METHOD AND APPARATUS FOR PROTECTING DATA IN A PORTABLE ELECTRONIC DEVICE
20220182820 · 2022-06-09
Inventors
Cpc classification
G06F2221/2143
PHYSICS
G08B13/1409
PHYSICS
H04L63/107
ELECTRICITY
H04L9/08
ELECTRICITY
H04W12/04
ELECTRICITY
H04W12/126
ELECTRICITY
H04W12/02
ELECTRICITY
H04L63/06
ELECTRICITY
G06F21/32
PHYSICS
International classification
H04W12/02
ELECTRICITY
G06F21/32
PHYSICS
G06F21/62
PHYSICS
H04L9/08
ELECTRICITY
H04W12/04
ELECTRICITY
Abstract
Data in a portable electronic device is protected by using external and internal status detection means to determine if the device is misplaced, lost, or stolen. The device then takes, singly or in combination, one of several actions to protect the data on the device, including declaring its location to an owner or service provider, locking the device or specific functions of the device to disable all data retrieval functionality, erasing or overwriting all the stored data in the device or, where the data has been stored in the device in an encrypted format, destroying an internally-stored encryption key, thereby preventing unauthorized access to the encrypted data in the device.
Claims
1. A method of operating a portable electronic device, the method comprising executing a software application embodied on the portable electronic device which causes the portable electronic device to perform the steps of: determining a location of the portable electronic device; receiving, at the portable electronic device, a signal that indicates a status of the portable electronic device; and transmitting the determined location to a centralized server.
2. The method of claim 1, wherein the step of determining a location of the portable electronic device is determined using GPS.
3. The method of claim 1, wherein the step of determining a location of the portable electronic device is determined using Wi-Fi triangulation.
4. The method of claim 1, wherein the step of determining a location of the portable electronic device is determined using microwave or broadcast triangulation.
5. The method of claim 1, wherein the step of determining a location of the portable electronic device is determined using ultrawideband triangulation.
6. The method of claim 1, wherein the step of receiving the signal comprises receiving a wireless signal transmitted from a service provider of the portable electronic device.
7. The method of claim 1, wherein the step of receiving the signal comprises receiving a predetermined code during a received phone call.
8. The method of claim 1, wherein the step of transmitting the determined location to a central server is transmitted in response to the indicated status.
9. The method of claim 8, wherein the portable electronic device is notified by the received indicated status that the portable electronic device is misplaced, lost, or stolen.
10. The method of claim 9, further comprising, by executing the software application embodied on the portable electronic device, the portable electronic device triggering one or more additional actions, in response to being notified of the misplaced, lost, or stolen status, wherein the step of transmitting the determined location is a primary action with respect to the one or more additional actions.
11. The method of claim 10, wherein one of the one or more additional actions comprises sounding an audible alarm.
12. The method of claim 10, wherein one of the one or more additional actions comprises the portable electronic device entering a non-functional lockdown mode.
13. The method of claim 12, wherein, by executing the software application embodied on the portable electronic device, the portable electronic device returns to full operation by authenticating an owner of the portable electronic device via receiving a predetermined password or biometric identification after entering the non-functional lockdown mode.
14. The method of claim 1, wherein the centralized sever is associated with a web page through which the determined location is accessible.
15. A portable electronic device comprising: a memory unit, and one or more processors, wherein the memory unit stores computer readable instructions executable by the one or more processors, which causes the one or more processors to: determine a location of the portable electronic device; receive, at the portable electronic device, a signal that indicates a status of the portable electronic device; and transmit the determined location to a centralized server.
16. The portable electronic device of claim 15, wherein the memory unit stores computer readable instructions that further comprise instructions which when executed by the one or more processors cause the one or more processors to transmit the determined location to the centralized server in response to the indicated status.
17. The portable electronic device of claim 16, wherein the memory unit stores computer readable instructions that further comprise instructions which when executed by the one or more processors causes the one or more processors to: notify the portable electronic device, in response to receiving the status indicating signal, that the portable electronic device is misplaced, lost, or stolen; and trigger an additional action, wherein transmitting the determined location to a centralized server is a primary action with respect to the additional action.
18. A system to control data and operation of a portable electronic device, the system comprising: a centralized server configured to provide communicative access to data of the centralized server via a website; a portable electronic device communicatively coupled to the centralized server wherein, the portable electronic device is further configured with memory, at least one processor, and data storage embodied therein; the memory of the portable electronic device having stored thereon, computer readable instructions which when executed by the at least one processor of the of the portable electronic device causes the at least on processor to: determine a location of the portable electronic device; receive a signal that indicates a status of the portable electronic device; and transmit the determined location to the centralized server based on the indicated status;
19. The system of claim 18, wherein the portable electronic device further comprises a GPS unit, and the determination of the location of the portable electronic device is calculated using the GPS unit.
20. A method of operating a portable electronic device, the method comprising executing a software application embodied on the portable electronic device which causes the portable electronic device to perform the steps of: determining a current location of the portable electronic device; receiving, at the portable electronic device, a signal that indicates a status of the portable electronic device; in response to the indicated status, executing a call to a predetermined number; and audibly reporting the determined current location over the call using synthesized audio.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0012]
[0013]
[0014]
DETAILED DESCRIPTION OF A PREFERRED EMBODIMENT
[0015] In a preferred embodiment, the invention comprises an application operating on a portable electronic device that (1) determines that the portable electronic device is misplaced, lost or stolen, and (2) takes action to safeguard the data stored on the portable electronic device. Many embodiments of the invention are possible, based on different techniques for achieving each of the aforementioned functions.
[0016] To determine that it is misplaced, lost or stolen, i.e., has an undesirable status, the portable electronic device uses one of several techniques. For purposes herein, the terms, “undesirable status,” “misplaced, lost, or stolen,” and “lost or stolen” are used in a generic sense to indicate that the portable electronic device is not under control of the owner/user, and therefore, the owner/user is interested protecting the data in the device from access by unauthorized persons.
[0017] In the preferred embodiment of the invention, the device receives from the owner an indication that it is misplaced, lost or stolen. For example, in the case of a portable electronic device having cellular phone functionality, the owner may call the device directly and enter a predetermined code that notifies the device that it is lost or stolen. In the case of a portable electronic device that does not have cellular phone functionality, the owner may call a service number operated by the service provider, and the service provider then transmits an appropriate signal to the device using other communication protocols, including other wireless communication systems or landline and network systems.
[0018] In an alternative embodiment of the invention, the portable electronic device itself detects that it is misplaced, lost, or stolen. For example, the device may detect that it is misplaced, lost, or stolen based on its current position. The owner of the device defines a region within which he intends to operate the device. If the device leaves the defined region, the device assumes that is has been misplaced, lost, or stolen. An embedded GPS unit, wireless triangulation, or time-of-flight calculations may calculate the position of the device. Alternatively, in areas where service coverage is ordinarily reliable, loss of signal alone may indicate that the device has departed from the intended usage area. The device observes its position and triggers various actions for data protection based upon predetermined location parameters.
[0019] Another technique that the portable electronic device may use to detect that it is misplaced, lost, or stolen is observation of a prolonged period of inactivity or activity. For example, in a device with cellular phone functionality, the device may compare the elapsed time since the owner last placed a call to a threshold value set by the manufacturer or the owner and, depending on the result of the comparison, elect to trigger certain data protection functions. The device observes its own activity levels and triggers various actions for data protection based upon predetermined activity levels.
[0020] In yet another technique, a device having cellular phone functionality monitors the phone numbers dialed, and compares them with either or both of a history of previously dialed numbers and numbers within the internally stored contact information. The device observes dialing patterns and triggers various actions for data protection based upon any predetermined events or anomalous dialing patterns.
[0021] Finally, the device may combine two or more of the above techniques to provide a more sophisticated determination of when it has been misplaced, lost, or stolen.
[0022] Once the device determines that it is likely misplaced, lost, or stolen, the device may take one or more of several actions, each providing an additional level of security. In one embodiment of the invention, the device enters a beacon mode in which it transmits its location. For example, if the device is equipped with a GPS unit, it may transmit its location to a central server operated by the service provider. The owner of the device may then access the location of the device, e.g. via a web page that adequately authenticates the identity of the owner. Alternatively, the portable electronic device may call a predetermined number, e.g. the land line of the owner, and report, e.g. with a synthesized voice, its current location to either a message recorder or directly to the owner.
[0023] In another embodiment of the invention, the portable electronic device provides a higher level of protection by entering a non-functional lock-down mode after determining it is misplaced, lost, or stolen. Once in lock-down mode, the device does not allow data retrieval therefrom. The device returns to full operation only when the owner can be reliably authenticated, for example via a predetermined password or biometric identification.
[0024] However, as a skilled hacker may still defeat the authentication process, the preferred embodiment of the invention provides an even higher level of security. In a preferred embodiment of the invention, during normal operation the device writes data to the internal storage in an encrypted format. The device caches the encryption key within the storage during ordinary usage, so that the encryption and decryption processes do not inconvenience the user. When it is determined that the device is misplaced, lost, or stolen, the device destroys the encryption key. The owner may restore access to the data by providing the encryption key, which he has presumably recorded in a safe location.
[0025] In yet another embodiment of the invention, the portable electronic device completely erases the contents of its on board data storage. If the storage incorporates volatile memory, the device may cut the power to the memory. If the storage incorporates non-volatile memory, the device may overwrite the data, preferably multiple times. The device may use a file utility such as “GNU SHRED” to perform the overwriting. While providing essentially complete security, this approach does prevent direct recovery of the data by the owner.
[0026] In a further embodiment of the invention, the portable electronic device implements the actions described above in sequence, entering beacon mode immediately upon determination that it is misplaced, lost, or stolen. If more time passes before the owner recovers the device, the remaining actions are undertaken in sequence, with each action providing and increased level of security.
[0027] As illustrated in
[0028]
[0029] In
[0030] As illustrated in
[0031] Further, in response to the determination that the device has been misplaced, lost, or stolen, to protect its stored data, either singly or in combination, the device can declare its location 210 by transmitting its location to a service provider 212 or by announcing its location to an owner 214. The device may announce its location to an owner 214 using several different approaches, either singly or in combination, including: triggering an automated call to the owner on another designated number, triggering an instant message to the owner, sending an email to the owner, paging the owner on another designated number, sounding an audible alarm, or by triggering some other form of communication to the owner, such as placing an indication of the device location on a website accessible by the owner.
[0032] Once the portable electronic device has determined or been alerted that it has an undesirable status and has been either misplaced, lost, or stolen, the device can also choose to take the additional following steps to protect its data, either singly or combination, including locking down data retrieval functionality 220, destroying an encryption key 230, or erasing the stored data 240.
[0033] In a preferred embodiment, the invention comprises a data protection system for a portable electronic device having an owner. The portable electronic device has data storage, means for determining a status of the portable electronic device, and means for protecting data on the portable electronic device whenever a status of the portable electronic device is undesirable. For present purposes, an “owner” is defined as someone who actually either owns the device or is an authorized user of the device and, hence, entitled to protect the data on the device. This definition of owner is not intended to prescribe or prevent the use of the invention in other circumstances, where use of the device may be temporary, on lease, or otherwise.
[0034] In a first version, the means for determining status of the portable electronic device may be external to the portable electronic device. The owner of the device subjectively or objectively determines that the device has an undesirable status. An undesirable status includes being misplaced, lost, or stolen. An undesirable status further includes knowing the location of the device, not having current access to the device, but wishing to prevent access to data on the device by others while it is in the known, but undesirable location. Generally, when the device is in a known but undesirable location, the owner has inadvertently temporarily left the device at a known location such as a restaurant, an airplane, at another person's office, at a friend's house, at a business, or some other similar circumstance.
[0035] External status communication may occur via any of at least two methods. The first method consists of an owner making a determination that the portable electronic device has an undesirable status. The owner communicates a status code to the device to indicate the undesirable status, and the device receives the status code from the owner.
[0036] The second method consists of a service provider determining that the portable electronic device has an undesirable status. The service provider communicates with the device to provide a notice to the device of status, and the device receives the notice.
[0037] Alternatively, in another embodiment, the data protection system may use internal means in the portable electronic device for determining status of the device. These means may include any of the following, either singly or in combination: observing a position of the portable electronic device; observing an activity level of the portable electronic device; or observing a dialing pattern of the portable electronic device.
[0038] Once the data protection system has used either external or internal means to determine a status of the portable electronic device, various means for protecting data on the device are triggered by the device. These means for protecting data stored on the device include, singly or in combination: (1) the device declaring its own location to its owner or a service provider; (2) the device locking data retrieval functionality; (3) where data is stored in an encrypted format, destroying an encryption key stored in the device to prevent further access to the data; or (4) erasing the data in the device.
[0039] A preferred embodiment, of the invention for protecting data in a lost portable electronic device, wherein the data is encrypted with an encryption key stored in the device, comprises the steps of: (1) an owner of the device determining that the device has an undesirable status; (2) the owner calling the device and transmitting a code to the device indicating the undesirable status; (3) the device receiving the code; and (4) the device destroying the stored encryption key, thereby preventing access to the data on the device.
[0040] The previously described versions of the invention have many advantages, including simple implementation, flexible methods of implementation, varying levels of security, varying means for notification, automated determination of device status, and universal applicability to any portable electronic device, wireless and otherwise, among other things. The invention does not require that all the advantageous features and all the advantages need to be incorporated into every embodiment of the invention.
[0041] Although the invention has been described in considerable detail with reference to certain preferred versions thereof, other versions are possible. For example, in addition to GPS, other forms of device locating technology can be used, such as RFID, WiFi triangulation, microwave or broadcast triangulation, ultrawideband triangulation, and other location and position detection systems that might evolve in the future. Further, other access inhibitors can be triggered upon determination that the device has an undesirable status, such as the requirement for a thumb-print, retinal scan or other bio-identification input. Additionally, such features as power-disconnect, screen blanking, and other interruptions to device functionality may be triggered upon determination that the device has an undesirable status. Additionally, although an undesirable status is described as misplaced, lost, or stolen, the invention may be easily adapted to address other status circumstances, such as presence within certain distrusted wireless networks, presence within certain geographical regions, and any other status circumstances which might be of interest to a user or owner of the device. In addition, although described as having external and internal means for determining status and triggering data protection actions, in additional embodiments, a device can be enabled with any of the described features in an automated fashion, thereby creating a smart implementation which is triggered automatically based upon the device's detection of certain events or activities, as previously described.
[0042] Although the invention is described herein with reference to the preferred embodiment, one skilled in the art will readily appreciate that other applications may be substituted for those set forth herein without departing from the spirit and scope of the present invention. Accordingly, the invention should only be limited by the Claims included below.