Apple working on ways to ID unauthorized device users
TweetFollow Us on Twitter

Apple working on ways to ID unauthorized device users



An Apple patent (number 8289130) for systems and methods for identifying unauthorized users of an electronic device show has appeared at the U.S. Patent & Trademark Office. In particular, this relates to systems and methods for detecting an unauthorized user, gathering information related to the electronic device, the unauthorized user, or both, and transmitting an alert notification to a responsible party for the electronic device.

Here's Apple's background and summary of the invention: "People often possess and carry around a variety of electronic devices, such as, for example, cellular phones, PDA's, personal e-mail or messaging devices (e.g., a Blackberry), and handheld media players (e.g., an iPod). Many of these electronic devices are used frequently by their owners, and the electronic devices may contain personal or sensitive information stored within them.

"For example, the electronic devices may contain information such as credit card numbers, passwords, social security numbers, bank information, contact lists, or calendar information. Accordingly, if the electronic device is lost or stolen, the loss of the electronic device can be exceedingly disruptive to the owner's peace of mind and security. Thus, the owner may desire to find out where the lost electronic device is located or who may have gained possession of or stolen the electronic device.

"Systems and methods for identifying unauthorized users of an electronic device are provided. In particular, systems and methods for detecting an unauthorized user, gathering information related to the electronic device, the unauthorized user, or both, and transmitting an alert notification to a responsible party for the electronic device are provided.

"In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identities of authorized users of the electronic device. For example, a photograph of the current user can be taken, a recording of the current user's voice can be recorded, the heartbeat of the current user can be recorded, or any combination of the above. The photograph, recording, or heartbeat can be compared, respectively, to a photograph, recording, or heartbeat of authorized users of the electronic device to determine whether they match. If they do not match, the current user can be detected as an unauthorized user.

"In some embodiments, an unauthorized user can be detected by noting particular activities that can indicate suspicious behavior. For example, activities such as entering an incorrect password a predetermined number of times in a row, hacking of the electronic device, jailbreaking of the electronic device, unlocking of the electronic device, removing a SIM card from the electronic device, or moving a predetermined distance away from a synced device can be used to detect an unauthorized user.

"In some embodiments, when an unauthorized user is detected, information related to the current user of the electronic device (e.g., the unauthorized user), the current user's operation of the electronic device, the electronic device's location, or any combination of the above can be gathered. For example, information such as the current's user's photograph, a voice recording of the current user, screenshots of the electronic device, keylogs of electronic device, communication packets (e.g., Internet packets) served to the electronic device, location coordinates of the electronic device, or geotagged photos of the surrounding area can be gathered.

Instead or in addition, when an unauthorized user is detected, various functions of the electronic device can be restricted. For example, access to particular applications can be restricted, access to sensitive information can be restricted, sensitive information can be erased from the electronic device, or any combination of the above.

"In some embodiments, an alert notification can be sent to a responsible party when an unauthorized user is detected. The "responsible party" can be any persons suitable to receive the alert notification, such as, for example, the owner of the electronic device, proper authorities or police, persons listed in a contact book in the electronic device, or any combination of the above. In some embodiments, the alert notification can be a general warning that an unauthorized user has been detected (e.g., 'Warning, your electronic device may have been stolen'). In some embodiments, the alert notification can contain any of the information gathered in response to an unauthorized user being detected (e.g., photographs, voice recordings, screenshots, geotagged photographs, or any other gathered information).

"The alert notification can be transmitted to the responsible party through any suitable medium. For example, the alert notification can be sent as a voicemail, phone call, text message, e-mail, or facsimile. As another example, the alert notification can be sent through any suitable VoIP application (e.g., Skype or Windows Live Messenger), instant messaging application (e.g., AOL Instant Messenger or MSN Messenger), on-line profile application (e.g., Facebook or Friendster), blog application (e.g., Twitter or Xanga), or 'cloud' server."

The inventors are Taido L. Nakajima, Pareet Rahul and Gloria Lin.

Apple has also filed a patent (number 8289114) for a tablet device with peek mode operation involving the iPad. The inventors are Andrew Lauder, Matthew D. Rohrbach, Daniel J. Coster, Christopher J. Stringer, Florence W. Ow, Jiane Ai, Jonathan P. Ive, Elvi M. Kibiti, John Ternus and Sean D. Lubner.

 
AAPL
$127.60
Apple Inc.
+2.85
GOOG
$535.38
Google Inc.
+11.33
MSFT
$42.91
Microsoft Corporation
+1.29
MacNews Search:
Community Search:
view counter

view counter
view counter
view counter
view counter
view counter
view counter

Lifeline... (Games)
Lifeline... 1.1 Device: iOS Universal Category: Games Price: $2.99, Version: 1.1 (iTunes) Description: Lifeline is a playable, branching story of survival against all odds. Using your iPhone, iPad, or Apple Watch, you will help Taylor make life or death decisions, and face the consequences together. | Read more »
Pandemic: The Board Game Has Gone Univer...
Don't let the virus win! Now you can download Pandemic: The Board Game, by F2Z Digital Media, for all of your iOS devices. The app is based on the fantastic board game by Z-man games. As employees of the CDC, you and your friends will have to work together to control and eventually cure 4 major disease outbreaks. Can you beat them all in time? | Read more »
Get Ready to Read Bloomberg Business on...
Fans of Bloomberg Business will soon be able to get all their news on the Apple Watch. The app lets you get the top headlines on your main screen and bookmark stories to read later. Using the motion detection in the Apple Watch, the headlines are updated everytime you move your wrist to glance at it. You can also have a personal watchlist that... | Read more »
Watch This Homerun is Batting for the Ap...
Eyes Wide Games' Watch This Homerun is purportedly the first sports game coming to the Apple Watch, where you'll be up to bat as the pitcher tries to out-manuever you with fastballs, curveballs, and changeups. Using one-touch controls you can try to hit as many homeruns as possible. The game has a progression-based League system meant to make you... | Read more »
Field Trip Can Take You on a Guided Tour...
Field Trip, by Google’s Niantic Labs, is an exploration app that gives you details about the awesome places you can discover wherever you find yourself. The app can show you local history, delicious restraunts, the best places to shop, and places to just have fun. Field Trip curates information from over 200 publishers such as Thrillist, Zagat,... | Read more »
Watch Your Six - SPY_WATCH is Infiltrati...
SPY_WATCH, by Bossa Studios, is a new game designed for the Apple Watch. Runmor has it your spy agency has fallen out of favor. To save it, you'll need to train-up a spy and send them on missions to earn you a stunningly suspicious reputation and some cash to improve your spy's abilities. The app will send you real-time notifications from you... | Read more »
Both Halo: Spartan Assault and Halo: Spa...
Halo: Spartan Assault and Halo: Spartan Strike, by Microsoft, have officially landed on the App Store. Spartan Assault pits you against the Covenant with missions geared to tell the story of the origin of Spartan Ops. In Spartan Strike you'll delve into the events surrounding Halo 2 as you lead UNSC troops against the Promethean forces. | Read more »
The Apple Watch Could Revolutionize the...
It’s not here yet but there’s that developing sneaky feeling that the Apple Watch, despite its price tag and low battery life, might yet change quite a lot about how we conduct our lives. While I don’t think it’s going to be an overnight transformation, I can see it being a slow but steady process. One such area where the Apple Watch could make... | Read more »
Mad Skills Motocross 2 Version 2.0 is He...
Mad Skills Motocross 2 fans got some good news this week as Turborilla has given the game its biggest update yet. Now you'll have access to Versus mode where you can compete against your friends in timed challenges. Turborilla has implemented a leveling system and added a new, faster motorcycle called the #8. You can also try out 12 new tracks in... | Read more »
Kids Can Practice Healthy Living With Gr...
Bobaka is releasing a new interactive book called Green Riding Hood  in May. The app teaches kids about yoga and organic style of life through mini-games and a fun take on the classic Little Red Riding Hood fairy tale. | Read more »
All contents are Copyright 1984-2010 by Xplain Corporation. All rights reserved. Theme designed by Icreon.