines whether or not a message received by a receiver (Rx) of the mobile device from a wireless network includes an Rx destroy (Destroy_Rx) command; and if said at least one algorithm determines that a message received by the Rx of the mobile device from a wireless network includes a Destroy_Rx command, causing a switching circuit of the mobile device to be switched from a first switching state in which the switching circuit is open to a second switching state in which the switching circuit is closed; wherein the switching circuit is coupled to a receive channel of the Rx of the mobile device and to a transmit channel of a Tx of the mobile device; and wherein in the second switching state, the transmit channel is electrically connected to the receive channel such that an RF signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage at least part of the receiver electrical circuitry to thereby render the Rx inoperable.
-
4. A non-transitory computer-readable medium having a computer program stored thereon for use in a processing device of a mobile device to prevent unauthorized use of the mobile device, the program comprising computer instructions stored on the computer-readable medium, the instructions comprising:
-
a first set of instructions for performing at least a first algorithm in the mobile device to determine whether or not a message received by a receiver (Rx) of the mobile device from a wireless network includes an Rx destroy (Destroy_Rx) command, the mobile device including a switching circuit that is coupled to a receive channel of the Rx of the mobile device and to a transmit channel of a transmitter (Tx) of the mobile device, wherein the switching circuit is opened in a first switching state and is closed in a second switching state; and a second set of instructions for performing at least a second algorithm in the mobile device if the first set of instructions determines that a message received by the Rx of the mobile device from the wireless network includes a Destroy_Rx command; wherein the second algorithm causes the switching circuit of the mobile device to be switched from the first switching state to the second switching state, and wherein in the second switching state, the transmit channel is electrically connected to the receive channel such that a radio frequency (RF) signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage at least part of electrical circuitry of the Rx to thereby render the Rx inoperable.
-
-
5. A wireless network configured to prevent an unauthorized user from using a mobile device, the network comprising:
-
at least a first network element of the wireless network configured to perform at least a first algorithm that determines whether or not a mobile device has been reported to a provider of the wireless network as being lost or stolen; wherein if the first algorithm determines that a mobile device has been reported as being lost or stolen, said at least a first algorithm tags the particular mobile device as lost or stolen mobile by listing an International Mobile Equipment Identifier (IMEI) number associated with the mobile device on a list of IMEI numbers associated with mobile devices that have been reported lost or stolen; and at least a second network element of the wireless network configured to perform at least a second algorithm that causes an Rx destroy (Destroy_Rx) command to be sent from the wireless network to a mobile device that said at least a first algorithm has tagged as lost or stolen, wherein the Destroy_Rx command commands the particular mobile device to electrically connect a transmit channel of a transmitter (Tx) of the mobile device to a receive channel of a receiver (Rx) of the mobile device such that a radio frequency (RF) signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage electrical circuitry of the Rx to thereby render the Rx inoperable. - View Dependent Claims (6, 7)
-
-
8. A method performed by a wireless network to prevent an unauthorized user from using a mobile device, the method comprising:
-
in a first network element of the wireless network, performing at least a first algorithm that determines whether or not a mobile device has been reported to a provider of the wireless network as being lost or stolen; wherein if said at least a first algorithm determines that the mobile device has been reported lost or stolen, said at least a first algorithm tags the particular mobile device as lost or stolen mobile by listing an International Mobile Equipment Identifier (IMEI) number associated with the mobile device on a list of IMEI numbers associated with mobile devices that have been reported lost or stolen; and in a second network element of the wireless network, performing at least a second algorithm that causes an Rx destroy (Destroy_Rx) command to be sent from the wireless network to a mobile device that said at least a first algorithm has tagged as lost or stolen, wherein the Destroy_Rx command commands the particular mobile device to electrically connect a transmit channel of a transmitter (Tx) of the mobile device to a receive channel of a receiver (Rx) of the mobile device such that a radio frequency (RF) signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage electrical circuitry of the Rx to thereby render the Rx inoperable. - View Dependent Claims (9, 10)
-
-
11. A non-transitory computer-readable medium having a computer program stored thereon for use in a wireless network to prevent unauthorized use of the mobile device, the program comprising computer instructions stored on the computer-readable medium, the instructions comprising:
-
a first set of instructions for performing at least a first algorithm that determines whether or not a mobile device has been reported to a provider of the wireless network as being lost or stolen by determining whether or not an International Mobile Equipment Identifier (IMEI) number associated with the particular mobile device on a list of IMEI numbers associated with mobile devices that have been reported lost or stolen; and a second set of instructions for performing at least a second algorithm that causes an Rx destroy (Destroy_Rx) command to be sent from the wireless network to a mobile device that the fist algorithm has determined to be lost or stolen, wherein the Destroy_Rx command commands the particular mobile device to electrically connect a transmit channel of a transmitter (Tx) of the mobile device to a receive channel of a receiver (Rx) of the mobile device such that a radio frequency (RF) signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage electrical circuitry of the Rx to thereby render the Rx inoperable. - View Dependent Claims (12, 13)
-
-
14. A mobile device that is configurable to damage itself to prevent unauthorized use, the mobile device comprising:
-
a receiver (Rx) configured to receive radio frequency (RF) signals transmitter over air from a wireless network, the Rx including receiver electrical circuitry that provides a receive channel for receiving the received RF signals; a transmitter (Tx) configured to output RF signals for transmission over air from the mobile device to the wireless network, the Tx including transmitter electrical circuitry that provides a transmit channel for outputting an RF signal to be transmitted over air from the mobile device to the wireless network; an input device that allows a user to input information into the mobile device; a memory device configured to store data and computer code; a switching circuit coupled to the receive channel of the Rx and to the transmit channel of the Tx, wherein the switching circuit is switchable between at least a first switching state in which the switching circuit is opened and a second switching state in which the switching circuit is closed, wherein in the second switching state, the transmit channel is electrically connected to the receive channel such that an RF signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage at least part of the receiver electrical circuitry to thereby render the Rx inoperable; a processing device configured to perform at least one algorithm that controls the switching circuit; wherein said at least one algorithm determines whether or not an incorrect password has been entered into the mobile device multiple consecutive times via the input device; and wherein if said at least one algorithm determines that an incorrect password has been entered into the mobile device multiple consecutive times, the processing device causes the switching circuit to be switched to the second switching state.
-
-
15. A method for preventing unauthorized use of a mobile device, the method comprising:
in a processing device of a mobile device, performing at least one algorithm that determines whether or not an incorrect password has been entered into the mobile device multiple consecutive times via an input device of the mobile device; and if said at least one algorithm determines that an incorrect password has been entered into the mobile device multiple consecutive times via an input device of the mobile device, causing a switching circuit of the mobile device to be switched from a first switching state in which the switching circuit is open to a second switching state in which the switching circuit is closed, wherein the switching circuit is coupled to a receive channel of a receiver (Rx) of the mobile device and to a transmit channel of a transmitter (Tx) of the mobile device; and wherein in the second switching state, the transmit channel is electrically connected to the receive channel such that an RF signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage at least part of electrical circuitry of the Rx to thereby render the Rx inoperable.
-
16. A non-transitory computer-readable medium having a computer program stored thereon for use in a processing device of a mobile device to prevent unauthorized use of the mobile device, the switching circuit being coupled to a receive channel of a receiver (Rx) of the mobile device and to a transmit channel of a transmitter (Tx) of the mobile device, the switching circuit being opened in a first switching state and closed in a second switching state, the program comprising computer instructions stored on the computer-readable medium, the instructions comprising:
-
a first set of instructions for performing at least a first algorithm in the mobile device to determine whether or not an incorrect password has been entered into the mobile device multiple consecutive times via an input device of the mobile device; and a second set of instructions for performing at least a second algorithm in the mobile device if the first set of instructions determines that an incorrect password has been entered into the mobile device multiple consecutive times via the input device of the mobile device, wherein the second algorithm causes a switching circuit of the mobile device to be switched from a first switching state to a second switching state, the transmit channel is electrically connected to the receive channel such that a radio frequency (RF) signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage at least part of electrical circuitry of the Rx to thereby render the Rx inoperable.
-
-
17. A wireless network configured to prevent an unauthorized user from using a mobile device, the network comprising:
-
at least a first network element of the wireless network configured to perform at least a first algorithm that determines whether or not a mobile device has attempted, unsuccessfully, to access the wireless network more than predetermined number, N, of times within a predetermined time interval, T, where N is a positive integer and where T is a period of time in seconds; wherein if said at least a first algorithm determines that the mobile device has attempted, unsuccessfully, to access the wireless network more than N times within T seconds, said at least a second algorithm causes the Destroy_Rx command to be sent from the wireless network to the particular mobile device; at least a second network element of the wireless network configured to perform at least a second algorithm that causes an Rx destroy (Destroy_Rx) command to be sent from the wireless network to a mobile device that said at least a first algorithm has determined has attempted, unsuccessfully, to access the wireless network more than N times within T seconds, and wherein the Destroy_Rx command commands the particular mobile device to electrically connect a transmit channel of a transmitter (Tx) of the mobile device to a receive channel of a receiver (Rx) of the mobile device such that a radio frequency (RF) signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage electrical circuitry of the Rx to thereby render the Rx inoperable.
-
-
18. A method performed by a wireless network to prevent an unauthorized user from using a mobile device, the method comprising:
-
in a first network element of the wireless network, performing at least a first algorithm that determines whether or not a mobile device has attempted, unsuccessfully, to access the wireless network more than predetermined number, N, of times within a predetermined time interval, T, where N is a positive integer and where T is a period of time in seconds; and in a second network element of the wireless network, performing at least a second algorithm that causes an Rx destroy (Destroy_Rx) command to be sent from the wireless network to a mobile device that said at least a first algorithm has determined has attempted, unsuccessfully, to access the wireless network more than N times within T seconds, wherein the Destroy_Rx command commands the particular mobile device to electrically connect a transmit channel of a transmitter (Tx) of the mobile device to a receive channel of a receiver (Rx) of the mobile device such that a radio frequency (RF) signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage electrical circuitry of the Rx to thereby render the Rx inoperable.
-
-
19. A non-transitory computer-readable medium having a computer program stored thereon for use in a wireless network to prevent unauthorized use of the mobile device, the program comprising computer instructions stored on the computer-readable medium, the instructions comprising:
-
a first set of instructions for performing at least a first algorithm that determines whether or not a mobile device has attempted, unsuccessfully, to access the wireless network more than predetermined number, N, of times within a predetermined time interval, T, where N is a positive integer and where T is a period of time in seconds; and a second set of instructions for performing at least a second algorithm that causes an Rx destroy (Destroy_Rx) command to be sent from the wireless network to a mobile device that the fist algorithm has determined has attempted, unsuccessfully, to access the wireless network more than N times within T seconds, wherein the Destroy_Rx command commands the mobile device to electrically connect a transmit channel of a transmitter (Tx) of the mobile device to a receive channel of a receiver (Rx) of the mobile device such that a radio frequency (RF) signal output on the transmit channel is received on the receive channel with sufficient power to sufficiently damage electrical circuitry of the Rx to thereby render the Rx inoperable.
-
Specification