System for monitoring the unauthorized use of a device
First Claim
1. A tracking and loss mitigation system comprising:
- a mobile device, the device comprising;
a user interface including a display and a data entry interface; and
a communications interface to a security authority, the communications interface configured to provide an authenticatable message from the security authority on behalf of an authorized user of the mobile device;
wherein the mobile device is configured to;
provide, by the user interface of the mobile device, a notification describing how to return the mobile device to an authorized user;
receive and decode a communication from the security authority through the communications interface to the security authority, the communication initiated on behalf of a request from the authorized user of the mobile device to the security authority;
authenticate the validity of the decoded communication by one of;
computing a digest of the communication and comparing the digest value to a previously stored authorization digest value; and
decrypting at least part of the message with a public key associated with the sender of the message as part of an asymmetric encryption algorithm;
detect, from the decoding of the communication, that a security compromise event has occurred; and
determine, from the decoded communication, whether the function of the device should be altered in response to said security event; and
wherein the security authority comprises one of a governmental law enforcement organization, private security firm, an insurance agency, and combinations thereof; and
wherein the mobile device is further configured to detect that a security compromise event has occurred by;
associating the mobile device with a companion device; and
determining that the mobile device has been disassociated from the companion device by;
measuring a plurality of power levels of a wireless signal transmitted by the companion device;
computing an average power level from the plurality of measured power levels;
measuring a current power level of a wireless signal transmitted by the companion device; and
determining that the measured current power level has varied from the average power level by a predetermined amount by;
computing a standard deviation of the plurality of measured power levels; and
determining that the current power level exceeds an allowed signal range determined by a predetermined constant times the standard deviation of the plurality of measured signal.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
103 Citations
18 Claims
-
1. A tracking and loss mitigation system comprising:
-
a mobile device, the device comprising; a user interface including a display and a data entry interface; and a communications interface to a security authority, the communications interface configured to provide an authenticatable message from the security authority on behalf of an authorized user of the mobile device; wherein the mobile device is configured to;
provide, by the user interface of the mobile device, a notification describing how to return the mobile device to an authorized user;receive and decode a communication from the security authority through the communications interface to the security authority, the communication initiated on behalf of a request from the authorized user of the mobile device to the security authority; authenticate the validity of the decoded communication by one of; computing a digest of the communication and comparing the digest value to a previously stored authorization digest value; and decrypting at least part of the message with a public key associated with the sender of the message as part of an asymmetric encryption algorithm; detect, from the decoding of the communication, that a security compromise event has occurred; and determine, from the decoded communication, whether the function of the device should be altered in response to said security event; and wherein the security authority comprises one of a governmental law enforcement organization, private security firm, an insurance agency, and combinations thereof; and wherein the mobile device is further configured to detect that a security compromise event has occurred by; associating the mobile device with a companion device; and determining that the mobile device has been disassociated from the companion device by; measuring a plurality of power levels of a wireless signal transmitted by the companion device; computing an average power level from the plurality of measured power levels;
measuring a current power level of a wireless signal transmitted by the companion device; anddetermining that the measured current power level has varied from the average power level by a predetermined amount by;
computing a standard deviation of the plurality of measured power levels; anddetermining that the current power level exceeds an allowed signal range determined by a predetermined constant times the standard deviation of the plurality of measured signal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification