![]() Apparatus and method for determining the location of a wireless device after shutdown
专利摘要:
APPLIANCE AND METHOD FOR DETERMINING THE LOCATION OF A WIRELESS DEVICE AFTER SHUTDOWN. The present invention relates to a wireless data processing device which periodically exits a powered off state and transmits location data. For example, one embodiment of a wireless data processing device comprises: a power circuit for maintaining the wireless data processing device in an on or off state, the power circuit causing the data processing device wireless enters an off state responsive to user input; a timer for periodically turning on the wireless device or a portion thereof in response to reaching a predetermined time; a location services module that determines a current location of the wireless data processing device using one or more specified location determination techniques; a transmission stream that transmits the current location of the wireless device over one or more specified communication channels; and the power circuit turning off the wireless data processing device a second time after the current location has been transmitted 公开号:BR102013009846B1 申请号:R102013009846-9 申请日:2013-04-22 公开日:2022-01-25 发明作者:Alexander D. Schlaupitz;Joshua G. Wurzel;Ahmad Al-Dahle 申请人:Apple Inc.; IPC主号:
专利说明:
FUNDAMENTALS FIELD OF THE INVENTION The present invention generally relates to the field of computer networking. More specifically, the invention relates to an improved apparatus and method for determining the location of a wireless device upon shutdown. DESCRIPTION OF RELATIVE TECHNIQUE Security features common to handheld and portable products allow the location of the product to be identified when requested by the user, such as in cases where the product has been lost or stolen. However, this technology is limited in cases where the product was lost/stolen and subsequently turned off (ie in a non-powered state). The embodiments of the invention described below add an additional layer of security to locate devices in these situations. BRIEF DESCRIPTION OF THE DRAWINGS A better understanding of the present invention can be obtained from the following detailed description in conjunction with the following drawings, in which: FIG. 1A illustrates an embodiment of the invention for determining the location of a wireless device after a power outage. FIG. 18 illustrates another embodiment of the invention for determining the location of a wireless device upon shutdown. FIG. 19 illustrates one embodiment of a method for determining the location of a wireless device after power off. FIG. 20 illustrates an application programming interface employed in an embodiment of the invention. FIG. 21 illustrates exemplary applications that interface to services and operating systems in accordance with an embodiment of the invention. FIG. 22 illustrates an architecture of a data processing device in which embodiments of the invention may be implemented. FIG. 23 illustrates another architecture of a data processing device in which embodiments of the invention may be implemented. DETAILED DESCRIPTION OF PREFERRED MODALITIES Described below are embodiments of an apparatus, method, and machine-readable medium for establishing, maintaining, and utilizing primary and/or backup point-to-point ("P2P") communication channels on a network. A request service and a match service are also described to invite users and match users respectively for P2P sessions. In addition, a transfer service is described to allow users to establish transfer connections under certain specified conditions. Finally, an application framework and associated application programming interface (API) are described to allow application developers to design applications that take advantage of the various online collaborative features described here. Throughout the description, for the purposes of explanation, numerous specific details are presented in order to provide a complete understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention can be practiced without some of these specific details. In other cases, well-known structures and devices are not shown or are shown in a block diagram form to avoid obscuring the underlying principles of the present invention. APPLIANCE AND METHOD FOR DETERMINING THE LOCATION OF A WIRELESS DEVICE AFTER SHUTDOWN The embodiments of the invention described below allow wireless devices such as the iPad® or iPhone® (designed by assignor of the present application) to automatically turn on again, send their location information, and turn off again after being initially turned off. In one embodiment of the Invention, software or hardware activates during the shutdown sequence for the wireless device (such as after pressing the Lock and Home buttons on an iPhone and entering the shutdown screen) where an option appears to either enter a shutdown security code to disable location security features prior to shutdown, or bypass the code and enable features during shutdown. In one embodiment, failing to enter the correct code after a specified number of attempts automatically activates the security features described here and turns off the wireless device. In one embodiment, when activated, the device's current location is periodically transmitted over a designated set of communication channels (e.g., email, a designated network address, a text message, etc.) and the device thereafter shuts down until the time for the next transmission arrives. The frequency at which the current device location is transmitted can be specified by the end user or can be automatically adjusted in the software/firmware. The end user may also be provided with the option to disable the features described here. In one embodiment, location transmissions continue until the security code is properly entered when the unit is manually turned on by a user, and/or when the code is entered during one of the automatic calls. Figure 1A illustrates an embodiment of a mobile device 120 which includes a location services module 105 for determining a current location of the mobile device (e.g., using a global positioning system (GPS) signal 110); a transmission stream 106 for periodically transmitting the location of the mobile device; and a timer module 107 for periodically waking up the transmission stream 106. As indicated, the timer 107 can be programmed to wake up the transmission stream 106 at an end user configured frequency 112. In one embodiment, a security component 114 of the The device's operating system 104 manages the security code required to disable periodic transmissions and activates the transmission stream 106 and timer 107 until the correct security code has been entered. In this embodiment, the OS 104 and all system components 105-107 are implemented as software executed by the mobile device's processor 100. Once operational after a device is turned off, timer 107 periodically wakes up stream 106. Stream 106 then retrieves the current location of mobile device 120 from location services module 105 and transmits the current location over one or more further communication channels 155 through a wireless transceiver 150. In one embodiment, the communication channels (which may also be specified by the end user) include an email address 150, an instant message address 151, a service message short message (SMS) 152, and/or a server address 153. For example, if email is used, the current device location is stored within the subject line or body of an email and sent to a user-specified email address. If instant messaging is used, device 120 can automatically log into an instant messaging service (specified by the user) and transmit an instant message to the user's IM account. If an SMS is used, the transmission stream may invoke the SMS application on mobile device 120 to transmit an SMS message to a designated telephone number. If a server address is used, the stream will send the current location of the device to the server (for example, to a specific uniform resource locator (URL)) using a pre-specified communication format (for example, such as an XML document). The user can log into the server using a wireless device or an alternate computer to determine the current location of the mobile device. Alternatively, the server can push the device's current location off the user's alternate wireless device or computer. In another embodiment of the invention illustrated in Figure 1B, location services module 115, transmission module 116, timer module 117, and security module 124 are all implemented as hardware (e.g., as a circuit and/or additional firmware within the mobile device's processor 110, or using a separate support circuit). In addition to the fact that these are implemented in hardware, the functions performed by these modules 115-117, 124 are the same as described above with respect to Figure 1A. Several additional or alternative implementations are contemplated. In one embodiment, when mobile device 120 powers up to send location information, the device will not revert to a fully powered state. For example, the device display may remain off. Furthermore, only those hardware and/or software components required to implement the features described here can be activated (to save battery power). For example, in the software implementation shown in Figure 1A, only those operating system components 104 required to run location services module 105, stream 106, and timer 107 can run. In the hardware implementation shown in Figure 1B, only the firmware and circuitry required to determine the current location of the device and transmit this location information over a communication channel can be activated (eg, such as cellular or WiFi radio). In one embodiment, a special graphic may be displayed on the mobile device's display to indicate that periodic location transmissions are taking place. Alternatively, the display can remain off while the device is broadcasting its location. In addition, an option can be provided that allows the user to enter the shutdown code and disable security features. In one embodiment, when the code is entered the screen may turn on to show that the location security service has been properly disabled. The shutdown code can be the same as or different from the normal unlock code for the 120 mobile device. The code can be numeric or alphanumeric, a mechanical code (a specific sequence of button presses), a touch screen code (draw a pattern on the touch screen or with or without visual cues). A voice activated code, or a camera code that involves taking a picture of a QR code/2D barcode or 1D barcode. In one embodiment, the above-described safety features can be disabled by taking a picture of an object while the mobile device is in a specific orientation relative to the built-in compass. In addition, two-part or multi-part authentication can be implemented. During the first stage of authentication the screen may remain off, remain on but not offer any suggestions, or a graphic may be displayed to enter the code. After the first authentication is complete, the unit can request the second authentication (e.g., turning on the display and displaying a graphic, vibrating, turning on the camera if a QR code is required, or having a voice prompt you over a loudspeaker). speaker). In one embodiment, the techniques described herein may be used in combination with hardware and/or software which performs 'remote wipes' on mobile devices. For example, in one embodiment, the mobile device 120 yogas on an authorization server when it wakes up. The authorization server can then either instruct the remote device to erase all sensitive user data (if previously instructed to do so by the end user) or disable the security software described here. Mobile device 120 may also check for user authorization when the user automatically powers up and sends their location. The user can then remotely disable the security software or change how often the unit sends its location information. Although some of the embodiments described above provide a visual indication that a code is required, in one embodiment, no visual indication is provided to avoid alerting the parties that the unit will be tracked after being turned off. When an incorrect code is entered, the wireless device may remain in a substate with the display turned off (instead of turning off completely) but with the wireless device still sending the location information and the ability to enter the correct code. The wireless device can stay in this substate either continuously or it can be set to turn on and enter this substate at specific time periods (such as the first 5-10 minutes of every hour). The software/hardware described here can lock the device for a specific amount of time after a specific number of failed unlock attempts, and can also be configured to erase the user's confidential data (or all data) after a specific number of attempts. Unlock Failed. In one embodiment, information may be collected to supplement location data. For example, the device's camera(s) can be configured to automatically take a photograph and transmit the photograph over one or more of the communication channels. In one embodiment, the mobile device is configured to send its final location and IP address of the computer it is connected to just before a master reset (ie when the security software is still activated). One embodiment of a method for transmitting the location of a wireless device after power off is illustrated in Figure 2. At 201, a timer and communication channels over which to transmit are programmed based on user input. For example, the user can specify that the device should wake up and transmit a location message via email and to a server every 15 minutes after it has been turned off. At 202, after the device is turned off, the timer generates a wake-up signal to wake up the transmission stream and the radio transceiver. At 203, the transmission stream determines its current location (e.g., from location services module 115), and at 204, the transmission stream transmits its current location over specified communication channels. One embodiment of the invention uses radio frequency identification (RFID) and/or near-field technology (NFC) as a "scrub" to locate devices at higher resolutions. For example, in one embodiment, other devices (not shown) may use RFID and/or NFC to communicate with and identify mobile device 120 and then transmit the identity of mobile device 120 over one or more of the communication channels 155. The device mobile 120 of this embodiment does not need to fully energize all components illustrated in Figure 1B, thereby allowing the device to be located when its battery is depleted. In addition to location data, an embodiment of the invention transmits hardware-specific serial numbers encoded with the user information (eg, so that the server can identify the user with which to communicate location information). Furthermore, the above concepts can also be used to activate certain parts of the system to make it easier to locate the mobile device 120. For example, using RFID/NFC, a hardware signal can be activated to allow the audio portion of the system help locate the device (for example, by generating an audio signal from the mobile device 120 or from other devices that communicate using RFID/NFC. DIFFERENT MODALITIES OF API Different embodiments described herein include an application programming interface (API) implemented by a software component (hereinafter "API implementation software component") that allows a different software component (hereinafter, API calling software") access and use one or more of the functions, methods, procedures, data structures, and/or other services provided by the API implementing software component. For example, an API allows a developer of an API-calling software component (which may be a third-party developer) to leverage the specified features provided by an API-implementing software component. There may be an API calling software component or there may be more than such a software component. An API can be a source code interface that a computer system or program library provides in order to support requests for services from a software application. An API can be specified in terms of a programming language that can be interpreted or compiled when an application is built, rather than an explicit low-level description of how data is arranged in memory. The API defines the language and parameters that the API calling software components use when accessing and using specified characteristics of the API implementing software component. For example, an API calling software component accesses the specified characteristics of the API implementing software component through one or more API calls (sometimes referred to as function or method calls) exposed by the API. The API implementing software component can return a value through the API in response to an API call from an API calling software component. While the API defines the syntax and result of an API call (for example, how to invoke the API call and what the API call does), the API typically does not reveal how the API call performs the function specified by the call. of API. Various function calls or messages are transferred through one or more application programming interfaces between the calling software (API calling software component) and an API implementing software component. The transfer of the function calls or messages may include issuing, initiating, invoking, invoking, receiving, returning, or responding to the function calls or messages. With this, an API calling software component can transfer a call and an API implementing software component can transfer a call. As an example, the API 2010 implementation software component and the API calling software component can be an operating system, a library, a device driver, an API, a application program, or other software module (it should be understood that the API implementing software component and the API calling software component may be the same or a different type of software module from each other). The API calling software component can be either a local software component (that is, on the same data processing system as the API implementation software component) or a remote software component (that is, on a different data processing than the API implementation software component) that communicates with the API implementation software component via the API over a network. It should be understood that an API implementing software component may also act as an API calling software component (that is, it can make API calls to an API exposed by a different API implementing software component) and an API calling software component can also act as an API implementing software component by implementing an API that is exposed to a different API calling software component. The API may allow multiple API calling software components written in different programming languages to communicate with the API implementing software component (thus the API may include features to translate the calls and returns between the API implementing software component). API and the API calling software component); however, the API can be implemented in terms of a specific programming language. Figure 3 illustrates an embodiment of an API architecture which includes an API implementation software component 310 (e.g., an operating system, a library, a device driver, an API, an application program, or other software module) that implements API 320. API 320 specifies one or more functions, methods, classes, objects, protocols, data structures, formats, and/or other characteristics of the API implementing software component that can be used by the API. API calling software component 330. API 320 may specify at least one calling convention that specifies how a function in the API implementing software component receives parameters from the API calling software component and how the function returns a result for the API calling software component. The API 330 calling software component (for example, an operating system, library, device driver, API, application program, or other software module) makes API calls through API 320 to access and use the characteristics of API implementation software component 310 that are specified by API 330. API implementation software component 310 may return a value through API 320 to API calling software component 330 in response to an API call. It will be appreciated that the API implementing software component 310 may include additional functions, methods, classes, data structures, and other features that are not specified through the API 320 and not available to the API calling software component 330 It is to be understood that the API calling software component 330 may be on the same system as the API implementing software component 310 or may be located remotely and accessing the API implementing software component 310 using the API 320 over a network. Although Figure 3 illustrates a single API 330 calling software component interacting with API 320, it should be understood that other API calling software components, which may be written in different languages (or the same language) than the API 330 calling software component, may use API 320. The API implementing software component 310, the API 320, and the API calling software component 330 may be stored on a machine-readable medium, which includes any mechanism for storing information in a machine-readable form ( for example, a computer or other data processing system). For example, machine-readable media include magnetic disks, optical disks, random access memory; read-only memory, flash memory devices, etc. In Figure 4 ("Software Stack"), an exemplary modality, applications can make calls to Services 1 or 2, using various Service APIs, and to an Operating System (OS) using various OS APIs. Services 1 and 2 can make calls to the OS using various OS APIs. Note that Services 2 has two APIs, one of which (API 1 from Service 2) receives calls from and returns values to Application 1 and the other (API 2 from Service 2) receives calls from and returns values to Application 2. Service 1 (which can be, for example, a library if software) makes calls to and receives values returned from the API of OS 1, and Service 2 (which can be, for example, a library if software) makes calls to and receives return values from both the OS 1 API and OS 2 API. The Application makes calls to and receives return values from the OS 2 API. EXEMPLARY DATA PROCESSING DEVICES Figure 5 is a block diagram illustrating an exemplary computer system which may be used in some embodiments of the invention. It should be understood that although Figure 5 illustrates various components of a computer system, it is not intended to represent any specific architecture or way of interconnecting the components as such details are not relevant to the present invention. It will be appreciated that other computer systems that have fewer components or more components may also be used with the present invention. As illustrated in Figure 5, the computer system 500, which is a form of a data processing system, includes the bus(s) 550 to which it is coupled. ) with the processing system 520, the power supply 525, the memory 530, and the non-volatile memory 540 (e.g., a hard disk, a flash memory, a Phase Shift Memory (PCM), etc.). The bus(s) 550 may be connected to each other through various bridges, controllers, and/or adapters as is well known in the art. Processing system 550 may retrieve instruction(s) from memory 530 and/or non-volatile memory 540, and execute instructions to perform operations as described above. The 550 bus interconnects the above components together and also interconnects these components to the optional dock 560, the display controller & display device 570, Input/Output devices 580 (e.g. NIC (Network Interface Card), an cursor (e.g. mouse, touch screen, touch table, etc.), a keyboard, etc.), and the optional 590 wireless transceiver(s) (e.g., Bluetooth, WiFi, infrared, etc.). FIG. 6 is a block diagram illustrating an exemplary data processing system which may be used in some embodiments of the invention. For example, the data processing system 600 can be a handheld computer, a personal digital assistant (PDA), a mobile phone, a handheld game system, a portable media player, a tablet, or a handheld computing device. which may include a mobile phone, a media player, and/or a gaming system. As another example, the data processing system 600 may be a network computer or a processing device embedded in another device. In accordance with one embodiment of the invention, the exemplary architecture of data processing system 600 can be used for the above-described mobile devices. Data processing system 600 includes processing system 620, which may include one or more microprocessors and/or a system on an integrated circuit. The processing system 620 is coupled with a memory 610, a power supply 625 (which includes one or more batteries), an audio input/output 640, a display controller and display device 660, an input/output optional 650, input device(s) 670, and wireless transceiver(s) 630. It will be appreciated that additional components not shown in Figure 6 may also form part of the data processing system 600 in certain embodiments. of the invention, and in certain embodiments of the invention fewer components than shown in Figure 6 may be used. Furthermore, it will be appreciated that one or more buses, not shown in Figure 6, may be used to interconnect the various components as is well known in the art. Memory 610 may store data and/or programs for execution by data processing system 600. Audio input/output 640 may include a microphone and/or speaker for, for example, playing music and/or provide telephony functionality through the loudspeaker and microphone. The 660 display controller and display device may include a graphical user interface (GUI). Wireless (e.g. RF) 630 transceivers (e.g. a WiFi transceiver, an infrared transceiver, a Bluetooth transceiver, a wireless cellular phone transceiver, etc.) can be used to communicate with other processing systems. of data. The one or more input devices 670 allow a user to provide input to the system. These input devices can be a numeric keypad, keyboard, touch panel, multi-touch panel, etc. The other optional 650 input/output can be a connector for a dock. Embodiments of the invention may include various steps as set out above. Steps can be incorporated into machine-executable instructions which cause a general-purpose or special-purpose processor to perform certain steps. Alternatively, these steps can be performed by specific hardware components that contain hard-wired logic to perform the steps, or by any combination of programmed computer components and custom hardware components. Elements of the present invention may also be provided as a machine-readable medium for storing machine-executable program code. Machine-readable media may include, but are not limited to, floppy disks, optical disks, CD-ROMs, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, magnetic or optical cards, or other media/media machine readable suitable for storing an electronic program code. Throughout the above description for purposes of explanation, numerous specific details have been presented in order to provide a complete understanding of the invention. It will be apparent, however, to one skilled in the art that the invention can be practiced without some of these specific details. For example, it will be readily apparent to those skilled in the art that the functional modules and methods described herein can be implemented as software, hardware, or any combination thereof. Furthermore, although embodiments of the invention are described herein within the context of a mobile computing environment (i.e., using mobile devices 120-123; 601-603), the underlying principles of the invention are not limited to a computing implementation. mobile. Virtually any type of client or peer data processing device can be used in some embodiments including, for example, desktop or workstation computers. Accordingly, the scope and spirit of the invention must be judged in terms of the claims which follow.
权利要求:
Claims (18) [0001] 1. Computer-implemented method for automatically transmitting a location of a wireless data processing device, characterized in that it comprises: determining that a security code to unlock the wireless data processing device has been entered incorrectly a specified number of times and based on the determination to turn off the wireless data processing device; temporarily turn on the wireless data processing device or part thereof, in a safe mode, in response to reaching a predetermined time, where safe mode includes activating security features, security features including limitation user access to the wireless data processing device; in safe mode, determine a current location of the wireless data processing device using one or more specified location determination techniques; in safe mode, transmit the current location of the wireless data processing device through one or more specified communication channels; and turning off the wireless data processing device after the current location has been transmitted. [0002] 2. Method according to claim 1, characterized in that the wireless data processing device is turned on in a limited capacity only to transmit a current location of the wireless data processing device. [0003] 3. Method according to claim 2, characterized in that the limited capacity comprises connecting a wireless radio and one or more software modules to determine and transmit the current location of the wireless data processing device. [0004] 4. Method according to claim 1, characterized in that determining a current location comprises receiving and processing a global positioning system (GPS) signal with GPS logic. [0005] 5. Method according to claim 1, characterized in that one of the specific communication channels comprises a server address to which the wireless data processing device transmits its current location. [0006] 6. Method according to claim 1, characterized in that one of the specific communication channels comprises an email address to which the wireless data processing device transmits its current location in an email message. [0007] 7. Method according to claim 1, characterized in that one of the specific communication channels comprises a short message service (SMS) communication channel to which the wireless data processing device transmits its current location . [0008] 8. Method according to claim 1, characterized in that one of the specific communication channels comprises an instant message in which the wireless data processing device transmits its current location. [0009] A method as claimed in claim 1, further comprising: when initially turning off the wireless data processing device, providing a user with an option to enter a security code; and perform the remaining operations of the method only if the security code is not entered. [0010] 10. Wireless data processing device, comprising: a power supply, including circuitry, coupled to a wireless data processing device processing system, to maintain the wireless data processing device in a powered or unpowered state, the processing system causing the wireless data processing device to enter an unpowered state in response to user input, wherein user input comprises entering a security code to unlock the wireless data processing device, where the security code is incorrectly entered a specified number of times; a timer to periodically turn on the wireless data processing device, or part thereof, in a safe mode, in response to reaching a predetermined time, where safe mode includes activating security features, security features, security including limiting user access to the wireless data processing device; a location services module, coupled to the processing system, to determine a current location of the wireless data processing device, in secure mode, using one or more specified location determination techniques; a transmitter for transmitting the current location of the wireless data processing device, in secure mode, over one or more specified communication channels; and the processing system turning off the wireless data processing device after the current location has been transmitted. [0011] 11. Wireless data processing device according to claim 10, characterized in that the wireless data processing device is turned on in a limited capacity only to transmit the current location of the wireless data processing device. [0012] 12. Wireless data processing device according to claim 11, characterized in that the limited capability comprises connecting a wireless radio and one or more software modules to determine and transmit the current location of the data processing device wireless. [0013] 13. Wireless data processing device according to claim 10, characterized in that determining a current location comprises receiving and processing a global positioning system (GPS) signal with GPS logic. [0014] 14. Wireless data processing device according to claim 10, characterized in that one of the specific communication channels comprises a server address to which the wireless data processing device transmits its current location. [0015] 15. Wireless data processing device according to claim 10, characterized in that one of the specific communication channels comprises an email address to which the wireless data processing device transmits its current location on a email message. [0016] 16. Wireless data processing device according to claim 10, characterized in that one of the specific communication channels comprises a short message service (SMS) communication channel for which the wireless data processing device wire transmits its current location. [0017] 17. Wireless data processing device according to claim 10, characterized in that one of the specific communication channels comprises an instant message in which the wireless data processing device transmits its current location. [0018] A wireless data processing device according to claim 10, further comprising: a security logic which, when initially turning off the wireless data processing device, provides a user with an option to enter a code of security; and wherein the transmission stream transmits the location of the wireless data processing device only if the security code is not entered.
类似技术:
公开号 | 公开日 | 专利标题 BR102013009846B1|2022-01-25|Apparatus and method for determining the location of a wireless device after shutdown AU2016224183B2|2018-07-19|Method and apparatus for providing card service using electronic device BR112014017739B1|2020-12-15|METHOD, APPLIANCE AND UNLOCK PROCESS DEVICE FOR A TERMINAL KR102294118B1|2021-08-26|Apparatus and method and for connecting security KR20180101063A|2018-09-12|Electronic apparatus for processing user input and method for processing user input JP2013225861A5|2016-03-10| US9830170B2|2017-11-28|Synchronization between electronic devices KR20160101829A|2016-08-26|Authentication processing method and electronic device supporting the same KR20170081500A|2017-07-12|Electronic Device and Operating Method Thereof CN104285210B|2018-05-25|The methods, devices and systems of recovery operation system on the portable communication device EP3293655B1|2022-03-09|Below the lock user interface with mixed authentication settings CN105933891B|2021-03-16|Method and apparatus for providing card service using electronic device AU2015203796B2|2016-09-29|Apparatus and method for determining a wireless device's location after shutdown CN103198257A|2013-07-10|Security reuse in hybrid information handling device environments KR20170041473A|2017-04-17|Method and electronic device for controlling power supply CN103379440B|2016-11-30|For determining the apparatus and method of wireless device position after shut down KR20170104891A|2017-09-18|Electric device and method for operating the same
同族专利:
公开号 | 公开日 EP2658322B1|2019-05-22| AU2013205174B2|2015-04-09| US10285000B2|2019-05-07| US10524084B2|2019-12-31| JP2016067058A|2016-04-28| US9832603B2|2017-11-28| US20190268714A1|2019-08-29| US20130281113A1|2013-10-24| AU2013205174A1|2013-11-07| WO2013163005A1|2013-10-31| US9338596B2|2016-05-10| JP2018174554A|2018-11-08| US20150341790A1|2015-11-26| BR102013009846A2|2015-06-16| KR101519710B1|2015-05-12| CN106658403A|2017-05-10| MX2013004536A|2013-11-05| US9049553B2|2015-06-02| JP2020074530A|2020-05-14| US8849303B2|2014-09-30| EP2658322A2|2013-10-30| CN106658403B|2020-07-03| EP2658322A3|2016-04-13| JP2013225861A|2013-10-31| US20160323703A1|2016-11-03| US20180206064A1|2018-07-19| CN103379440A|2013-10-30| US20150031329A1|2015-01-29| KR20130119377A|2013-10-31|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US6298229B1|1998-12-04|2001-10-02|General Electric Company|GPS receiver for emergency location reporting during intermittent shadowing| US7366522B2|2000-02-28|2008-04-29|Thomas C Douglass|Method and system for location tracking| US6662023B1|2000-07-06|2003-12-09|Nokia Mobile Phones Ltd.|Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused| US6614393B2|2001-01-31|2003-09-02|Hewlett-Packard Development Company, L.P.|Location data dissemination and reception for entities having short-range receivers| US7359713B1|2003-02-28|2008-04-15|Trimble Navigation Limited|Battery consumption optimization for mobile users| JP2004356992A|2003-05-29|2004-12-16|Kyocera Corp|Mobile communication terminal| KR20040107661A|2003-06-09|2004-12-23|주식회사 퓨쳐위즈|Mobile handset and method in which the clock and alarm function work while the handset is turned off| US7590837B2|2003-08-23|2009-09-15|Softex Incorporated|Electronic device security and tracking system and method| GB2412545A|2004-03-23|2005-09-28|Rory Joseph Donnelly|Mobile phone| KR20070009695A|2004-05-11|2007-01-18|토요 보세키 가부시기가이샤|Polyamide resin laminated film| US8195248B2|2004-06-29|2012-06-05|Sk Telecom Co., Ltd.|Disguised power-off method for a mobile communication terminal| US20060089120A1|2004-10-26|2006-04-27|Kunyuan Luo|Desktop cellular phone with security features| US7395097B2|2004-12-03|2008-07-01|Motorola, Inc.|Communications device with low energy notification| US7353034B2|2005-04-04|2008-04-01|X One, Inc.|Location sharing and tracking using mobile phones or other wireless devices| JP4392756B2|2005-04-25|2010-01-06|ソニー・エリクソン・モバイルコミュニケーションズ株式会社|Mobile communication terminal, control method and control program for mobile communication terminal, and communication system| JP2006309532A|2005-04-28|2006-11-09|Hitachi Ltd|Information processor| JP4681973B2|2005-07-29|2011-05-11|京セラ株式会社|Portable terminal| JP4054820B2|2005-08-09|2008-03-05|株式会社エヌ・ティ・ティ・ドコモ|Mobile device| JP4213151B2|2005-09-07|2009-01-21|俊彦 水上|Portable communication terminal with GPS function| KR100746548B1|2006-01-09|2007-08-06|주식회사 팬택|Method and Mobile Communication Terminal for Sending Current Position Information by Using Built in Battery| JP4785622B2|2006-05-31|2011-10-05|三洋電機株式会社|Communication device| JP4794361B2|2006-06-05|2011-10-19|三洋電機株式会社|Communication device| US7577449B2|2006-06-29|2009-08-18|Motorola, Inc.|Method and system for coordinating a sleep mode wake-up time| JP4780465B2|2006-11-09|2011-09-28|トヨタ自動車株式会社|Oxygen sensor failure diagnosis device| CN101005663A|2006-11-15|2007-07-25|深圳凯虹移动通信有限公司|Mobile terminal with lost tracking function and lost tracking method of mobile terminal| US8013734B2|2007-05-14|2011-09-06|Autocart Llc|Personal safety mobile notification system| US8112807B2|2007-11-07|2012-02-07|Qualcomm Incorporated|Systems, methods, and apparatuses for erasing memory on wireless devices| TWI424328B|2008-06-12|2014-01-21| JP5213605B2|2008-09-17|2013-06-19|シャープ株式会社|COMMUNICATION DEVICE, INFORMATION PRESENTATION DEVICE, COMMUNICATION METHOD, PROGRAM, AND RECORDING MEDIUM| US20100124896A1|2008-11-20|2010-05-20|Kumar Dinesh J|Dual battery mobile phone| US20100173615A1|2009-01-03|2010-07-08|Harris Technology, Llc|Locating Lost Cell Phones| CN101776741A|2009-01-13|2010-07-14|徐克林|Locating, tracking and far module control method| US8270938B2|2009-02-03|2012-09-18|Integrity Tracking, Llc|Managing battery power for mobile emergency communication device| US20100248741A1|2009-03-30|2010-09-30|Nokia Corporation|Method and apparatus for illustrative representation of a text communication| US20100273452A1|2009-04-26|2010-10-28|Qualcomm Incorporated|Apparatus and Methods For Locating Tracking and/or Recovering a Wireless Communication Device| EP2247145A1|2009-04-28|2010-11-03|Motorola, Inc.|Paging in a cellular communication system| US8825548B2|2009-06-30|2014-09-02|Ebay Inc.|Secure authentication between multiple parties| US20110055891A1|2009-08-26|2011-03-03|Rice Christopher T|Device security| TW201113741A|2009-10-01|2011-04-16|Htc Corp|Lock-state switching method, electronic apparatus and computer program product| US8533089B1|2009-12-02|2013-09-10|Axioma, Inc.|Methodology and process for constructing factor indexes| KR101302565B1|2009-12-15|2013-09-02|한국전자통신연구원|System and method for estimating position of lost mobile terminal and mobile terminal| GB201000021D0|2010-01-04|2010-02-17|Plastic Logic Ltd|Electronic document reading devices| KR20110099990A|2010-03-03|2011-09-09|삼성전자주식회사|Method and apparatus for transmitting location information of mobile terminal using sub power source| US8849303B2|2012-04-23|2014-09-30|Apple Inc.|Apparatus and method for determining a wireless device's location after shutdown|US8381297B2|2005-12-13|2013-02-19|Yoggie Security Systems Ltd.|System and method for providing network security to mobile devices| US20080276302A1|2005-12-13|2008-11-06|Yoggie Security Systems Ltd.|System and Method for Providing Data and Device Security Between External and Host Devices| US8869270B2|2008-03-26|2014-10-21|Cupp Computing As|System and method for implementing content and network security inside a chip| US8631488B2|2008-08-04|2014-01-14|Cupp Computing As|Systems and methods for providing security services during power management mode| WO2010059864A1|2008-11-19|2010-05-27|Yoggie Security Systems Ltd.|Systems and methods for providing real time access monitoring of a removable media device| JP5504247B2|2011-12-07|2014-05-28|株式会社ソニー・コンピュータエンタテインメント|Electronic device and timer time setting method| US8849303B2|2012-04-23|2014-09-30|Apple Inc.|Apparatus and method for determining a wireless device's location after shutdown| EP2907043B1|2012-10-09|2018-09-12|Cupp Computing As|Transaction security systems and methods| US11157976B2|2013-07-08|2021-10-26|Cupp Computing As|Systems and methods for providing digital content marketplace security| US9275049B2|2013-11-06|2016-03-01|Incipio Technologies, Inc.|Protective case for portable electronic device| WO2015123611A2|2014-02-13|2015-08-20|Cupp Computing As|Systems and methods for providing network security using a secure digital device| ES2744859T3|2014-02-21|2020-02-26|Mitsubishi Australia Ltd|Data communication device and method| WO2016072833A1|2014-11-05|2016-05-12|Mimos Berhad|System and method to disable factory reset| WO2016114793A1|2015-01-16|2016-07-21|Citrix Systems, Inc.|Automatic intelligent local device fraud detection| CN105933869B|2016-06-30|2019-10-25|北京小米移动软件有限公司|Method of locating terminal, device and terminal server| US9924323B2|2016-08-19|2018-03-20|Futurewei Technologies, Inc.|Apparatus and method for facilitating return of a mobile device| US9918264B1|2016-09-09|2018-03-13|Qualcomm Incorporated|Reporting of information before a scheduled time| CN106304410A|2016-09-14|2017-01-04|广东欧珀移动通信有限公司|A kind of data migration method and mobile terminal| DE112017007382T5|2017-03-31|2020-01-02|Intel IP Corporation|WIRELESS DEVICE-HANDOVER| US10699014B2|2017-09-20|2020-06-30|LenovoPte Ltd|Preventing connecting to a locked device|
法律状态:
2015-06-16| B03A| Publication of a patent application or of a certificate of addition of invention [chapter 3.1 patent gazette]| 2018-12-04| B06F| Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]| 2020-06-09| B15K| Others concerning applications: alteration of classification|Free format text: A CLASSIFICACAO ANTERIOR ERA: H04W 24/00 Ipc: H04W 4/029 (2018.01), H04W 52/02 (2009.01) | 2020-06-16| B06U| Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]| 2021-11-23| B09A| Decision: intention to grant [chapter 9.1 patent gazette]| 2022-01-25| B16A| Patent or certificate of addition of invention granted [chapter 16.1 patent gazette]|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 22/04/2013, OBSERVADAS AS CONDICOES LEGAIS. |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 US13/454,014|2012-04-23| US13/454,014|US8849303B2|2012-04-23|2012-04-23|Apparatus and method for determining a wireless device's location after shutdown| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|