Enabling remote and anonymous control of mobile and portable multimedia devices for security, tracking and recovery
First Claim
1. A method for communication, the method comprising:
- activating by a first communication device, control of one or more resources on a handheld communication device to monitor one or more unauthorized operations by an unauthorized user of said handheld communication device, wherein;
said monitoring occurs without knowledge of the unauthorized user of said handheld communication device;
a unique identifier is securely stored on said handheld communication device under control of an owner or authorized user of said handheld communication device, said unique identifier configured for authentication of said handheld communication device by the first communication device for controlling said one or more resources, andsecure executable code is installed on said handheld communication device by the owner or authorized user of said first communication device, wherein;
said secure executable code and said unique identifier are inaccessible via an operating system shell of said handheld communication device; and
without knowledge of said unauthorized user of said handheld communication device, said secure executable code enables said monitoring;
in response to said activating, receiving by said first communication device, monitored information from said handheld communication device produced by said unauthorized operation by said unauthorized user of said handheld communication device; and
accessing said handheld communication device by the unique identifier of said handheld communication device that is securely stored within said handheld communication device, the unique identifier being independent of a network access identifier for the handheld communication device.
6 Assignments
0 Petitions
Accused Products
Abstract
Aspects of the invention comprise a remote tracking and control server operable to transparently activate control of resources and to monitor operations on a target handheld communication device utilizing code installed on the handheld device. The resources may comprise a camera, microphone, GPS receiver, input device, display, speaker, wireless and/or wire-line transmitter and/or receiver. The monitoring and/or controlling activity is protected from interruption. The handheld device may be accessed by a securely stored unique identifier. Access to the controlling function and/or the resources by a user of the handheld device may be restricted. Monitored information is stored on the handheld device and communicated to the tracking server. The control server may receive monitored information from the handheld device whenever the device is coupled to a communication network. Monitoring may be initiated based on detected motion, sound, user input, video and/or touch.
-
Citations
31 Claims
-
1. A method for communication, the method comprising:
-
activating by a first communication device, control of one or more resources on a handheld communication device to monitor one or more unauthorized operations by an unauthorized user of said handheld communication device, wherein; said monitoring occurs without knowledge of the unauthorized user of said handheld communication device; a unique identifier is securely stored on said handheld communication device under control of an owner or authorized user of said handheld communication device, said unique identifier configured for authentication of said handheld communication device by the first communication device for controlling said one or more resources, and secure executable code is installed on said handheld communication device by the owner or authorized user of said first communication device, wherein; said secure executable code and said unique identifier are inaccessible via an operating system shell of said handheld communication device; and without knowledge of said unauthorized user of said handheld communication device, said secure executable code enables said monitoring; in response to said activating, receiving by said first communication device, monitored information from said handheld communication device produced by said unauthorized operation by said unauthorized user of said handheld communication device; and accessing said handheld communication device by the unique identifier of said handheld communication device that is securely stored within said handheld communication device, the unique identifier being independent of a network access identifier for the handheld communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for communication, the system comprising:
- one or more circuits in a first communication device, said one or more circuits are operable to activate control of one or more resources by an unauthorized user on a handheld communication device to monitor one or more unauthorized operations of said handheld communication device by the unauthorized user, wherein;
said monitoring occurs without knowledge of the unauthorized user of said handheld communication device; a unique identifier is securely stored on said handheld communication device under control of an owner or authorized user of said handheld communication device, said unique identifier configured for authentication of said handheld communication device by the first communication device for controlling said one or more resources, and secure executable code is installed under control of the owner or authorized user of said handheld communication device on said handheld communication device, wherein; said secure executable code and the unique identifier are inaccessible via an operating system shell of said handheld communication device; and said secure executable code enables said monitoring; said one or more circuits are operable to receive by said first communication device, monitored information due to unauthorized usage of said handheld communication device by said unauthorized user from said handheld communication device, in response to said activation; and
said one or more circuits are operable to access said handheld communication device by the unique identifier of said handheld communication device that is securely stored within said handheld communication device, the unique identifier being independent of a network access identifier for the handheld communication device. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
- one or more circuits in a first communication device, said one or more circuits are operable to activate control of one or more resources by an unauthorized user on a handheld communication device to monitor one or more unauthorized operations of said handheld communication device by the unauthorized user, wherein;
-
30. A method for communication, the method comprising:
- in a first handheld communication device;
receiving a unique identifier for the first handheld communication device; securely storing the unique identifier within the first handheld communication device so that the unique identifier is inaccessible or hidden from unauthorized access; receiving a surveillance status of said first handheld communication device from a second communication device, the surveillance status established by an authorized user of the first communication device to monitor use of the first handheld communication device by an unauthorized user; and in response to the received surveillance status, communicating the unique identifier for authentication and confirmation of the status of the first communication device; based on said received surveillance status, controlling by secure executable code located within said first handheld communication device, said secure executable code being inaccessible via an operating system on said first handheld communication device, one or more of; monitoring local control of device resources in said first communication device wherein said local control is performed by a local user who is an unauthorized user of said first communication device; monitoring usage of device resources in said first communication device and corresponding data generated by said usage, wherein said usage is performed by said unauthorized local user of said first communication device; and activating resources within said first handheld communication device to monitor activity by said unauthorized local user of said first handheld communication device; and communicating by said first handheld communication device to said second communication device, monitored information from said first communication device; and providing access to said first handheld communication device by the unique identifier of said handheld communication device that is securely stored within said handheld communication device, the unique identifier being independent of a network access identifier for the handheld communication device. - View Dependent Claims (31)
- in a first handheld communication device;
Specification