Unauthorized location detection and countermeasures
First Claim
1. A mobile device operable to communicate with a wireless network and configured to monitor software running on the mobile device to detect unauthorized location attempts, comprising:
- a processor; and
a memory coupled to the processor, the memory including instructions that upon execution cause the processor to execute an operational procedure for monitoring software running on the mobile device, the memory comprising;
instructions for identifying a sequence of events indicative of a possible unauthorized attempt to locate the mobile device, wherein the sequence of events includes;
an event indicating that a location subsystem of the mobile device was activated;
an event indicating that the mobile device entered into a scanning mode for receiving beacon signals from a plurality of base stations or for receiving satellite signals from a plurality of satellites; and
an event indicating that data used to assist in a location calculation was received from a wireless network;
instructions for logging the sequence of events and analyzing the sequence of events to identify an unauthorized location attempt;
instructions for responding to the unauthorized location attempt by transmitting inaccurate location information;
instructions for a receiver-location sentry client application that encapsulates an application program interface for a wireless receiver, wherein the receiver-location sentry client application is configured to analyze incoming messages received by the wireless receiver;
instructions for a transmitter-location sentry client application that encapsulates an application program interface for a wireless transmitter, wherein the transmitter-location sentry client application is configured to analyze messages placed into an outgoing queue for transmission to the wireless network; and
instructions for a location-subsystem-location sentry client application that encapsulates an application program interface for the location subsystem, wherein the location-subsystem-location sentry client application is configured to analyze messages sent to the location subsystem.
2 Assignments
0 Petitions
Accused Products
Abstract
A location sentry system is provided for use within a mobile device. The sentry system can be configured to detect unauthorized attempts to locate mobile devices by monitoring messages passed between the mobile device and the wireless network and/or messages passed between components of the mobile device, and determining that one or more of the messages is/are indicative of an attempt to locate the mobile device. In response to a determination that an unauthorized attempt has been detected, the location sentry can be configured to take one or more actions. For example, the location sentry system could prevent location information from being sent back to the wireless network and/or the location sentry system could cause incorrect information to be sent to the wireless network.
28 Citations
17 Claims
-
1. A mobile device operable to communicate with a wireless network and configured to monitor software running on the mobile device to detect unauthorized location attempts, comprising:
-
a processor; and a memory coupled to the processor, the memory including instructions that upon execution cause the processor to execute an operational procedure for monitoring software running on the mobile device, the memory comprising; instructions for identifying a sequence of events indicative of a possible unauthorized attempt to locate the mobile device, wherein the sequence of events includes; an event indicating that a location subsystem of the mobile device was activated; an event indicating that the mobile device entered into a scanning mode for receiving beacon signals from a plurality of base stations or for receiving satellite signals from a plurality of satellites; and an event indicating that data used to assist in a location calculation was received from a wireless network; instructions for logging the sequence of events and analyzing the sequence of events to identify an unauthorized location attempt; instructions for responding to the unauthorized location attempt by transmitting inaccurate location information; instructions for a receiver-location sentry client application that encapsulates an application program interface for a wireless receiver, wherein the receiver-location sentry client application is configured to analyze incoming messages received by the wireless receiver; instructions for a transmitter-location sentry client application that encapsulates an application program interface for a wireless transmitter, wherein the transmitter-location sentry client application is configured to analyze messages placed into an outgoing queue for transmission to the wireless network; and instructions for a location-subsystem-location sentry client application that encapsulates an application program interface for the location subsystem, wherein the location-subsystem-location sentry client application is configured to analyze messages sent to the location subsystem. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
Specification