Method and apparatus for auxiliary communications with mobile communications device
First Claim
1. A method for locating a lost or stolen mobile communications device, wherein a mobile communications device operating system resides in a primary read-only memory, and relevant data and components for the operating system are loaded from the primary read-only memory into a random-access memory of the mobile communications device, comprising:
- providing a secondary read-only memory in the mobile communications device configured to work separately from and in parallel with the operating system, the secondary read-only memory storing computer-readable instructions, which when executed by a processor, operate a first security component and a security transceiver, the security transceiver configured to operate independently of a primary transceiver also controlled by the operating system;
detecting, by the first security component, an occurrence of a defined trigger event;
in response to the detected trigger event, transmitting by the security transceiver a first security message to a remote device;
receiving, by the security transceiver, a second security message from the remote device; and
performing, by the first security component, a defined action on the mobile communications device in response to the received second security message.
9 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for auxiliary communications capability in a mobile communications device. The mobile communications device is configured with a hidden ROM that configures a security component to work separate and apart from the OS. A secondary transceiver is configured with the security component to send and receive security transmissions, also separate and apart from the OS and the primary transceiver of the OS. Logic to detect specified trigger events is hard-coded into the hidden ROM, and detection of such an event places the mobile communications device into a special security mode. While in the special security mode, the secondary transceiver can send and receive security messages, including the location of the mobile communications device. Further, depending upon the received messages or commands, the security component can take pre-programmed security actions, such as erasing or faking data in the device.
297 Citations
30 Claims
-
1. A method for locating a lost or stolen mobile communications device, wherein a mobile communications device operating system resides in a primary read-only memory, and relevant data and components for the operating system are loaded from the primary read-only memory into a random-access memory of the mobile communications device, comprising:
-
providing a secondary read-only memory in the mobile communications device configured to work separately from and in parallel with the operating system, the secondary read-only memory storing computer-readable instructions, which when executed by a processor, operate a first security component and a security transceiver, the security transceiver configured to operate independently of a primary transceiver also controlled by the operating system; detecting, by the first security component, an occurrence of a defined trigger event; in response to the detected trigger event, transmitting by the security transceiver a first security message to a remote device; receiving, by the security transceiver, a second security message from the remote device; and performing, by the first security component, a defined action on the mobile communications device in response to the received second security message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for starting up and operating a mobile communications device, wherein a mobile communications device operating system resides in a primary read-only memory, and relevant data and components for the operating system are loaded from the primary read-only memory into a random-access memory of the mobile communications device, comprising:
-
(i) initializing a secondary read-only memory that stores computer-readable instructions, which when executed by a processor, configure a first security component to (a) control a first transceiver, (b) detect defined events occurring within the operating system, (c) capture and store data in a predefined location in the random-access memory in response to a defined event, and (d) send and receive transmissions with the first transceiver; (ii) performing a defined action on data in the secondary read-only memory if a flag is set indicating that the mobile communications device has been lost or stolen; (iii) initializing the primary read-only memory that stores computer-readable instructions, which when executed by a processor, configure the operating system to (a) load relevant data and computer-readable instructions into the random-access memory, (b) control a second transceiver, and (c) send and receive transmissions with the second transceiver; (iv) operating the mobile communications device in accord with the operating system; (v) detecting, by the first security component, a defined trigger event occurring in the operating system; (vi) transmitting, by the first transceiver in response to the detected trigger event, a first security message to a remote device; and (vii) setting the flag if a second security message is received by the first transceiver from a remote device indicating that the mobile communications device has been reported as lost or stolen. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A mobile communications device, comprising:
-
a random-access memory; a primary read-only memory storing computer-readable instructions, which when executed by a processor operate a first security component to erase at least some of the data in a defined location of the random-access memory if a security flag is set; an operating system residing on the primary read-only memory, wherein relevant data and components for the operating system are loaded from the primary read-only memory into the random-access memory on start-up; a primary transceiver controlled by the operating system; and a secondary read-only memory storing computer-readable instructions, which when executed by a processor configure the secondary read-only memory to work separately from and in parallel with the operating system, the secondary read-only memory also including computer-readable instructions to operate a second security component and a security transceiver, the security transceiver configured to operate independently of the primary transceiver, the second security component configured to monitor the operating system to detect at least one defined trigger event, wherein the security transceiver transmits a security message to a remote device if a defined trigger event is detected; wherein the random-access memory includes a third security component configured to save data into a defined location. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30)
-
Specification