Patent classifications
H04W12/126
Mobile communication terminal and control method therefor
A mobile communication terminal A performs near field communication with another mobile communication terminal B by a near field communication unit and obtains a communication distance with another mobile communication terminal B. An information acquisition unit acquires information on another mobile communication terminal B, information on the mobile communication terminal A, or both of the information when the communication distance to the other mobile communication terminal B is equal to or more than a threshold. An abnormality determination unit determines an abnormal state of the mobile communication terminal A based on information (position information, wearing information, or the like) acquired by the information acquisition unit. When the abnormality determination unit determines that the mobile communication terminal A is in the abnormal state, a lock unit locks the mobile communication terminal A, the other mobile communication terminal B or both of those mobile communication terminals.
Mobile communication terminal and control method therefor
A mobile communication terminal A performs near field communication with another mobile communication terminal B by a near field communication unit and obtains a communication distance with another mobile communication terminal B. An information acquisition unit acquires information on another mobile communication terminal B, information on the mobile communication terminal A, or both of the information when the communication distance to the other mobile communication terminal B is equal to or more than a threshold. An abnormality determination unit determines an abnormal state of the mobile communication terminal A based on information (position information, wearing information, or the like) acquired by the information acquisition unit. When the abnormality determination unit determines that the mobile communication terminal A is in the abnormal state, a lock unit locks the mobile communication terminal A, the other mobile communication terminal B or both of those mobile communication terminals.
User presence-enabled tracking device functionality
A tracking system can provide configuration instructions to an electronic device based on user presence. The tracking system can determine a user's location relative to a geographic boundary surrounding a geographic area associated with the user. Depending on the user's location, the tracking system may send instructions to configure an electronic device to send a notification or change the operating mode of the electronic device in response to the user's presence. The electronic device may be a scanning device that is configured to have a higher or lower scanning frequency, depending on the presence or absence of the user relative to the scanning device.
User presence-enabled tracking device functionality
A tracking system can provide configuration instructions to an electronic device based on user presence. The tracking system can determine a user's location relative to a geographic boundary surrounding a geographic area associated with the user. Depending on the user's location, the tracking system may send instructions to configure an electronic device to send a notification or change the operating mode of the electronic device in response to the user's presence. The electronic device may be a scanning device that is configured to have a higher or lower scanning frequency, depending on the presence or absence of the user relative to the scanning device.
SECURELY VERIFYING PROTECTED DEVICES
One or more computing devices, systems, and/or methods for securely verifying devices such as protected are provided. A code may be generated for a first device. A short message service (SMS) message comprising the code may be transmitted to the first device at a mobile directory number of the first device. An entry may be created to associate the code with the mobile directory number. A determination may be made as to whether a first code within a message associated with the mobile directory number matches the code within the entry. In response to a match, the message may be processed and a status of the first device may be marked as valid, otherwise, the message may be rejected.
Theft detector
An end-user computing device can include a theft detector that maintains a registered host device list containing identifiers of at least one registered host device. The theft detector can have root access to operations of the end-user device and the theft detector can provides a secure reboot request in response to detecting a possible theft condition. The end-user computing device can also include a boot loader that executes a secure reboot of the end-user device in response to a secure reboot request from the theft detector. The secure reboot of the end-user device resets the end-user device to prevent access to the end-user device.
Theft detector
An end-user computing device can include a theft detector that maintains a registered host device list containing identifiers of at least one registered host device. The theft detector can have root access to operations of the end-user device and the theft detector can provides a secure reboot request in response to detecting a possible theft condition. The end-user computing device can also include a boot loader that executes a secure reboot of the end-user device in response to a secure reboot request from the theft detector. The secure reboot of the end-user device resets the end-user device to prevent access to the end-user device.
Device locator disable authentication
A device locator mode or find my device (FMD) mode can allow a lost, stolen, or misplaced mobile device to be located. The FMD mode can be enabled or disabled on a mobile device. Sometimes thieves or unauthorized parties attempt to disable the FMD mode. To prevent this, the mobile device can transmit a unique device identifier to a remote server. The remote server can link the device identifier to a cloud-based user account associated with the user of the mobile device. Before an FMD mode is disabled on the mobile device, before the content or settings can be erased, and/or before a mobile device is permitted to be activated/reactivated, a user of the mobile device can be challenged for the credentials of the cloud-based user account. If valid credentials are provided, FMD can be disabled, the content or settings can be reset, and/or the device can be activated/reactivated.
Device locator disable authentication
A device locator mode or find my device (FMD) mode can allow a lost, stolen, or misplaced mobile device to be located. The FMD mode can be enabled or disabled on a mobile device. Sometimes thieves or unauthorized parties attempt to disable the FMD mode. To prevent this, the mobile device can transmit a unique device identifier to a remote server. The remote server can link the device identifier to a cloud-based user account associated with the user of the mobile device. Before an FMD mode is disabled on the mobile device, before the content or settings can be erased, and/or before a mobile device is permitted to be activated/reactivated, a user of the mobile device can be challenged for the credentials of the cloud-based user account. If valid credentials are provided, FMD can be disabled, the content or settings can be reset, and/or the device can be activated/reactivated.
SYSTEMS AND METHODS FOR REDUCING GRAIN THEFT IN HARVESTING OPERATIONS
Systems and methods for theft reduction of grain are disclosed. A grain cart includes a theft detection system that monitors grain onboarded into the grain cart from a harvesting machine, and grain offloaded from the grain cart to a trailer. The theft detection system measures a weight value of the grain received from the harvesting machine, and transmits the weight value to a tracking system. Additionally, the theft detection system can receive an expected grain weight value from the harvesting machine and compare the measured weight value with the received weight value, and provide a notification (e.g., alarm) of the difference is greater than a predetermined threshold. The theft detection system can provide similar functions between weight values of grain in the grain cart and a trailer. Also, the theft detection system can encrypt transmit the weight values prior to transmitting to the tracking system.