`(12) Patent Application Publication (10) Pub. No.: US 2010/0273452 A1
`Rajann et al.
`(43) Pub. Date:
`Oct. 28, 2010
`
`US 20100273452A1
`
`(54) APPARATUS AND METHODS FOR
`LOCATING TRACKING Ah D/OR
`RECOVERING A WIRELESS
`COMMUNICATION DEVICE
`
`Related U.S. Application Data
`(60) Provisional application No. 61/172,765, filed on Apr.
`26 2009
`’
`'
`
`Publication Classification
`
`(75)
`
`Inventors:
`
`Raj eev Durai Raj ann, San Diego,
`CA (US); Thomas Francis Doyle,
`San Diego, CA (US)
`
`(51)
`
`IIlt- C1-
`(2009-01)
`H04”/24/00
`(2009.01)
`H04W 12/00
`(52) U.S. Cl. .................................... .. 455/411; 455/456.2
`
`Correspondence Address:
`QUALCOMM INCORPORATED
`5775 MOREHOUSE DR.
`
`SAN DIEGO, CA 92121 (US)
`
`(73) Assignee:
`
`QUALCOMM Incorporated, San
`Diego, CA (US)
`
`(21) App1.No.:
`
`12/726,562
`
`(57)
`
`ABSTRACT
`
`A method and apparatus for facilitating location of a targeted
`wireless communications device (WCD) is provided. The
`method may comprise, enabling a location module in
`response to receiving a location state code, wherein the loca-
`tion module includes one or more location state routines,
`wherein at least one ofthe one or more location state routines
`is identified in the location state code, and wherein each
`location state routine includes at least one location function-
`ality, and executing the at least one location functionality
`associated with the one or more location state routines iden-
`
`(22)
`
`Filed:
`
`Mar. 18, 2010
`
`tified by the received location state code.
`
`.1 1}
`/
`
`HIMPP 1009
`
`HIMPP 1009
`
`
`
`Patent Application Publication
`
`Oct. 28, 2010 Sheet 1 of 9
`
`US 2010/0273452 A1
`
`3 {F
`
`r’
`
`FIG. 1
`
`
`
`Patent Application Publication
`
`Oct. 28, 2010 Sheet 2 of 9
`
`US 2010/0273452 A1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Display
`
`Announcement
`Auto-Dailing
`Modification
`
`Module L
`Module E
`
`Module 205
`
`
`nvironmen
`Operation
`Modification
`Detection
`Module 207
`Content
`Module 217
`Uncertainty
`
`Modification
`Modification
`Zone Module
`Recognition
`
`Module 211
`Module 209
`Module 215
`
`
`
`
`
`
`
`
`
`Electronic
`Persistence
`Leash Module
`Module 1
`QTHF R
`T
`
`_——__==
`— ___,—
`__
`
`
`
`
`
` Module 3
`
`Secondary
`User Control
`Module 225
`
`
`
`5
`
`_re:e:j;s§
`
`mis.:u;~::
`
`
`
`
`
`Patent Application Publication
`
`Oct. 28, 2010 Sheet 3 of 9
`
`US 2010/0273452 A1
`
`..................................
`a.........\.........................
`
`a.
`
`ai.
`
`E‘Rf)ii.?wE;if%F§{}l§
`
`
`
`Patent Application Publication
`
`Oct. 28, 2010 Sheet 4 of 9
`
`US 2010/0273452 A1
`
`N6
`
`fifi«mA
`
`\mfi_§.E_
`
`
`
`
`
`..§..fi_...mw..N,,;..m..i.w.\..E.3
`
`
`
`fififi.A.:i
`
`mmmmmm__$u,
`
`
`
`
`
`_...,,§.§_.xmm_wE..fi...fl:_§
`
`
`
`_m_..m.m...”m.Mm:..i...w..
`
`x®H:..,i_i_mi.
`
`v.05
`
`
`
`
`
`
`Patent Application Publication
`
`Oct. 28, 2010 Sheet 5 of 9
`
`US 2010/0273452 A1
`
`f:'$:I::s:,:7;-¥ 5;-iii:i£:;<»;.é~:
`
`‘E
`
`V..,.....,.,.,........,..r,.,_
`
`{)T{i{¥:I§{ §.\{;1£IT.i¥TE3f‘€£I%
`§3.{l$%L.‘='}‘§i‘~§E
`
`Efmj r
`R{1ai.,§‘I‘2I~,‘~«‘§:-1
`
`F’R{:}(
`
`lg‘
`
`{3
`
`
`
`Patent Application Publication
`
`Oct. 28, 2010 Sheet 6 of 9
`
`US 2010/0273452 A1
`
`{.‘{'.1.....-N-k.?"i‘.¥il3ii §~‘£....s5."i‘i"E§’1i}R';‘-~f.
`
`E "" “"
`" ” -:;.;~.;
`E. _ _ _ _ _ “_ _______ _ .5“
`
`FIG. 6
`
`
`
`Patent Application Publication
`
`Oct. 28, 2010 Sheet 7 of 9
`
`US 2010/0273452 A1
`
`
`
`
`
`Patent Application Publication
`
`Oct. 28, 2010 Sheet 8 of 9
`
`US 2010/0273452 A1
`
`RECEIVE A LOCATION STATE CODE
`
`802
`
`ENABLE A LOCATION MODULE
`
`804
`
`EXECUTE A LOCATION FUNCTIONALITY
`
`806
`
`FIG. 8
`
`
`
`Patent Application Publication
`
`Oct. 28, 2010 Sheet 9 of 9
`
`US 2010/0273452 A1
`
`902
`
`MEANS FOR ENABLING A LOCATION MODULE IN RESPONSE
`
`TO RECEIVING A LOCATION STATE CODE, WHEREIN THE
`LOCATION MODULE INCLUDES ONE OR MORE LOCATION
`
`STATE ROUTINES, WHEREIN AT LEAST ONE OF THE ONE OR
`MORE LOCATION STATE ROUTINES IS IDENTIFIED IN THE
`
`LOCATION STATE CODE, AND WHEREIN EACH LOCATION
`STATE ROUTINE INCLUDES AT LEAST ONE LOCATION
`FUNCTIONALITY
`
`MEANS FOR EXECUTING THE AT LEAST ONE LOCATION
`
`FUNCTIONALITY ASSOCIATED WITH THE ONE OR MORE
`
`LOCATION STATE ROUTINES IDENTIFIED BY THE RECEIVED
`LOCATION STATE CODE
`
`MEMORY
`
`FIG. 9
`
`
`
`US 2010/0273452 A1
`
`Oct. 28, 2010
`
`APPARATUS AND METHODS FOR
`LOCATING TRACKING AND/OR
`RECOVERING A WIRELESS
`COMMUNICATION DEVICE
`
`CLAIM OF PRIORITY UNDER 35 U.S.C. §119
`
`[0001] The presentApplication for Patent claims priority to
`Provisional Application No. 61/172,765 filed Apr. 26, 2009,
`and assigned to the assignee hereof and hereby expressly
`incorporated by reference herein.
`
`BACKGROUND
`
`1. Field
`[0002]
`[0003] The disclosed aspects relate to wireless communi-
`cation devices, and more particularly, to systems, methods
`and apparatus for locating and/or tracking and/or recovering
`a wireless communication device, especially devices that
`have been lost, stolen or misplaced.
`[0004]
`2. Background
`[0005] Wireless communication devices have become a
`prevalent means by which majorities of people worldwide
`have come to communicate. Wireless communication devices
`
`have become smaller and more powerful in order to meet
`consumer needs and to improve portability and convenience.
`The smallness and portability of such devices make them
`highly susceptible to being misplaced, lost or stolen. As the
`user penetration within the general population increases to
`include younger aged and senior aged users, the likelihood for
`misplacing, losing or having a device stolen tends to increase.
`[0006] While many wireless communication devices are
`configured to provide password security protection, the pass-
`word is typically required at device power-up. Thus, if a
`device has been lost or stolen while the power is on, the finder
`or the thiefcanuse it as long as the device remains on. In many
`other instances, users prefer to forego password security pro-
`tection because logging on each time the device is powered up
`is viewed as tedious and unnecessary action.
`[0007] When the user of the wireless communication
`device is confronted with a situation in which the device is
`
`misplaced, lost or stolen, it provides for a troublesome and at
`times, traumatic experience. The wireless communication
`device, such as a mobile telephone, is no longer limited to
`providing a means for placing and receiving communication
`calls. The increased storage capacity and functionality of the
`devices may provide the user e-wallet or mobile-office func-
`tionality, which allows the user to not only store contact
`information but also credit card information, valuable and
`secured personal and business related information and the
`like. Thus, permanently losing a device and having to replace
`a lost or stolen device is not merely a matter ofjust facing the
`economical burden of purchasing a new device, it may also
`involve attempting to reacquire lost data, changing previous
`secure personal and/or business information canceling credit
`cards and the like.
`
`[0008] Users confronted with a misplaced, stolen or lost
`wireless communication device typically perform one or
`more standard operations, such as searching for the device,
`reporting to the authorities that the device has been stolen,
`contacting the service provider to get services turned off and,
`if the device is permanently lost or stolen, purchasing a new
`device. All of these standard options are less than attractive to
`the user, as they require time, effort, cost and induce stress. In
`the case of a misplaced device, which is reported as lost for
`
`the purpose of disconnecting services and is then subse-
`quently found, the user has to perform the tedious and time-
`consuming process of re-contacting the service provider to
`have the service reinstated.
`
`[0009] Regardless of whether the wireless communication
`device is misplaced, lost or stolen it is critical that the device
`be rendered unusable, either temporarily until the device is
`found or returned, or permanently if the device is stolen, not
`found or not returned.
`
`In other situations in which a user loans their device
`[0010]
`to some one else, such as a parent loamng their device to their
`child, a need may exist to track the location of the device
`and/or the corresponding loanee. In another application, it
`may be advantageous to provide a user a wireless communi-
`cation device and nefariously track the location of the user or
`the user’s actions. For example, a law enforcement agency
`may desire to track the whereabouts or actions of a suspected
`criminal, without the suspected criminal knowing that they
`are being tracked or their actions being monitored.
`[0011] Thus a need exists to provide for locating, tracking
`and/or recovering wireless communication devices that have
`been misplaced lost, or stolen. As such a need exists to pro-
`vide disablement and secure the data stored on a wireless
`
`communication device that is misplaced, lost or stolen. Addi-
`tionally, a need also exists, for providing location and action
`tracking of wireless devices in the instance in which the
`device has been loaned or to provide covert surveillance by
`law enforcement of suspected criminals.
`
`SUMMARY
`
`In accordance with one or more aspects and corre-
`[0012]
`sponding disclosure thereof, various aspects are described in
`connection with facilitating location of a targeted wireless
`communications device (WCD). According to one aspect, a
`method for facilitating location of a targeted wireless com-
`munications device (WCD) is provided. The method can
`comprise enabling a location module in response to receiving
`a location state code, wherein the location module includes
`one or more location state routines, wherein at least one ofthe
`one or more location state routines is identified in the location
`state code, and wherein each location state routine includes at
`least one location functionality. Moreover, the method can
`comprise executing the at least one location functionality
`associated with the one or more location state routines iden-
`
`tified by the received location state code.
`[0013] Yet another aspect relates to at least one processor
`configured to facilitate location of a targeted wireless com-
`munications device (WCD). The at least one processor can
`include a first module for enabling a location module in
`response to receiving a location state code, wherein the loca-
`tion module includes one or more location state routines,
`wherein at least one ofthe one or more location state routines
`is identified in the location state code, and wherein each
`location state routine includes at least one location function-
`
`ality. Further, the at least one processor can include a second
`module for executing the at least one location functionality
`associated with the one or more location state routines iden-
`
`tified by the received location state code.
`[0014]
`Still another aspect relates to a computer program
`product comprising a computer-readable medium. The com-
`puter-readable medium can include a first set of codes for
`causing a computer to enable a location module in response to
`receiving a location state code, wherein the location module
`includes one or more location state routines, wherein at least
`
`
`
`US 2010/0273452 A1
`
`Oct. 28, 2010
`
`one of the one or more location state routines is identified in
`the location state code, and wherein each location state rou-
`tine includes at least one location functionality. Further, the
`computer-readable medium can include a second set of codes
`for causing the computer to execute the at least one location
`functionality associated with the one or more location state
`routines identified by the received location state code.
`[0015] Yet anotheraspect relates to an apparatus. The appa-
`ratus can include means for enabling a location module in
`response to receiving a location state code, wherein the loca-
`tion module includes one or more location state routines,
`wherein at least one ofthe one or more location state routines
`is identified in the location state code, and wherein each
`location state routine includes at least one location function-
`
`the apparatus can comprise means for
`ality. Moreover,
`executing the at least one location functionality associated
`with the one or more location state routines identified by the
`received location state code.
`
`[0016] Another aspect relates to an apparatus. The appara-
`tus can include a location recovery module operable to:
`enable the location recovery module in response to receiving
`a location state code, wherein the location module includes
`one or more location state routines, wherein at least one ofthe
`one or more location state routines is identified in the location
`state code, and wherein each location state routine includes at
`least one location functionality, and execute the at least one
`location functionality associated with the one or more loca-
`tion state routines identified by the received location state
`code.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0017] The disclosed aspects will hereinafter be described
`in conjunction with the appended drawings, provided to illus-
`trate and not to limit the disclosed aspects, wherein like
`designations denote like elements, and in which:
`[0018]
`FIG. 1 is a block diagram ofa system for remotely
`accessing a wireless communication device that has been
`misplaced, lost or stolen, according to an aspect;
`[0019]
`FIG. 2 is a block diagram ofthe various location and
`recovery routines executed by a wireless communication
`device that has been misplaced, lost or stolen, according to an
`aspect;
`FIG. 3 is a block diagram ofa system for locating,
`[0020]
`tracking and/or recovering a targeted wireless communica-
`tion device, according to another aspect;
`[0021]
`FIG. 4 is an example of a communication data
`packet payload, according to an aspect;
`[0022]
`FIG. 5 is a block diagram of a target wireless com-
`munication device, according to another aspect;
`[0023]
`FIG. 6 is a block diagram of a computing device that
`attempts to locate, track and/or recover a target wireless com-
`munication device, according to an as oect;
`[0024]
`FIG. 7 is a block diagram of an exemplary cellular
`telephone network used in communicating with the targeted
`wireless communication device, according to an aspect;
`[0025]
`FIG. 8 depicts an exemplary f ow diagram ofa meth-
`odology for facilitating location of a targeted wireless com-
`munication device according to an aspect; and
`[0026]
`FIG. 9 is a block diagram of an exemplary commu-
`nication system that can facilitate loca ion of a targeted wire-
`less communication device according to an aspect.
`DETAILED DESCRIPTION
`
`[0027] Various aspects are now desc ibed with reference to
`the drawings. In the following description, for purposes of
`
`explanation, numerous specific details are set forth in order to
`provide a thorough understanding of one or more aspects. It
`may be evident, however, that such aspect(s) may be practiced
`without these specific details.
`[0028] The various aspects are described herein are in con-
`nection with a wireless communication device. A wireless
`communication device can also be called a subscriber station,
`a subscriber unit, mobile station, mobile, remote station,
`access point, remote terminal, access terminal, user terminal,
`user agent, a user device, or user equipment. A subscriber
`station may be a cellular telephone, a cordless telephone, a
`Session Initiation Protocol (SIP) phone, a wireless local loop
`(WLL) station, a personal digital assistant (PDA), a handheld
`device having wireless connection capability, or other pro-
`cessing device connected to a wireless modem.
`[0029] Present aspects provide for systems, devices, appa-
`ratus, methods and computer program products for locating,
`tracking and attempting to recover, wireless communication
`devices that have been misplaced, lo st or stolen. In this regard,
`present aspects rely on generating a communication data
`packet, for example, a Short Message Service (SMS) com-
`munication data packet at a secondary wireless device, a web
`interface or a network service provider device. The commu-
`nication data packet includes a locating state code that iden-
`tifies one of a plurality of locating states that are operable on
`the targeted (i.e., the misplaced, lost or stolen) wireless com-
`munication device. The locating states are associated with
`one or more predetermined routines that are operable on the
`targeted wireless device. In some aspects, the locating state
`may be associated with a sequence of routines that are trig-
`gered on the device.
`[0030] The predetermined routines may effectively dis-
`able/lock the wireless communication device, disable any
`application running on the wireless device, such as a commu-
`nication call application. In addition to disabling or locking
`the device, the predetermined routines may trigger jamming
`or scrambling of communication signals, such as voice or
`data signals. Additionally, the predetermined routines may
`trigger audible, visual or sensory perceptible alerts to the
`possessor ofthe device that identify the device as being lost or
`stolen. The predetermined routines may additionally capture
`data, such as geographic location data, image data, audio data
`and the like and communicate the data to the owner/user ofthe
`
`targeted device, to a network entity device, or to a service
`provider device. In turn the captured and retrieved informa-
`tion may be used to locate the device and/or the party who is
`in possession of the targeted device. Also, once data is cap-
`tured and retrieved from the wireless device, predetermined
`routines may provide for data to removed/deleted from the
`device. Additionally, the predetermined routines that capture
`and communicate data may be operated in a “stealth” mode so
`that conventional indicators that would normally be pre-
`sented, such as displayed lights or messages or audible tones,
`are suppressed to insure that the finder/thief is unaware that
`these routines are currently being executed. Also, the prede-
`termined routines may change an operational mode, such as
`changing the targeted device from a “silent” or “vibrate” ring
`state to an “audible” ring state.
`[0031] Referring to FIG. 1, a block diagram is depicted of a
`system 10 for remotely accessing a wireless communication
`device that has been misplaced, lost or stolen to initiate the
`locating,
`tracking and/or attempted recovery of present
`aspects. The user/owner 12 of the targeted wireless commu-
`nication device 14, which may be categorized as misplaced
`
`
`
`US 2010/0273452 A1
`
`Oct. 28, 2010
`
`device, a lost device, a stolen device or a device that requires
`tracking or surveillance, may remotely access the device 14
`through various communication charmels. The communica-
`tion charmels provide for generating and communicating a
`communication data packet, such as an SMS message or the
`like, which includes a locating state code for identifying one
`of a plurality of locating states (for example, a misplaced
`state, a lost state, a stolen state, a tracking state, a surveillance
`state, such as an emergency surveillance state or a covert
`surveillance state, and the like) that are operable on the tar-
`geted wireless communication device. As will be described at
`length infra., the locating states are associated with one or
`more predetermined location routines that are operable on the
`targeted wireless device. I11 many aspects, a locati11g state is
`associated with a predetermined sequence of routines or
`actions that are executed to locate, track, and attempt to
`recover the target device 14. In one aspect, a locating state
`may include a location state code which may enable at least
`one location functionality. As used herein, a location func-
`tionality may include, but is not limited to, any action per-
`formed to either directly or indirectly assist in location and/or
`recovery of the target device 14.
`[0032] As shown in FIG. 1, the user/owner 12 may borrow
`or otherwise obtain an alternate or secondary wireless com-
`munication device 16 to generate and communicate the req-
`uisitc communication data packet to thc targctcd dcvicc. In
`addition, the user/owner 12 may interface with a web inter-
`face through a PC 18, laptop (not shown in FIG. 1) or any
`other device having network access to the Internet. In such
`aspects, user/owner will provide necessary inputs to the web
`interface to initiate the generation and communication of the
`requisite communication data packet to the targeted device. In
`another aspect, user/owner 12 may communicate with a net-
`work/service provider entity 20 and the network/service pro-
`vider entity may provide the necessary inputs to a network
`server to initiate the generation and communication of the
`requisite communication data packet to the targeted device.
`Alternatively, any other communication mechanism capable
`of generating and communicating the necessary communica-
`tion data packet to the target device may also be used to
`initiate the location, tracking and attempted recovery process
`according to the present aspects.
`[0033]
`FIG. 2 provides a block diagram of various location
`routines that may be executed on the targeted wireless com-
`munication device 14 in response to detection of location
`state code in a received communication data packet. As pre-
`viously noted, each location state will be associated with one
`or more location routines and, in some aspects, a location
`state will be associated with a sequence of location routines,
`such that detection of a location state code in a received
`communication data packet will trigger the execution of the
`sequence of location routines. As shown, in FIG. 2, the tar-
`geted wireless communication device may be operable to
`execute a geographic location determining routine 22, such as
`a Global Positioning System (GPS) location determining rou-
`tine, a still or moving image capture routine 24 and/or an
`audio capture routine 26. The results of these routines, geo-
`graphic location data, image data and/or audio data may then
`be communicated to back to the user/owner via the secondary
`device 16 and/or a web interface, a network entity, such as a
`service provider, a law enforcement entity and/or any other
`relevant entity for analysis. Geographic location data pro-
`vides the ability to track the location of the misplaced, lost or
`stolen device. Image data, still or moving, and audio data may
`
`provide the ability to identify the finder/thief of the targeted
`device or identify the surrounding area in which the targeted
`device is located.
`
`[0034] Additionally, target device 14 may be operable to
`execute emergency/covert surveillance routine 27 that pro-
`vides surveillance of a location if an emergency event requir-
`ing surveillance occurs. For example, if a major accident
`occurs, such as an automobile accident, or a kidnapping/
`abduction occurs. The emergency/covert surveillance routine
`27 may be operable to activate the still or moving image
`capture routine 24 to capture still or moving image data, the
`geographic location-determining routine 22 for determining
`location, the audio capture routine 26 for capturing audio and
`the like. Additionally, as shown in FIG. 2, the targeted device
`14 may be operable to execute input mechanism, application
`and/or device disablement routine 28 that may operable to
`disable any input mechanism, such as the keypad, any appli-
`cation executable on the device, such as communication call
`applications or disable the device in its entirety. The targeted
`device 14 may also be operable to execute various forms of
`sensory alarm routines 30. Sensory alarm routines may trig-
`ger audible alarms, such as a series of periodic or continuous
`audible tones or a pre-recorded message, visual alarms, such
`as messages displayed on the target device display or vibra-
`tional alarms, which cause the device to vibrate periodically
`or continually. Sensory alarm routines serve to acknowledge
`to the general public that the device is misplaced, lost or
`stolen. The emergency/covert surveillance routine 27 may be
`operated when the emergency surveillance state is invoked or
`the emergency/covert surveillance routine 27 may be oper-
`ated in a “stealth” mode when the covert surveillance state is
`invoked.
`
`[0035] Additionally, the target device 14 may be operable
`to execute power reserve routine 32 that is operable maintain-
`ing a power reserve for the location, tracking and/or recovery
`process. For example, power may be reserved for determining
`location/GPS fixes, capturing image data and communicating
`with the remote communication device, such as a secondary
`wireless device, PC or network entity.
`[0036]
`In addition, the target device 14 may be operable to
`execute any other locating, tracking, recovery and/or surveil-
`lance routine 32 that may be operable to assist in accomplish-
`ing recovery of the target device 14. For example, the other
`locating routine 32 may include a routine for changing an
`operational mode, such as changing the targeted device from
`a “silent”, “vibrate”, “airplane mode”, “low-volume”, or
`other new modes to an “audible” or “high volume” ring state,
`e.g. such as by changing a speaker or ring tone volume level
`(“maximum volume”),
`turning on an external
`speaker
`(“speaker phone mode”), etc. Often, the user of the targeted
`device will misplace the device while the device is in the
`“silent”, “vibration” or “low volume” ring state. These states
`prohibit the device from being located by merely calling the
`device and listening for the ring tone. In addition, in certain
`instances it may be necessary to change the misplaced tar-
`geted device from an “off” state to an “on” state prior to
`changing the ring tone state or performing other locating
`routines on the targeted wireless device. Other locating,
`tracking, recovery and surveillance routines 32 may include
`routines operable for jamming, scrambling or otherwise cor-
`rupting the communication data, such as voice data, text data,
`image data or the like.
`[0037]
`In one aspect, other locating-related routine 32 may
`include a announcement module 201 for making audio
`
`
`
`US 2010/0273452 A1
`
`Oct. 28, 2010
`
`announcements (e.g. a pre-recorded message, a ring-tone,
`etc.) even ifthe wireless device is functioning in a ‘vibrate’ or
`‘silent’ or ‘off mode of operation.
`In one aspect,
`the
`announcement module 201 may automatically increase vol-
`ume and/or turn on the speaker-phone to make audio
`announcements. In another aspect, the wireless device may be
`made apparent to people nearby. Furthermore, in such an
`aspect, any audio announcement may armounce return recov-
`ery messages such as but not limited to, a “call home” request,
`a request to contact a third party, or any armouncement of
`return instructions, mailing instructions (e.g. mailing address
`and account number to use to charge mailing fees) or a tele-
`phone number to call, etc. Still further, in such an aspect, any
`audio announcement may announce a warning that the wire-
`less device is being tracked, or authorities have been notified,
`etc. Even further, in one aspect, the armouncement module
`201 may prompt the wireless device to phone announce and/
`or display a message, such as a pre-recorded audio clip and/or
`graphic, describing one or more of the actions the phone is
`about to perform, such as taking photos, recording audio,
`video, etc., prior to taking such actions. In another aspect,
`audio announcements may further armounce that the wireless
`device is being disabled, or can not make calls, etc. In one
`aspect, once an announcement is performed, the wireless
`device may be obtained by a searching entity such as but
`limited to, the owner/user, a third party, etc. In such an aspect,
`the wireless device may be obtained by being returned or
`retrieved by a searching entity. In the aspect in which a third
`party obtains the wireless device, the third party may then
`return the wireless device to the owner. The returning may be
`performed directly, through postage, etc. Further an owner
`may be located through any number of identifying character-
`istics, such as, a phone number, an address, an account num-
`ber, etc.
`In one aspect, other locating-related routine 32 may
`[0038]
`include an auto-dialing module 203 for enabling one or more
`auto dialing presets. In such an aspect, the auto-dialing mod-
`ule 203 may include one or more autodial presets which may
`include but are not limited to, a “call home” preset that
`enables the device to call a predefined “home” location, such
`as another number registered to the wireless device user, a call
`center able to handle returns of the device, etc. In such an
`aspect, the one or more auto-dialing presets may be presented
`more prominently on the wireless device display than when
`such presets are presented, if at all, when the routine is not
`enabled.
`
`In one aspect, other locating-related routine 32 may
`[0039]
`include a display modification module 205 for continuously,
`intermittently and/or periodically modifying the wireless
`device display state. For example, a wireless device may
`modify its display by blanking out the display, changing a
`radio frequency (RF) signal strength indicator to falsely dis-
`play a reduced value, changing a battery indicator to falsely
`display a reduced value, etc. In another example, a wireless
`device may change the display screen color, intensity and/or
`cause the screen to flash so as to more readily facilitate locat-
`ing the wireless device or to give the impression that the
`display screen is not working properly in order to discourage
`unauthorized use, e. g. triggered by an attempted usage of the
`device when this routine is active. As such, in the display
`modification module 205, the device may provide a false
`sense of low or faulty performance, thereby discouraging any
`attempted unauthorized usage of the device.
`
`In another aspect, other locating-related routine 32
`[0040]
`may include a operation modification module 207 for con-
`tinuously,
`intermittently and/or periodically modifying at
`least one wireless device operational state. For example, upon
`activation of the operation modification module 207, the
`wireless device may power down, loop between power down/
`up, etc. so as to frustrate any attempted unauthorized usage of
`the wireless device. In another example, upon activation of
`the operation modification module 207, the wireless device
`may periodically disable the RF transceiver. The operation
`modification module 207 may be triggered by attempted
`unauthorized usage of the device while this routine is acti-
`vated. In another aspect, the wireless device may shield,
`encrypt, delete or otherwise protect data stored or1 the wire-
`less device. In such an aspect, the wireless device may trans-
`mit at least a portion of user generated content (e.g. contacts,
`passwords, audio, photos, videos, applications, etc.) and
`purge the wireless device thereafter.
`[0041]
`In another aspect, other locating-related routine 32
`may include a position modification module 209 for continu-
`ously, intermittently and/or periodically modifying the wire-
`less device physical positioning. For example, the position
`modification module 209 may include instructions config-
`ured to cause a camera associated with the wireless device to
`
`move, rotate, or be manipulated in some manner so as to
`providc an image, vidco, ctc. of thc surroundings. In onc
`aspect, the wireless device may vibrate, flip, move in a spe-
`cific direction, etc., in response to a variety of conditions. For
`example, a camera associated with the wireless device may be
`facing down or in a direction that does not assist in location.
`In such an example, the wireless device may attempt to adjust
`its physical positioning so as to more readily facilitate locat-
`ing the wireless device. In another example, the device may
`include an actuator connected to an arm, such as a flip portion
`of the device, and activation of the position modification
`module 209 may energize actuator to automatically move flip
`portion, for example, in an effort to change a position of the
`device, e. g. to change a side of the device including the
`camera from facing down to facing up or facing sideways. In
`another example, if an image taken is “black” (e.g. camera is
`covered or lying face down on ground), the target WCD may
`activate the position modification module 209. In such an
`example, a “black” image may be defined as where a majority
`of pixels in a digital image are black or off.
`[0042]
`In one aspect, other locating-related routine 32 may
`include an uncertainty zone module 213 for determining an
`“uncertainty zone.” As used with respect to this aspect, an
`uncertainty zone may be defined as a geographic region of
`defined dimensions within which the exact location of the
`
`wireless device may not be determined. For example, GPS
`aided tracking of the wireless device may provide specific
`latitude and longitude coordinates, however, there may be a
`degree of uncertainty with respect to such coordinates, e.g.
`based on the precision ofthe system or based on lack of some
`coord