Secure Mobile Devices
20220240090 · 2022-07-28
Inventors
Cpc classification
G08B21/0286
PHYSICS
G06K19/0716
PHYSICS
G06K19/07762
PHYSICS
G09F3/005
PHYSICS
G06K19/07798
PHYSICS
International classification
Abstract
A mobile device includes a body configured to be worn by a user; a lock switchable between an open state and a closed state, where, when the lock is in the closed state, the mobile device is prevented from being removed from the user; and a wireless data system, where the wireless data system and the lock are jointly configured such that, when the lock is open, the wireless data system is at least partially disabled.
Claims
1. A mobile device comprising: a body configured to be worn by a user; a lock switchable between an open state and a closed state, wherein, when the lock is in the closed state, the mobile device is prevented from being removed from the user; and a wireless data system, wherein the wireless data system and the lock are jointly configured such that, when the lock is open, the wireless data system is at least partially disabled.
2. The mobile device of claim 1, wherein the wireless data system comprises a data chip and an antenna, wherein, when the lock is in the open state, the data chip and the antenna are electrically disconnected, and wherein, when the lock is in the closed state, the data chip and the antenna are electrically connected.
3. The mobile device of claim 1, wherein the lock comprises a movable conductor, wherein, when the lock is in the open state, the movable conductor is in a first position that causes the wireless data system to be at least partially disabled, and wherein, when the lock is in the closed state, the movable conductor is in a second position that causes the wireless data system to be enabled.
4. The mobile device of claim 1, wherein the wireless data system comprises an antenna, and wherein, when the lock is in the open state, a Faraday shield of the mobile device is in a first position such that the Faraday shield blocks the antenna and causes the wireless data system to be at least partially disabled, and wherein, when the lock is in the closed state, the Faraday shield is in a second position such that the wireless data system is enabled.
5. The mobile device of claim 4, wherein movement of the lock between the open state and the closed state causes movement of the Faraday shield between the first position and the second position.
6. The mobile device of claim 1, comprising a power reception system, wherein the power reception system and the lock are jointly configured such that, when the lock is in the closed state, the power reception system is disabled.
7. A mobile device comprising: a wireless data system; and a physical, user-accessible control that switches the wireless data system between an enabled state and a disabled state, wherein at least some functions of the wireless data system are disabled in the disabled state compared to the enabled state.
8. The mobile device of claim 7, wherein the control comprises a Faraday shield that blocks an antenna of the wireless data system when the control is in a position corresponding to the disabled state of the wireless data system.
9. The mobile device of claim 7, wherein the wireless data system comprises a data chip and an antenna, and wherein the control comprises a movable conductor that electrically connects the data chip to the antenna when the control is in a position corresponding to the enabled state of the wireless data system.
10. The mobile device of claim 7, comprising a lock switchable between an open state and a closed state, wherein, when the lock is in the closed state, the mobile device is prevented from being removed from a user, and wherein the control and the lock are jointly configured such that, when the lock is in the open state, the control is in a state corresponding to the disabled state of the wireless data system.
11. The mobile device of claim 7, wherein the mobile device comprises: a plurality of additional wireless data systems, each additional wireless data system providing a different corresponding functionality; and one or more additional physical, user-accessible controls that switch the plurality of additional wireless data systems between respective enabled states and disabled states.
12. A mobile device comprising: one or more wireless data systems; and an anti-breach system configured to at least partially disable a first wireless data system in response to an unauthorized event.
13. The mobile device of claim 12, wherein the first wireless data system or another wireless data system is configured to receive a wireless proximity signal, and wherein the unauthorized event comprises a failure to receive the wireless proximity signal by the first wireless data system or by another wireless data system.
14. The mobile device of claim 12, wherein the first wireless data system or another wireless data system is configured to receive a wireless alert signal, and wherein the unauthorized event comprises receiving the wireless alert signal by the first wireless data system or another wireless data system.
15. The mobile device of claim 12, wherein the anti-breach system comprises a conductive strip, and wherein the unauthorized event comprises a severing of the conductive strip.
16. The mobile device of claim 12, wherein the anti-breach system comprises a sensor configured to detect one or more of a strain, a force, or a physical violation applied to the mobile device, and wherein the unauthorized event comprises a strain greater than a predetermined magnitude of strain, a force greater than a predetermined magnitude of force, or a predetermined physical violation.
17. The mobile device of claim 12, comprising a biometric input system, wherein the unauthorized event comprises receiving, by the biometric input system, biometric data that does not match biometric data stored on the mobile device.
18. The mobile device of claim 12, wherein at least partially disabling the first wireless data system comprises causing an electrical charge to damage a portion of the mobile device.
19. The mobile device of claim 12, wherein at least partially disabling the first wireless data system comprises releasing a chemical that damages a portion of the mobile device.
20. The mobile device of claim 12, wherein at least partially disabling the first wireless data system comprises releasing a spring-loaded component that damages a portion of the mobile device.
21. The mobile device of claim 12, wherein at least partially disabling the first wireless data system comprises causing a Faraday shield to block an antenna of the mobile device.
22. The mobile device of claim 12, wherein, in response to the unauthorized event, the anti-breach system is configured to cause a second wireless data system to emit a wireless signal indicative of the unauthorized event.
23. The mobile device of claim 12, comprising an alert component, wherein, in response to the unauthorized event, the anti-breach system is configured to cause the alert component to generate an alert indicator.
24. A secure system comprising: a mobile device, the mobile device comprising, a body configured to be worn by a user, and a lock switchable between an open state and a closed state, wherein, when the lock is in the closed state, the mobile device is prevented from being removed from the user, and wherein the lock is configured to switch between the open state and the closed state in response to the mobile device receiving a wireless signal; and a base station configured to transmit the wireless signal.
25. The secure system of claim 24, wherein the mobile device comprises an anti-breach system configured to perform one or more operations in response to an unauthorized event.
26. The secure system of claim 25, wherein the mobile device comprises a wireless data system configured to receive a wireless proximity signal, wherein the unauthorized event comprises a failure to receive the wireless proximity signal, and wherein the base station is configured to emit the wireless proximity signal.
27. The secure system of claim 25, wherein the mobile device comprises a wireless data system configured to receive a wireless alert signal, wherein the unauthorized event comprises receiving the wireless alert signal, and wherein the base station is configured to emit the wireless alert signal.
28. The secure system of claim 24, wherein the base station comprises a charging component configured to charge the mobile device, wherein the mobile device comprises a wireless data system, and wherein the wireless data system is at least partially disabled while the mobile device is being charged by the base station.
29. The secure system of claim 28, wherein the mobile device comprises a power reception system configured to couple to the charging component, and wherein the power reception system and the lock are jointly configured such that, when the lock is in the closed state, the power reception system is disabled.
30. The secure system of claim 24, wherein the base station comprises a second mobile device.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
[0023]
[0024]
[0025]
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
DETAILED DESCRIPTION
[0035] Lightweight, custom-purpose mobile devices serve important functions in network-integrated spaces. These devices often include one or more auto identification and data capture (AIDC) systems, which allow for the mobile devices to be tracked by image recognition or signal reception systems. Besides location tracking, the mobile devices often can perform one or more on-demand functions, for example, requesting access to a secure facility, performing data upload and/or download, or authorizing payment operations.
[0036] In one example, mobile wearable devices may be issued to each person entering a secure area, such as a laboratory. Each wearable device includes a tracking radio-frequency identification (RFID) system, Bluetooth system, indoor GPS system, or other location tracking system that allows the location of each person to be tracked by the location tracking system as they move throughout the laboratory. Moreover, each wearable device includes a suite of on-demand function systems appropriate to the person wearing the wearable device. For example, a scientist's wearable device includes a first RFID circuit usable to operate equipment in the laboratory, a second RFID circuit usable to open doors within the laboratory, and a third RFID circuit that irreparably damages the first and/or second RFID circuit if the wearable device detects that it has left the laboratory; a security guard's wearable device includes only the second and third RFID circuits; and a visitor's RFID device includes only the tracking RFID system.
[0037] In another example, a user of an expensive smartwatch can lock the smartwatch to their wrist before leaving home. The smartwatch cannot be removed without receiving a signal from a base station at home, deterring potential thieves and preventing accidental loss. If the smartwatch is removed without authorization from the base station (e.g., by being cut or drilled off), components of the smartwatch are automatically destroyed, disincentivizing theft.
[0038] This disclosure describes a suite of devices and systems that may be used, individually or in combination, to maintain the security of mobile devices. The systems can include locks, wireless data systems, biometric input systems, and anti-breach systems, and user controls, any or all of which may interact with one another to provide security and functionality. For example, the different functionalities of each wearable device in the laboratory example are determined by wireless data systems included in the wearable device, and these wireless data systems can be enabled and disabled based on a state of a lock of the wearable device and/or by a user control that physically blocks wireless signals or allows the wireless signals to pass. In the smartwatch example, an anti-breach system of the smartwatch can detect a break in circuit continuity and trigger a spring-coupled mechanism to destroy a portion of a wireless data system. These and other possible interactions are described in detail throughout this disclosure.
[0039] As shown in
[0040] Although these systems are shown in
[0041] The body 102 of the mobile device 100 houses some or all of the systems of the mobile device 100. The body 102 may include one or a mixture of plastic, metal, rubber, wood, or another material, and may be hollow, solid, or both in different locations of the body 102. In some implementations, the body 102 is partially or entirely flexible, such that the body 102 can be reshaped to change size (e.g., to fit into a pocket) or to fit around different body parts (e.g., a large loop may be worn around the neck of a user, or the loop may be folded upon itself to fit more compactly around a wrist of the user).
[0042] The body 102 may have various shapes, depending on the implementation. In some implementations, the mobile device 100 is a wearable device configured to be worn by a user. As shown in
[0043] As shown in
[0044] As shown in
[0045] In some implementations, the mobile device is integrated into an opening and closure system of another item. For example, the mobile device may be integrated into an opening and closure mechanism of a luggage item (e.g., a zippering system) to control access to the contents of the luggage item.
[0046] The mobile device need not be particularly configured to be worn by a user. As shown in
[0047] The implementations shown in
[0048] As shown in
[0049] As described in further detail throughout this disclosure, the functions and/or systems that may be enabled or disabled based on lock state may include wireless data systems and the functions thereof, based on, for example, reconfiguring of circuit elements of the wireless data systems, blocking of wireless signals sent to/from the wireless data systems, or other mechanical alterations to the wireless data systems.
[0050]
[0051] In some implementations, when the screwed lock 300 is closed, a circuit connection of the mobile device is formed. For example, metal or otherwise conductive portions of the first side 302 and the second side 304 may come into contact when the screwed lock 300 is closed, thereby connecting two circuit elements of the mobile device (e.g., an antenna and a data chip, a battery and a data chip, other internal components of wireless data systems, etc.). The connection of the circuit elements may enable one or more functions and/or systems of the mobile device that are disabled in the absence of the connection, such as the circuit elements that are connected by closure of the lock. Alternatively or additionally, one or more functions/systems of the mobile device may become disabled when the connection is formed, being enabled only when the lock is in the open (circuit disconnected) state.
[0052] In some implementations, the lock state indicates to an electrical sensor (e.g., by a corresponding voltage or current created by a closed or opened electrical connection, by a corresponding sensed position of a component of the lock, or by a corresponding sensed strain or pressure caused by a position of a component of the lock) that the mobile device is in a closed state, and the sensor correspondingly outputs a signal indicative of the closed state to one or more other systems of the mobile device, the one or more other systems becoming correspondingly enabled or disabled based on their configuration.
[0053]
[0054] Open and closed configurations of the buckle-hole lock 310 may disconnect and/or connect circuit elements of the mobile device 312, thereby enabling and/or disabling systems and functions of the mobile device, or otherwise alter a state of the mobile device 312. For example, a conductive external surface of the buckle 316, when fit into a hole 318 with a corresponding exposed conductive element, may complete an electrical connection in to cause a wireless data system to be enabled or disabled.
[0055]
[0056] Open and closed configurations of the pin lock 320 may enable and/or disable systems and/or functions of the mobile device, or otherwise alter a state of the mobile device. For example, the pin 328, when in position in the lateral hole 330, may push out of the way another component, or exert pressure on another component, such that the systems and/or functions are enabled and/or disabled. For example, a movable conductor, a Faraday shield, or a sensed strain may be adjusted based on the position of the pin 328, the conductor position, Faraday shield position, or strain correspondingly (directly or indirectly) causing adjustment to another configuration of the mobile device.
[0057]
[0058] Open and closed configurations of the clasp lock 340 may disconnect and/or connect circuit elements of the mobile device 342, thereby enabling and/or disabling systems and/or functions of the mobile device 342, or otherwise alter a state of the mobile device 342. For example, a conductive portion 346 of the clasp 344, when pivoted into the closed position, may complete an electrical connection between two conductive elements 348a, 348b, disposed in the body of the mobile device 342, correspondingly enabling/disabling the systems and/or functions. As another example, the strain exerted upon a portion of the mobile device 342 by the clasp 344 in the closed configuration may be sensed (e.g., by a strain sensor) to cause the enabling/disabling of the systems and/or functions, or the strain may directly cause the enabling/disabling, e.g., by altering a mechanical or electrical property of the mobile device 342.
[0059]
[0060] Open and closed configurations of the spring lock 350 may disconnect and/or connect circuit elements of the mobile device 352, thereby enabling and/or disabling systems and/or functions of the mobile device 352, or otherwise alter a state of the mobile device 352. For example, movement of the pin 354 may move a Faraday shield that enables/disables wireless functions, may change a strain applied to a strain-responsive element to enable and/or disable functions of the mobile device 352, etc.
[0061]
[0062] Open and closed configurations of the clasp lock 360 may disconnect and/or connect circuit elements of the mobile device, thereby enabling and/or disabling systems and/or functions of the mobile device, or otherwise alter a state of the mobile device. For example, a conductive portion of the clasp 361, when held in position in the closure 365, may complete an electrical connection that correspondingly enables/disables the systems and/or functions.
[0063]
[0064] Adjustable dials, buttons, or other code-based locking mechanisms may be integrated into any one or more of the lock implementations described herein or into other lock implementations. For example, a mobile device may include an electronic keypad configured to release the clasp 344 from its locked position when a correct combination of numbers are entered into the keypad.
[0065] Open and closed configurations of the combination lock 370 may disconnect and/or connect circuit elements of the mobile device, thereby enabling and/or disabling systems and/or functions of the mobile device, or otherwise alter a state of the mobile device. For example, when the combination lock 370 is unlocked, a mechanical configuration of the mobile device may correspondingly be changed to enable and/or disable functions of the mobile device.
[0066]
[0067] Open and closed configurations of the internal trap lock 380 may disconnect and/or connect circuit elements of the mobile device, thereby enabling and/or disabling systems and/or functions of the mobile device, or otherwise alter a state of the mobile device. For example, a conductive portion of the clasp 381, when locked in contact with a conductive portion of the anchor 385, may complete an electrical connection that correspondingly enables/disables the systems and/or functions, or the clasp, when closed or open, may correspond to a changed position of a mechanical element that enables/disables the systems and/or functions.
[0068]
[0069] In the example implementation shown in
[0070] When the dials 395 are in the predetermined configuration, the clasp 391 may be removed from its locked position in the hole 393; otherwise, the clasp 391 is held in position in the hole 393.
[0071]
[0072] In some implementations, an open/closed configuration of a lock corresponds to a blocking/non-blocking configuration, respectively, of a Faraday shield. For example, a movable mechanism of the lock may be coupled to a Faraday shield such that, when the lock is open, the Faraday shield blocks a wireless data system of the mobile device from sending/receiving signals, as described in more detail throughout this disclosure. For each of the lock implementations disclosed in reference to
[0073] In some implementations, a lock is configured to open and/or close based on a biometric authentication process.
[0074] The lock switch 406, and lock switches included in locks according to various implementations of this disclosure, are configured to hold the lock 404 into one or both of a locked (closed) position or an unlocked (open) position or state. The lock switch 406 may include one or a combination of a moveable anchor, bar, pin, gear, ratchet, or other mechanism that can hold the lock 404 in position. In some implementations, the lock switch 406 includes an electronic switch between a closed state and an open state, e.g., an electronic storage storing an indicator of the current state.
[0075] The biometric input system 402 includes one or more sensors 408, e.g., one or more of a fingerprint pressure sensor, a camera (e.g., for facial authentication, retinal/iris authentication, and/or fingerprint detection), a microphone (e.g., for voiceprint authentication), or another biometric sensor. The biometric input system 402 also includes a storage 412 storing authentication information for one or more users, e.g., biometric information programmed into the device based on biometric input from the one or more users. In some implementations, the storage 412 is not specific to the biometric input system 402 but rather is included in another storage of the mobile device 400 or in a cloud-based storage accessible by a wireless data system of the mobile device.
[0076] After a user inputs biometric information into the sensor 408, the biometric input system 402 (e.g., by one or more processors) compares the input biometric input information to the pre-configured authentication information. If there is a match, then the biometric input system 402 controls the lock switch 406 (e.g., by movement of an actuator) to switch a state of the lock 404. As described throughout this disclosure, because, in some implementations, a state of the lock 404 corresponds to one or more enabled/disabled systems/functionalities of the mobile device 400, the biometric input system 402 can correspondingly enable/disable these systems/functionalities by switching of the state of the lock 404.
[0077] In some implementations the biometric input system 402 is configured to activate and/or deactivate one or more other systems of the mobile device 400 besides the lock 404. For example, the biometric input system 402 may, upon receiving matching or non-matching biometric information, close or open electrical switches included in wireless data systems of the mobile device 400 to enable/disable functionalities thereof. In some implementations, the biometric input system 402, upon receiving matching or non-matching biometric information, is configured to physically move a Faraday shield to permit or block wireless signal transfer to/from wireless data systems of the mobile device 400, as described in more detail throughout this disclosure. In some implementations, the biometric input system 402, upon receiving non-matching biometric information, is configured to alert an anti-breach system to an unauthorized event, as described in more detail throughout this disclosure.
[0078] In some implementations, a lock is configured to open and/or close based on signals from a base station.
[0079] The secure system 500 also includes a base station 510. The base station 510 includes a second wireless data system 514 and an optional power provision system 516.
[0080] The wireless data system 504 and the base station 510 are configured to receive and/or transmit signals between each other, either in one direction or in both directions. Based on signals received from the base station 510, the lock switch 508 switches to open/close the lock 506.
[0081] In some implementations, the base station 510 is a mobile electronic device, e.g., a smartphone, a laptop, or a tablet. For example, a user may download an application onto their smartphone to enable the smartphone to serve as a base station for one or more mobile devices as described throughout this disclosure. Existing functionalities of the mobile electronic device (e.g., RFID, Bluetooth, wireless charging, etc.) may be repurposed to perform the base station-related functions described herein.
[0082]
[0083] The wireless data system 600 includes one or more antennas 602, one or more data chips 604, and one or more power sources 606, e.g., a battery. Some wireless data systems do not include each of these elements. For example, in some implementations a wireless data system is passive and does not include a power source.
[0084] At least some components of the wireless data system 600 are linked by electrical interconnects 608, e.g., wires, traces, or other conductive elements. One or more paths along the electrical interconnects 608 (e.g., paths between respective components) may include an electrical switch 610a, 610b, 610c, which may be, in various implementations, an electronic switch (e.g., a digital switch including a transistor) or a physical switch that is connected or disconnected based on one or more movable conductors. Control of the electrical switches 610 makes and breaks connections between the components of the wireless data system 600.
[0085] In some implementations, the wireless data system 600 is electrically coupled to other components of the mobile device (e.g., the anti-breach system, the lock, movable components, and/or other wireless data systems) by coupling components 612, e.g., wires, traces, or other conductive elements. The coupling components 612 can also represent shared physical components, e.g., a movable portion of a lock that also acts as an electrical switch in the wireless data system 600.
[0086] In some implementations, an electrical switch included in a wireless data system is integrated together with a lock. For example, as described in reference to
[0087] In some implementations, an electrical switch is included in an anti-breach system, as described in further detail throughout this disclosure. In some implementations, an electrical switch is included in a user control, e.g., a physical, user-accessible control, as described in further detail throughout this disclosure.
[0088] The antenna 602 may be configured to receive wireless signals, to transmit wireless signals, or to both receive and transmit wireless signals. In some implementations, the antenna 602 includes a metal or otherwise conductive film 605 (e.g., a carbon film) disposed on a dielectric or otherwise insulating substrate. For example, the antenna 602 may include a meandering conductive film 605 having a thickness between 1 μm and 100 μm, or thicker. The substrate may be, for example, a printed circuit board or a flexible substrate (e.g., plastic or paper).
[0089] The antenna 602 may be configured (e.g., by a length, width, thickness, material, and/or shape of conductive film 605) to send and/or receive signals in various wavelength ranges, depending on the implementation. In various implementations, the antenna 602 is configured to send and/or receive signals having a frequency between 100 kHz and 10 GHz, between 120 kHz and 140 kHz, between 13.5 MHz and 13.6 MHz (e.g., about 13.56 MHz), between 430 and 960 MHz, between 860 MHz and 960 MHz, between 865 MHz and 870 MHz, between 900 MHz and 930 MHz, between 2.4 GHz and 2.485 GHz, between 2.45 GHz and 5.8 GHz, or another frequency range.
[0090] In some implementations, the wireless data system 600 includes multiple antennas 602, each antenna 602 configured to send and/or receive signals from a different respective frequency range.
[0091] In some implementations, the wireless data system 600 is configured to receive and/or transmit other types of signals, e.g., Wi-Fi signals and/or cellular signals, which may allow for internet access by the mobile device.
[0092] The data chip 604 includes one or more integrated circuits that process signals received by and/or transmitted from the antenna 602. For example, in some implementations, the data chip 604 is configured to modulate, demodulate, encode, and/or decode signals received by and/or sent by the antenna 602, e.g., to convert received signals into interpretable data and convert data stored on the data chip 604 into signals sent by the antenna 602.
[0093] The data chip 604 is configured to perform modulation, demodulation, encoding, and/or decoding on signals according to one or more protocols. For example, in some implementations the data chip 604 is configured to provide and/or receive Bluetooth signals. In some implementations, the data chip 604 is configured to provide and/or receive RFID signals, e.g., ISM-band signals. In some implementations, the data chip 604 is configured to provide and/or receive multiple types of signal.
[0094] In some implementations, the data chip 604 includes “hard-coded” analog circuit elements, e.g., circuits configured to filter, modulate, amplify, or otherwise process electrical signals in a predetermined way. In some implementations, the data chip 604 includes logic elements, e.g., a microprocessor or a field programmable gate array (FPGA). The data chip 604 may include both hard-coded circuit elements and logic elements, e.g., a received Bluetooth signal may be demodulated by an analog circuit, and the demodulated signal may then be passed to a digital circuit element for further processing. Logic elements of the data chip 604 may receive instruction signals from other elements of the mobile device and corresponding alter a function of the wireless data system 600, e.g., enable or disable the wireless data system 600, change a signal emitted by the wireless data system 600, etc. Instructions signals, in some implementations, are sent based on a lock state, e.g., a sensed mechanical configuration of a lock may result in a corresponding instruction signal being sent to a wireless data system to change a functionality of the wireless data system. Instruction signals may be sent by another wireless data system based on a signal received at the other wireless data system.
[0095] The data chip 604 may include storage, for example, memory (e.g., RAM) and/or persistent storage, either or both of which may store instructions executable by the data chip to perform operations.
[0096] In some implementations, the wireless data system 600 is wholly or partially passive. Rather than relying solely on a power source for power, the wireless data system 600 is powered at least partially by received wireless signals, according to known RFID and other methods.
[0097] Besides signal provision/reception, the data chip 604 may be configured to perform other operations. For example, the data chip 604 may be configured to identify control signals embedded in received wireless signals and perform corresponding operations. Such operations may include, for example, activating and/or deactivating systems and/or functions of the mobile device using the coupling components 612.
[0098] For example, referring back to
[0099] Secure systems in which a lock of a mobile device is controlled, at least partially, by wireless signals from a base station can provide security advantages. For example, in some implementations the wireless signal 512 is a short range wireless signal, e.g., an RFID signal. Upon entering a secure facility, a visitor has the mobile device 502 attached to their wrist and locked in place. The wireless data system 504 is used to track the visitor as they move throughout the secure facility. The visitor cannot remove the mobile device 502 themselves; rather, they must remove it when leaving the secure facility by moving the mobile device 502 near the base station 510 to receive the wireless signal 512 instructing the lock 506 to open.
[0100] Other implementations of the base station 510 are also within the scope of this disclosure. For example, as shown in
[0101] As shown in
[0102] Many other configurations and functions of the wireless data system 600 are within the scope of this disclosure. For example, in some implementations, the wireless data system 600 is configured to emit tracking signals, either actively or upon reception of a received beacon signal (e.g., based upon identifying an embedded indicator in the received beacon signal). These tracking signals are received by base stations in a vicinity of the mobile device and can be used to track the mobile device, e.g., as the mobile device is carried by a user throughout a facility.
[0103] In some implementations, the wireless data system 600 is configured to receive a wireless proximity signal emitted by one or more base stations. If the wireless proximity signal is not received, the mobile device may have been carried out of a proximity of the one or more base stations, e.g., out of a secure facility. This failure to remain in the proximity of the one or more base stations is an unauthorized event that may indicate a security breach. Therefore, based on a failure to receive the wireless proximity signal (e.g., a failure to receive the wireless proximity signal over a predetermined length of time), the wireless data system 600 may trigger a response operation by an anti-breach system of the mobile device, as described in more detail throughout this disclosure. The wireless proximity signal may be identified by the wireless data system 600 based on an embedded indicator in the wireless proximity signal.
[0104] In some implementations, the wireless data system 600 is configured to receive a wireless alert signal and, based on receiving the wireless alert signal (e.g., based on identifying an embedded indicator in the wireless alert signal), trigger a response operation by an anti-breach system of the mobile device, as described in more detail throughout this disclosure. The wireless alert signal may be transmitted throughout an area in order to quickly “lock down” (e.g., disable) all mobile devices in the area, or for another reason. The base station 510 may be configured to transmit the wireless alert signal.
[0105] In some implementations, the wireless data system 600 is configured to cause one or more operations by an external device, e.g., unlocking or locking a door or external lock, causing machinery to start, stop, or perform another operation, etc. The mobile device is moved into a certain proximity of the external device and either actively transmits an instruction signal or receives a wireless signal from the external device that causes the wireless data system 600 to transmit the instruction signal, e.g., upon matching an embedded ID within the wireless signal with a stored ID associated with the external device.
[0106] In some implementations, the wireless data system 600 is configured to receive data from an external device (e.g., a base station), store the data in a storage of the mobile device, and later upload the data to the same or another external device. A mobile device according to this disclosure therefore may serve as a secure, trackable means of data transfer.
[0107] In some implementations, the wireless data system 600 is configured to receive a function switch signal and, based on receiving the function switch signal (e.g., based on identifying an embedded indicator in the function authorization signal), enable and/or disable one or more functions of the mobile device. For example, a first function switch signal may authorize a data transfer function performed by a second wireless data system of the mobile device, and, in response to receiving the first function switch signal, the wireless data system 600 may switch an electrical switch of the second wireless data system, e.g., to interconnect an antenna of the second wireless data system with a data chip of the second wireless data system. A base station may be configured to transmit the function switch signal.
[0108] As another example, a second function switch signal may instruct the disabling of a third wireless data system. In response to receiving the second function switch signal, the wireless data system 600 is configured to physically adjust a Faraday shield of the mobile device to block wireless transmission to/from the third wireless data system, as described in more detail throughout this disclosure.
[0109] Other configurations and implementations of the wireless data system 600 are also within the scope of this disclosure.
[0110] A given wireless data system may be configured to perform one or more functions, e.g., in response to corresponding one or more received wireless signals. In some implementations, a mobile device includes multiple wireless data systems, each wireless data system performing one or more functions.
[0111] As noted above, in some implementations the base station 510 includes a power provision system 516. The power provision system 516 may perform wired and/or wireless power transfer to the mobile device 502. In some implementations, the mobile device 502 is configured such that certain functions/systems of the mobile device 502 are disabled when the mobile device is charging. For example, a power reception system of the mobile device 502 may be configured such that the power reception system is enabled only when the lock 506 is open, and, in addition, the lock 506 being open might cause one or more other systems of the mobile device 502 to be disabled, as described throughout this disclosure.
[0112] Some implementations of mobile devices described herein include an anti-breach system that enhances the security of the mobile device.
[0113] The sensors 702 are configured to detect physical breaches of aspects of the mobile device. These physical breaches are examples of unauthorized events; however, as described throughout this disclosure, unauthorized events may alternatively or additionally include non-physical breaches, e.g., reception of particular wireless signals.
[0114] In various implementations, the sensors 702 may include a force sensor, a strain sensor, an electrical continuity sensor, a touch sensor, or a combination thereof.
[0115]
[0116] For force sensors and strain sensors, an unauthorized event may include a detected force or strain that is above a predetermined threshold force or strain. For example, the electrical continuity sensor 710 may alternatively, or additionally, be a mechanical pressure or strain sensor configured to detect local or device-wide pressure/strain and, in response to a pressure or strain above or below a predetermined threshold, initiate response operations.
[0117] For touch sensors, an unauthorized event may include a detected touch. For example, a touch sensor may be included inside the mobile device such that the touch sensor is not contacted during normal authorized use. However, a breach of the mobile device may cause the touch sensor to be contacted, triggering response operations.
[0118] In some implementations, an unauthorized event may be indicated by another system of the mobile device and indicated to the anti-breach system 700 by the electrical connections 706. For example, a received alert signal or a failure to receive a proximity signal may cause a wireless data system to transmit an indication of an unauthorized event to the anti-breach system 700. An incorrect code entered into a lock mechanism may cause the lock to transmit an indication of an unauthorized event to the anti-breach system 700. A non-matching biometric input may cause the biometric input system to transmit an indication of an unauthorized event to the anti-breach system.
[0119] Upon notice of an unauthorized event, the response mechanisms 704 perform one or more response operations, e.g., based on an instruction signal sent by the sensors 702 or by another component that causes actuation or other movement of a physical component. Typically, these response operations are configured to irreversibly damage one or more portions of the mobile device in order to maintain the security of data stored on the mobile device or in order to prevent the mobile device from being misused. However, in some operations the damage caused by response operations is reversible, e.g., a broken electrical connection that can be repaired to recover data still stored on the mobile device, a reconfigured circuit that can be returned to its original configuration, a moved Faraday shield that can be returned to its original position, or a reprogrammed or reconfigured wireless data system circuit that can be restored to its previous state upon reception of another signal.
[0120]
[0121]
[0122]
[0123]
[0124]
[0125]
[0126]
[0127]
[0128]
[0129] The wireless data system 882 and alert component 884 need not be included together in anti-breach systems; some implementations of anti-breach systems include only one or the other.
[0130] Other implementations of anti-breach systems are also within the scope of this disclosure. For example, an anti-breach system may include any or all of the components described herein with respect to different implementations of anti-breach systems.
[0131] In some cases, it may be desirable to allow a user to active/de-activate systems/functions of a mobile device on-demand, and to make the de-activation secure such that a de-activated is not unintentionally used. In some implementations, activation/de-activation may be performed purely electronically. For example, a mobile device may include a touchscreen and associated computing elements by which a user may electronically activate/de-active systems/functions.
[0132] However, electronic activation/de-activation may sometimes be insecure. For example, eavesdropping, cloning, and spoofing techniques may cause de-activated systems to be utilized (e.g., read out) by hackers.
[0133] Therefore, some implementations of mobile devices according to the present disclosure include physical, user-accessible controls that physically enable/disable systems/functions of the mobile device by moving components of the mobile device, such that unintentional or nefarious use of the systems/functions is physically prevented.
[0134]
[0135] For example, a user may briefly move the slider 900 to expose the wireless data system 904 and download data. After the data is downloaded, the user moves the slider to electromagnetically block the wireless data system 904 and thereby prevent potential eavesdroppers from wirelessly probing the wireless data system 904.
[0136] As noted above, in some implementations a Faraday shield is coupled to a lock. For example, the slider 900 may be mechanically coupled to a lock such that, when the lock is open, the slider 900 necessarily covers the antenna of the wireless data system 904, disabling the wireless data system 904.
[0137] In various implementations, the Faraday shield may take a variety of forms. For example, the Faraday shield may include a screen (e.g., a substantially planar screen) or an enclosure (e.g., a cage or box). The Faraday shield may include one or more metals, a conductive carbon material, cellulose, a composite shielding material, a dielectric mirror, graphite/graphene, a conductive polymer, or another electromagnetic shield material.
[0138] Besides movable Faraday shielding components, fixed Faraday shielding components may be included, e.g., to surround a wireless data system except for where a movable Faraday shield can block/allow access. In some implementations, a shell of the mobile device is itself a Faraday shield or includes Faraday-shielding portions. In some implementations, an internal Faraday cage (constructed of an electromagnetic shield material) is enclosed within the shell.
[0139]
[0140] In addition, in this implementation, the slider 1004 is mechanically coupled to a Faraday shield 1012. As shown in
[0141]
[0142] Some implementations of a user-configurable control do not, or need not, include a movable Faraday shielding component.
[0143] The multiple different data chips are arranged circumferentially around the chip container 1212. When the circuit closure disk 1204 is rotated, the circuit closure portion 1206 completes an electrical connection between a data chip immediately below the circuit closure portion 1206 and the antenna 1210, while the other data chips are disconnected. The data chip that is connected to the antenna 1210 can then perform signal operations using the antenna 1210.
[0144] Because each data chip is configured to perform one or more functions that may be different from one or more functions performed by the other data chips, rotation of the dial 1202 represents a selection of a subset of functions performable using the mobile device 1200. Other, unselected functions are physically prevented from being performed, because the data chips that would perform the unselected functions are electrically disconnected from the antenna 1210.
[0145] Other analogous user-configurable controls are within the scope of this disclosure. For example, other user-accessible mechanisms may be used to make and/or break electrical connections between internal components of a mobile device in order to activate a subset of functions of the mobile device. For example, a user-accessible button may control an electrical switch between a power source and a data chip, thereby enabling/disabling powered operations of the data chip.
[0146]
[0147] In some implementations, the sliders 1302, instead of or in addition to configuring Faraday shields, may be coupled to movable conductors that make and break electrical connections based on positions of the sliders 1302, thereby activating/de-activating the wireless data systems based on respective positions of the sliders 1302.
[0148] The user-configurable controls described in this disclosure allow for the selection of a subset of functions even in a partially or wholly passive mobile device, without requiring electronic selection mechanisms (e.g., screens, batteries, and sophisticated processors) that may otherwise be necessary, though some implementations do additionally or instead include these electronic selection mechanisms. Moreover, because the user-configurable controls, in some implementations, physically prevent wireless data system function (e.g., by breaking connections within the wireless data system or by electromagnetically isolating the wireless data system), disabled systems are disabled more securely than they otherwise would be.
[0149] In practice, other configurations for mobile devices and secure systems are possible, depending on the implementation. Although individual systems of mobile devices have been described in reference to separate figures, a mobile device may include any combination of the disclosed systems in various implementations.
[0150] Various aspects and functional operations of the systems described in this specification, such as operations performed by mobile devices, wireless data systems, anti-breach systems, and base stations may be implemented, at least in part, in digital electronic circuitry, a data processing apparatus, or in computer software, firmware, or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them. Likewise, various aspects and functional operations of the systems may be implemented as one or more computer program products, i.e., one or more modules of non-transient computer program instructions encoded on a non-transient computer readable medium for execution by, or to control the operation of, a data processing apparatus. The computer readable medium may be a machine-readable storage device, a machine-readable storage substrate, a memory device, a composition of matter effecting a machine-readable propagated signal, or a combination of one or more of them.
[0151] The term “data processing apparatus” encompasses all apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, or multiple processors or computers. The apparatus may include, in addition to hardware, code that creates an execution environment for the computer program in question, e.g., code that constitutes processor firmware, a protocol stack, a database management system, an operating system, or a combination of one or more of them. A propagated signal is an artificially generated signal, e.g., a machine-generated electrical, optical, or electromagnetic signal that is generated to encode information for transmission to suitable receiver apparatus.
[0152] A computer program (also known as a program, software, software application, script, or code) may be written in any form of programming language, including compiled or interpreted languages, and it may be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program does not necessarily correspond to a file in a file system. A program may be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code). A computer program may be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
[0153] Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer. Generally, a processor will receive instructions and data from a read only memory or a random access memory or both.
[0154] A number of implementations have been described. Nevertheless, it will be understood that various modifications may be made without departing from the spirit and scope of this disclosure. For example, features described above in connection with different embodiments may be combined in the same implementation. Further, some features described above may be omitted in some implementations. Accordingly, other implementations are within the scope of the claims.