Apple working on ways to ID unauthorized device users
TweetFollow Us on Twitter

Apple working on ways to ID unauthorized device users



An Apple patent (number 8289130) for systems and methods for identifying unauthorized users of an electronic device show has appeared at the U.S. Patent & Trademark Office. In particular, this relates to systems and methods for detecting an unauthorized user, gathering information related to the electronic device, the unauthorized user, or both, and transmitting an alert notification to a responsible party for the electronic device.

Here's Apple's background and summary of the invention: "People often possess and carry around a variety of electronic devices, such as, for example, cellular phones, PDA's, personal e-mail or messaging devices (e.g., a Blackberry), and handheld media players (e.g., an iPod). Many of these electronic devices are used frequently by their owners, and the electronic devices may contain personal or sensitive information stored within them.

"For example, the electronic devices may contain information such as credit card numbers, passwords, social security numbers, bank information, contact lists, or calendar information. Accordingly, if the electronic device is lost or stolen, the loss of the electronic device can be exceedingly disruptive to the owner's peace of mind and security. Thus, the owner may desire to find out where the lost electronic device is located or who may have gained possession of or stolen the electronic device.

"Systems and methods for identifying unauthorized users of an electronic device are provided. In particular, systems and methods for detecting an unauthorized user, gathering information related to the electronic device, the unauthorized user, or both, and transmitting an alert notification to a responsible party for the electronic device are provided.

"In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identities of authorized users of the electronic device. For example, a photograph of the current user can be taken, a recording of the current user's voice can be recorded, the heartbeat of the current user can be recorded, or any combination of the above. The photograph, recording, or heartbeat can be compared, respectively, to a photograph, recording, or heartbeat of authorized users of the electronic device to determine whether they match. If they do not match, the current user can be detected as an unauthorized user.

"In some embodiments, an unauthorized user can be detected by noting particular activities that can indicate suspicious behavior. For example, activities such as entering an incorrect password a predetermined number of times in a row, hacking of the electronic device, jailbreaking of the electronic device, unlocking of the electronic device, removing a SIM card from the electronic device, or moving a predetermined distance away from a synced device can be used to detect an unauthorized user.

"In some embodiments, when an unauthorized user is detected, information related to the current user of the electronic device (e.g., the unauthorized user), the current user's operation of the electronic device, the electronic device's location, or any combination of the above can be gathered. For example, information such as the current's user's photograph, a voice recording of the current user, screenshots of the electronic device, keylogs of electronic device, communication packets (e.g., Internet packets) served to the electronic device, location coordinates of the electronic device, or geotagged photos of the surrounding area can be gathered.

Instead or in addition, when an unauthorized user is detected, various functions of the electronic device can be restricted. For example, access to particular applications can be restricted, access to sensitive information can be restricted, sensitive information can be erased from the electronic device, or any combination of the above.

"In some embodiments, an alert notification can be sent to a responsible party when an unauthorized user is detected. The "responsible party" can be any persons suitable to receive the alert notification, such as, for example, the owner of the electronic device, proper authorities or police, persons listed in a contact book in the electronic device, or any combination of the above. In some embodiments, the alert notification can be a general warning that an unauthorized user has been detected (e.g., 'Warning, your electronic device may have been stolen'). In some embodiments, the alert notification can contain any of the information gathered in response to an unauthorized user being detected (e.g., photographs, voice recordings, screenshots, geotagged photographs, or any other gathered information).

"The alert notification can be transmitted to the responsible party through any suitable medium. For example, the alert notification can be sent as a voicemail, phone call, text message, e-mail, or facsimile. As another example, the alert notification can be sent through any suitable VoIP application (e.g., Skype or Windows Live Messenger), instant messaging application (e.g., AOL Instant Messenger or MSN Messenger), on-line profile application (e.g., Facebook or Friendster), blog application (e.g., Twitter or Xanga), or 'cloud' server."

The inventors are Taido L. Nakajima, Pareet Rahul and Gloria Lin.

Apple has also filed a patent (number 8289114) for a tablet device with peek mode operation involving the iPad. The inventors are Andrew Lauder, Matthew D. Rohrbach, Daniel J. Coster, Christopher J. Stringer, Florence W. Ow, Jiane Ai, Jonathan P. Ive, Elvi M. Kibiti, John Ternus and Sean D. Lubner.

 
AAPL
$123.25
Apple Inc.
-0.99
GOOG
$548.34
Google Inc.
-6.83
MSFT
$40.97
Microsoft Corporation
-0.24
MacNews Search:
Community Search:
view counter

view counter
view counter
view counter
view counter
view counter
view counter

These are All the Apple Watch Apps and G...
The Apple Watch is less than a month from hitting store shelves, and once you get your hands on it you're probably going to want some apps and games to install. Fear not! We've compiled a list of all the Apple Watch apps and games we've been able to find so far. Games Rules! By TheCodingMonkeys App Store Description: RULES! is a cute puzzle game... | Read more »
Appy to Have Known You - Lee Hamlet Look...
Being at 148Apps these past 2 years has been an awesome experience that has taught me a great deal, and working with such a great team has been a privilege. Thank you to Rob Rich, and to both Rob LeFebvre and Jeff Scott before him, for helping me to grow as a writer and for giving me the opportunity to write about what I love: playing innovative... | Read more »
Hands-On With Allstar Heroes - A Promisi...
Let’s get this out of the way quickly. Allstar Heroes looks a lot like a certain other recent action RPG release, but it turns out that while it’s not yet available here, Allstar Heroes has been around for much longer than that other title. Now that copyright row is out of the way, I can say that Allstar Heroes seems pretty fun. It’s not out here... | Read more »
Macho Man and Steve Austin Join the Rank...
WWE Immortals, by Warner Bros. Interactive Entertainment and WWE, has gotten a superstar update. You'll now have access to Macho Man Randy Savage and Steve Austin. Both characters have two different versions: Macho Man Randy Savage Renegade or Macho King, and Stone Cold Steve Austin Icebound Watcher or Texas Rattlesnake. | Read more »
Fearless Fantasy is Fantastic for the iF...
I actually had my first look at Fearless Fantasy last year at E3, but it was on a PC so there wasn't much for me to talk about. But now that I've been able to play with a pre-release version of the iOS build, there's quite a bit for me to talk about. | Read more »
MLB Manager 2015 (Games)
MLB Manager 2015 5.0.14 Device: iOS Universal Category: Games Price: $4.99, Version: 5.0.14 (iTunes) Description: Guide your favorite MLB franchise to glory! MLB Manager 2015, officially licensed by MLB.com and based on the award-winning Out of the Park Baseball series, is the most fun and realistic baseball game ever created for... | Read more »
Breath of Light (Games)
Breath of Light 1.0.1421 Device: iOS Universal Category: Games Price: $2.99, Version: 1.0.1421 (iTunes) Description: Hold a quiet moment.Breath of Light is a meditative and beautiful puzzle game with a hypnotic soundtrack by Winterpark.BEAUTIFULInspired by modern minimalism combined with a range of meditative art styles, from Zen... | Read more »
WWE WrestleMania Tags into the App Store
Are You ready to rumble? The official WWE WrestleMania app, by World Wrestling Entertainment, is now available. Now you can get all your WrestleMania info in one place before anyone else. The app offers details on superstar signings, interactive venue maps, event schedules, WrestleMania Superstore hours, stadium information, and more. You can also... | Read more »
Bio Inc's New Expansion is Infectin...
Bio Inc., by DryGin Studios, is the real time strategy game where you infect a human body with the worst virus your evil brain can design. Recently, the game was updated to add a whole lot of new features. Now you can play the new “Lethal” difficulty, which chakllenges even hardcore players. If you aren't quite there yet you can still enjoy the “... | Read more »
The Monocular Minion is Here! Despicable...
Despicable Me: Minion Rush, by Gameloft, is introducing a new runner to the mix in their latest update. Now you can play as Carl, the prankster minion. Carl has a few new abilities to play with, including running at a higher speed from the start. Gameloft has also added Eduardo's House as a new area. You'll be able to race through the infamous El... | Read more »
All contents are Copyright 1984-2010 by Xplain Corporation. All rights reserved. Theme designed by Icreon.