throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2010/0273452 A1
`Rajann et al.
`(43) Pub. Date:
`Oct. 28, 2010
`
`US 20100273452A1
`
`(54) APPARATUS AND METHODS FOR
`LOCATING TRACKING Ah D/OR
`RECOVERING A WIRELESS
`COMMUNICATION DEVICE
`
`Related U.S. Application Data
`(60) Provisional application No. 61/172,765, filed on Apr.
`26 2009
`’
`'
`
`Publication Classification
`
`(75)
`
`Inventors:
`
`Raj eev Durai Raj ann, San Diego,
`CA (US); Thomas Francis Doyle,
`San Diego, CA (US)
`
`(51)
`
`IIlt- C1-
`(2009-01)
`H04”/24/00
`(2009.01)
`H04W 12/00
`(52) U.S. Cl. .................................... .. 455/411; 455/456.2
`
`Correspondence Address:
`QUALCOMM INCORPORATED
`5775 MOREHOUSE DR.
`
`SAN DIEGO, CA 92121 (US)
`
`(73) Assignee:
`
`QUALCOMM Incorporated, San
`Diego, CA (US)
`
`(21) App1.No.:
`
`12/726,562
`
`(57)
`
`ABSTRACT
`
`A method and apparatus for facilitating location of a targeted
`wireless communications device (WCD) is provided. The
`method may comprise, enabling a location module in
`response to receiving a location state code, wherein the loca-
`tion module includes one or more location state routines,
`wherein at least one ofthe one or more location state routines
`is identified in the location state code, and wherein each
`location state routine includes at least one location function-
`ality, and executing the at least one location functionality
`associated with the one or more location state routines iden-
`
`(22)
`
`Filed:
`
`Mar. 18, 2010
`
`tified by the received location state code.
`
`.1 1}
`/
`
`HIMPP 1009
`
`HIMPP 1009
`
`

`

`Patent Application Publication
`
`Oct. 28, 2010 Sheet 1 of 9
`
`US 2010/0273452 A1
`
`3 {F
`
`r’
`
`FIG. 1
`
`

`

`Patent Application Publication
`
`Oct. 28, 2010 Sheet 2 of 9
`
`US 2010/0273452 A1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Display
`
`Announcement
`Auto-Dailing
`Modification
`
`Module L
`Module E
`
`Module 205
`
`
`nvironmen
`Operation
`Modification
`Detection
`Module 207
`Content
`Module 217
`Uncertainty
`
`Modification
`Modification
`Zone Module
`Recognition
`
`Module 211
`Module 209
`Module 215
`
`
`
`
`
`
`
`
`
`Electronic
`Persistence
`Leash Module
`Module 1
`QTHF R
`T
`
`_——__==
`— ___,—
`__
`
`
`
`
`
` Module 3
`
`Secondary
`User Control
`Module 225
`
`
`
`5
`
`_re:e:j;s§
`
`mis.:u;~::
`
`
`
`

`

`Patent Application Publication
`
`Oct. 28, 2010 Sheet 3 of 9
`
`US 2010/0273452 A1
`
`..................................
`a.........\.........................
`
`a.
`
`ai.
`
`E‘Rf)ii.?wE;if%F§{}l§
`
`

`

`Patent Application Publication
`
`Oct. 28, 2010 Sheet 4 of 9
`
`US 2010/0273452 A1
`
`N6
`
`fifi«mA
`
`\mfi_§.E_
`
`
`
`
`
`..§..fi_...mw..N,,;..m..i.w.\..E.3
`
`
`
`fififi.A.:i
`
`mmmmmm__$u,
`
`
`
`
`
`_...,,§.§_.xmm_wE..fi...fl:_§
`
`
`
`_m_..m.m...”m.Mm:..i...w..
`
`x®H:..,i_i_mi.
`
`v.05
`
`
`
`
`

`

`Patent Application Publication
`
`Oct. 28, 2010 Sheet 5 of 9
`
`US 2010/0273452 A1
`
`f:'$:I::s:,:7;-¥ 5;-iii:i£:;<»;.é~:
`
`‘E
`
`V..,.....,.,.,........,..r,.,_
`
`{)T{i{¥:I§{ §.\{;1£IT.i¥TE3f‘€£I%
`§3.{l$%L.‘='}‘§i‘~§E
`
`Efmj r
`R{1ai.,§‘I‘2I~,‘~«‘§:-1
`
`F’R{:}(
`
`lg‘
`
`{3
`
`

`

`Patent Application Publication
`
`Oct. 28, 2010 Sheet 6 of 9
`
`US 2010/0273452 A1
`
`{.‘{'.1.....-N-k.?"i‘.¥il3ii §~‘£....s5."i‘i"E§’1i}R';‘-~f.
`
`E "" “"
`" ” -:;.;~.;
`E. _ _ _ _ _ “_ _______ _ .5“
`
`FIG. 6
`
`

`

`Patent Application Publication
`
`Oct. 28, 2010 Sheet 7 of 9
`
`US 2010/0273452 A1
`
`
`
`

`

`Patent Application Publication
`
`Oct. 28, 2010 Sheet 8 of 9
`
`US 2010/0273452 A1
`
`RECEIVE A LOCATION STATE CODE
`
`802
`
`ENABLE A LOCATION MODULE
`
`804
`
`EXECUTE A LOCATION FUNCTIONALITY
`
`806
`
`FIG. 8
`
`

`

`Patent Application Publication
`
`Oct. 28, 2010 Sheet 9 of 9
`
`US 2010/0273452 A1
`
`902
`
`MEANS FOR ENABLING A LOCATION MODULE IN RESPONSE
`
`TO RECEIVING A LOCATION STATE CODE, WHEREIN THE
`LOCATION MODULE INCLUDES ONE OR MORE LOCATION
`
`STATE ROUTINES, WHEREIN AT LEAST ONE OF THE ONE OR
`MORE LOCATION STATE ROUTINES IS IDENTIFIED IN THE
`
`LOCATION STATE CODE, AND WHEREIN EACH LOCATION
`STATE ROUTINE INCLUDES AT LEAST ONE LOCATION
`FUNCTIONALITY
`
`MEANS FOR EXECUTING THE AT LEAST ONE LOCATION
`
`FUNCTIONALITY ASSOCIATED WITH THE ONE OR MORE
`
`LOCATION STATE ROUTINES IDENTIFIED BY THE RECEIVED
`LOCATION STATE CODE
`
`MEMORY
`
`FIG. 9
`
`

`

`US 2010/0273452 A1
`
`Oct. 28, 2010
`
`APPARATUS AND METHODS FOR
`LOCATING TRACKING AND/OR
`RECOVERING A WIRELESS
`COMMUNICATION DEVICE
`
`CLAIM OF PRIORITY UNDER 35 U.S.C. §119
`
`[0001] The presentApplication for Patent claims priority to
`Provisional Application No. 61/172,765 filed Apr. 26, 2009,
`and assigned to the assignee hereof and hereby expressly
`incorporated by reference herein.
`
`BACKGROUND
`
`1. Field
`[0002]
`[0003] The disclosed aspects relate to wireless communi-
`cation devices, and more particularly, to systems, methods
`and apparatus for locating and/or tracking and/or recovering
`a wireless communication device, especially devices that
`have been lost, stolen or misplaced.
`[0004]
`2. Background
`[0005] Wireless communication devices have become a
`prevalent means by which majorities of people worldwide
`have come to communicate. Wireless communication devices
`
`have become smaller and more powerful in order to meet
`consumer needs and to improve portability and convenience.
`The smallness and portability of such devices make them
`highly susceptible to being misplaced, lost or stolen. As the
`user penetration within the general population increases to
`include younger aged and senior aged users, the likelihood for
`misplacing, losing or having a device stolen tends to increase.
`[0006] While many wireless communication devices are
`configured to provide password security protection, the pass-
`word is typically required at device power-up. Thus, if a
`device has been lost or stolen while the power is on, the finder
`or the thiefcanuse it as long as the device remains on. In many
`other instances, users prefer to forego password security pro-
`tection because logging on each time the device is powered up
`is viewed as tedious and unnecessary action.
`[0007] When the user of the wireless communication
`device is confronted with a situation in which the device is
`
`misplaced, lost or stolen, it provides for a troublesome and at
`times, traumatic experience. The wireless communication
`device, such as a mobile telephone, is no longer limited to
`providing a means for placing and receiving communication
`calls. The increased storage capacity and functionality of the
`devices may provide the user e-wallet or mobile-office func-
`tionality, which allows the user to not only store contact
`information but also credit card information, valuable and
`secured personal and business related information and the
`like. Thus, permanently losing a device and having to replace
`a lost or stolen device is not merely a matter ofjust facing the
`economical burden of purchasing a new device, it may also
`involve attempting to reacquire lost data, changing previous
`secure personal and/or business information canceling credit
`cards and the like.
`
`[0008] Users confronted with a misplaced, stolen or lost
`wireless communication device typically perform one or
`more standard operations, such as searching for the device,
`reporting to the authorities that the device has been stolen,
`contacting the service provider to get services turned off and,
`if the device is permanently lost or stolen, purchasing a new
`device. All of these standard options are less than attractive to
`the user, as they require time, effort, cost and induce stress. In
`the case of a misplaced device, which is reported as lost for
`
`the purpose of disconnecting services and is then subse-
`quently found, the user has to perform the tedious and time-
`consuming process of re-contacting the service provider to
`have the service reinstated.
`
`[0009] Regardless of whether the wireless communication
`device is misplaced, lost or stolen it is critical that the device
`be rendered unusable, either temporarily until the device is
`found or returned, or permanently if the device is stolen, not
`found or not returned.
`
`In other situations in which a user loans their device
`[0010]
`to some one else, such as a parent loamng their device to their
`child, a need may exist to track the location of the device
`and/or the corresponding loanee. In another application, it
`may be advantageous to provide a user a wireless communi-
`cation device and nefariously track the location of the user or
`the user’s actions. For example, a law enforcement agency
`may desire to track the whereabouts or actions of a suspected
`criminal, without the suspected criminal knowing that they
`are being tracked or their actions being monitored.
`[0011] Thus a need exists to provide for locating, tracking
`and/or recovering wireless communication devices that have
`been misplaced lost, or stolen. As such a need exists to pro-
`vide disablement and secure the data stored on a wireless
`
`communication device that is misplaced, lost or stolen. Addi-
`tionally, a need also exists, for providing location and action
`tracking of wireless devices in the instance in which the
`device has been loaned or to provide covert surveillance by
`law enforcement of suspected criminals.
`
`SUMMARY
`
`In accordance with one or more aspects and corre-
`[0012]
`sponding disclosure thereof, various aspects are described in
`connection with facilitating location of a targeted wireless
`communications device (WCD). According to one aspect, a
`method for facilitating location of a targeted wireless com-
`munications device (WCD) is provided. The method can
`comprise enabling a location module in response to receiving
`a location state code, wherein the location module includes
`one or more location state routines, wherein at least one ofthe
`one or more location state routines is identified in the location
`state code, and wherein each location state routine includes at
`least one location functionality. Moreover, the method can
`comprise executing the at least one location functionality
`associated with the one or more location state routines iden-
`
`tified by the received location state code.
`[0013] Yet another aspect relates to at least one processor
`configured to facilitate location of a targeted wireless com-
`munications device (WCD). The at least one processor can
`include a first module for enabling a location module in
`response to receiving a location state code, wherein the loca-
`tion module includes one or more location state routines,
`wherein at least one ofthe one or more location state routines
`is identified in the location state code, and wherein each
`location state routine includes at least one location function-
`
`ality. Further, the at least one processor can include a second
`module for executing the at least one location functionality
`associated with the one or more location state routines iden-
`
`tified by the received location state code.
`[0014]
`Still another aspect relates to a computer program
`product comprising a computer-readable medium. The com-
`puter-readable medium can include a first set of codes for
`causing a computer to enable a location module in response to
`receiving a location state code, wherein the location module
`includes one or more location state routines, wherein at least
`
`

`

`US 2010/0273452 A1
`
`Oct. 28, 2010
`
`one of the one or more location state routines is identified in
`the location state code, and wherein each location state rou-
`tine includes at least one location functionality. Further, the
`computer-readable medium can include a second set of codes
`for causing the computer to execute the at least one location
`functionality associated with the one or more location state
`routines identified by the received location state code.
`[0015] Yet anotheraspect relates to an apparatus. The appa-
`ratus can include means for enabling a location module in
`response to receiving a location state code, wherein the loca-
`tion module includes one or more location state routines,
`wherein at least one ofthe one or more location state routines
`is identified in the location state code, and wherein each
`location state routine includes at least one location function-
`
`the apparatus can comprise means for
`ality. Moreover,
`executing the at least one location functionality associated
`with the one or more location state routines identified by the
`received location state code.
`
`[0016] Another aspect relates to an apparatus. The appara-
`tus can include a location recovery module operable to:
`enable the location recovery module in response to receiving
`a location state code, wherein the location module includes
`one or more location state routines, wherein at least one ofthe
`one or more location state routines is identified in the location
`state code, and wherein each location state routine includes at
`least one location functionality, and execute the at least one
`location functionality associated with the one or more loca-
`tion state routines identified by the received location state
`code.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0017] The disclosed aspects will hereinafter be described
`in conjunction with the appended drawings, provided to illus-
`trate and not to limit the disclosed aspects, wherein like
`designations denote like elements, and in which:
`[0018]
`FIG. 1 is a block diagram ofa system for remotely
`accessing a wireless communication device that has been
`misplaced, lost or stolen, according to an aspect;
`[0019]
`FIG. 2 is a block diagram ofthe various location and
`recovery routines executed by a wireless communication
`device that has been misplaced, lost or stolen, according to an
`aspect;
`FIG. 3 is a block diagram ofa system for locating,
`[0020]
`tracking and/or recovering a targeted wireless communica-
`tion device, according to another aspect;
`[0021]
`FIG. 4 is an example of a communication data
`packet payload, according to an aspect;
`[0022]
`FIG. 5 is a block diagram of a target wireless com-
`munication device, according to another aspect;
`[0023]
`FIG. 6 is a block diagram of a computing device that
`attempts to locate, track and/or recover a target wireless com-
`munication device, according to an as oect;
`[0024]
`FIG. 7 is a block diagram of an exemplary cellular
`telephone network used in communicating with the targeted
`wireless communication device, according to an aspect;
`[0025]
`FIG. 8 depicts an exemplary f ow diagram ofa meth-
`odology for facilitating location of a targeted wireless com-
`munication device according to an aspect; and
`[0026]
`FIG. 9 is a block diagram of an exemplary commu-
`nication system that can facilitate loca ion of a targeted wire-
`less communication device according to an aspect.
`DETAILED DESCRIPTION
`
`[0027] Various aspects are now desc ibed with reference to
`the drawings. In the following description, for purposes of
`
`explanation, numerous specific details are set forth in order to
`provide a thorough understanding of one or more aspects. It
`may be evident, however, that such aspect(s) may be practiced
`without these specific details.
`[0028] The various aspects are described herein are in con-
`nection with a wireless communication device. A wireless
`communication device can also be called a subscriber station,
`a subscriber unit, mobile station, mobile, remote station,
`access point, remote terminal, access terminal, user terminal,
`user agent, a user device, or user equipment. A subscriber
`station may be a cellular telephone, a cordless telephone, a
`Session Initiation Protocol (SIP) phone, a wireless local loop
`(WLL) station, a personal digital assistant (PDA), a handheld
`device having wireless connection capability, or other pro-
`cessing device connected to a wireless modem.
`[0029] Present aspects provide for systems, devices, appa-
`ratus, methods and computer program products for locating,
`tracking and attempting to recover, wireless communication
`devices that have been misplaced, lo st or stolen. In this regard,
`present aspects rely on generating a communication data
`packet, for example, a Short Message Service (SMS) com-
`munication data packet at a secondary wireless device, a web
`interface or a network service provider device. The commu-
`nication data packet includes a locating state code that iden-
`tifies one of a plurality of locating states that are operable on
`the targeted (i.e., the misplaced, lost or stolen) wireless com-
`munication device. The locating states are associated with
`one or more predetermined routines that are operable on the
`targeted wireless device. In some aspects, the locating state
`may be associated with a sequence of routines that are trig-
`gered on the device.
`[0030] The predetermined routines may effectively dis-
`able/lock the wireless communication device, disable any
`application running on the wireless device, such as a commu-
`nication call application. In addition to disabling or locking
`the device, the predetermined routines may trigger jamming
`or scrambling of communication signals, such as voice or
`data signals. Additionally, the predetermined routines may
`trigger audible, visual or sensory perceptible alerts to the
`possessor ofthe device that identify the device as being lost or
`stolen. The predetermined routines may additionally capture
`data, such as geographic location data, image data, audio data
`and the like and communicate the data to the owner/user ofthe
`
`targeted device, to a network entity device, or to a service
`provider device. In turn the captured and retrieved informa-
`tion may be used to locate the device and/or the party who is
`in possession of the targeted device. Also, once data is cap-
`tured and retrieved from the wireless device, predetermined
`routines may provide for data to removed/deleted from the
`device. Additionally, the predetermined routines that capture
`and communicate data may be operated in a “stealth” mode so
`that conventional indicators that would normally be pre-
`sented, such as displayed lights or messages or audible tones,
`are suppressed to insure that the finder/thief is unaware that
`these routines are currently being executed. Also, the prede-
`termined routines may change an operational mode, such as
`changing the targeted device from a “silent” or “vibrate” ring
`state to an “audible” ring state.
`[0031] Referring to FIG. 1, a block diagram is depicted of a
`system 10 for remotely accessing a wireless communication
`device that has been misplaced, lost or stolen to initiate the
`locating,
`tracking and/or attempted recovery of present
`aspects. The user/owner 12 of the targeted wireless commu-
`nication device 14, which may be categorized as misplaced
`
`

`

`US 2010/0273452 A1
`
`Oct. 28, 2010
`
`device, a lost device, a stolen device or a device that requires
`tracking or surveillance, may remotely access the device 14
`through various communication charmels. The communica-
`tion charmels provide for generating and communicating a
`communication data packet, such as an SMS message or the
`like, which includes a locating state code for identifying one
`of a plurality of locating states (for example, a misplaced
`state, a lost state, a stolen state, a tracking state, a surveillance
`state, such as an emergency surveillance state or a covert
`surveillance state, and the like) that are operable on the tar-
`geted wireless communication device. As will be described at
`length infra., the locating states are associated with one or
`more predetermined location routines that are operable on the
`targeted wireless device. I11 many aspects, a locati11g state is
`associated with a predetermined sequence of routines or
`actions that are executed to locate, track, and attempt to
`recover the target device 14. In one aspect, a locating state
`may include a location state code which may enable at least
`one location functionality. As used herein, a location func-
`tionality may include, but is not limited to, any action per-
`formed to either directly or indirectly assist in location and/or
`recovery of the target device 14.
`[0032] As shown in FIG. 1, the user/owner 12 may borrow
`or otherwise obtain an alternate or secondary wireless com-
`munication device 16 to generate and communicate the req-
`uisitc communication data packet to thc targctcd dcvicc. In
`addition, the user/owner 12 may interface with a web inter-
`face through a PC 18, laptop (not shown in FIG. 1) or any
`other device having network access to the Internet. In such
`aspects, user/owner will provide necessary inputs to the web
`interface to initiate the generation and communication of the
`requisite communication data packet to the targeted device. In
`another aspect, user/owner 12 may communicate with a net-
`work/service provider entity 20 and the network/service pro-
`vider entity may provide the necessary inputs to a network
`server to initiate the generation and communication of the
`requisite communication data packet to the targeted device.
`Alternatively, any other communication mechanism capable
`of generating and communicating the necessary communica-
`tion data packet to the target device may also be used to
`initiate the location, tracking and attempted recovery process
`according to the present aspects.
`[0033]
`FIG. 2 provides a block diagram of various location
`routines that may be executed on the targeted wireless com-
`munication device 14 in response to detection of location
`state code in a received communication data packet. As pre-
`viously noted, each location state will be associated with one
`or more location routines and, in some aspects, a location
`state will be associated with a sequence of location routines,
`such that detection of a location state code in a received
`communication data packet will trigger the execution of the
`sequence of location routines. As shown, in FIG. 2, the tar-
`geted wireless communication device may be operable to
`execute a geographic location determining routine 22, such as
`a Global Positioning System (GPS) location determining rou-
`tine, a still or moving image capture routine 24 and/or an
`audio capture routine 26. The results of these routines, geo-
`graphic location data, image data and/or audio data may then
`be communicated to back to the user/owner via the secondary
`device 16 and/or a web interface, a network entity, such as a
`service provider, a law enforcement entity and/or any other
`relevant entity for analysis. Geographic location data pro-
`vides the ability to track the location of the misplaced, lost or
`stolen device. Image data, still or moving, and audio data may
`
`provide the ability to identify the finder/thief of the targeted
`device or identify the surrounding area in which the targeted
`device is located.
`
`[0034] Additionally, target device 14 may be operable to
`execute emergency/covert surveillance routine 27 that pro-
`vides surveillance of a location if an emergency event requir-
`ing surveillance occurs. For example, if a major accident
`occurs, such as an automobile accident, or a kidnapping/
`abduction occurs. The emergency/covert surveillance routine
`27 may be operable to activate the still or moving image
`capture routine 24 to capture still or moving image data, the
`geographic location-determining routine 22 for determining
`location, the audio capture routine 26 for capturing audio and
`the like. Additionally, as shown in FIG. 2, the targeted device
`14 may be operable to execute input mechanism, application
`and/or device disablement routine 28 that may operable to
`disable any input mechanism, such as the keypad, any appli-
`cation executable on the device, such as communication call
`applications or disable the device in its entirety. The targeted
`device 14 may also be operable to execute various forms of
`sensory alarm routines 30. Sensory alarm routines may trig-
`ger audible alarms, such as a series of periodic or continuous
`audible tones or a pre-recorded message, visual alarms, such
`as messages displayed on the target device display or vibra-
`tional alarms, which cause the device to vibrate periodically
`or continually. Sensory alarm routines serve to acknowledge
`to the general public that the device is misplaced, lost or
`stolen. The emergency/covert surveillance routine 27 may be
`operated when the emergency surveillance state is invoked or
`the emergency/covert surveillance routine 27 may be oper-
`ated in a “stealth” mode when the covert surveillance state is
`invoked.
`
`[0035] Additionally, the target device 14 may be operable
`to execute power reserve routine 32 that is operable maintain-
`ing a power reserve for the location, tracking and/or recovery
`process. For example, power may be reserved for determining
`location/GPS fixes, capturing image data and communicating
`with the remote communication device, such as a secondary
`wireless device, PC or network entity.
`[0036]
`In addition, the target device 14 may be operable to
`execute any other locating, tracking, recovery and/or surveil-
`lance routine 32 that may be operable to assist in accomplish-
`ing recovery of the target device 14. For example, the other
`locating routine 32 may include a routine for changing an
`operational mode, such as changing the targeted device from
`a “silent”, “vibrate”, “airplane mode”, “low-volume”, or
`other new modes to an “audible” or “high volume” ring state,
`e.g. such as by changing a speaker or ring tone volume level
`(“maximum volume”),
`turning on an external
`speaker
`(“speaker phone mode”), etc. Often, the user of the targeted
`device will misplace the device while the device is in the
`“silent”, “vibration” or “low volume” ring state. These states
`prohibit the device from being located by merely calling the
`device and listening for the ring tone. In addition, in certain
`instances it may be necessary to change the misplaced tar-
`geted device from an “off” state to an “on” state prior to
`changing the ring tone state or performing other locating
`routines on the targeted wireless device. Other locating,
`tracking, recovery and surveillance routines 32 may include
`routines operable for jamming, scrambling or otherwise cor-
`rupting the communication data, such as voice data, text data,
`image data or the like.
`[0037]
`In one aspect, other locating-related routine 32 may
`include a announcement module 201 for making audio
`
`

`

`US 2010/0273452 A1
`
`Oct. 28, 2010
`
`announcements (e.g. a pre-recorded message, a ring-tone,
`etc.) even ifthe wireless device is functioning in a ‘vibrate’ or
`‘silent’ or ‘off mode of operation.
`In one aspect,
`the
`announcement module 201 may automatically increase vol-
`ume and/or turn on the speaker-phone to make audio
`announcements. In another aspect, the wireless device may be
`made apparent to people nearby. Furthermore, in such an
`aspect, any audio announcement may armounce return recov-
`ery messages such as but not limited to, a “call home” request,
`a request to contact a third party, or any armouncement of
`return instructions, mailing instructions (e.g. mailing address
`and account number to use to charge mailing fees) or a tele-
`phone number to call, etc. Still further, in such an aspect, any
`audio announcement may announce a warning that the wire-
`less device is being tracked, or authorities have been notified,
`etc. Even further, in one aspect, the armouncement module
`201 may prompt the wireless device to phone announce and/
`or display a message, such as a pre-recorded audio clip and/or
`graphic, describing one or more of the actions the phone is
`about to perform, such as taking photos, recording audio,
`video, etc., prior to taking such actions. In another aspect,
`audio announcements may further armounce that the wireless
`device is being disabled, or can not make calls, etc. In one
`aspect, once an announcement is performed, the wireless
`device may be obtained by a searching entity such as but
`limited to, the owner/user, a third party, etc. In such an aspect,
`the wireless device may be obtained by being returned or
`retrieved by a searching entity. In the aspect in which a third
`party obtains the wireless device, the third party may then
`return the wireless device to the owner. The returning may be
`performed directly, through postage, etc. Further an owner
`may be located through any number of identifying character-
`istics, such as, a phone number, an address, an account num-
`ber, etc.
`In one aspect, other locating-related routine 32 may
`[0038]
`include an auto-dialing module 203 for enabling one or more
`auto dialing presets. In such an aspect, the auto-dialing mod-
`ule 203 may include one or more autodial presets which may
`include but are not limited to, a “call home” preset that
`enables the device to call a predefined “home” location, such
`as another number registered to the wireless device user, a call
`center able to handle returns of the device, etc. In such an
`aspect, the one or more auto-dialing presets may be presented
`more prominently on the wireless device display than when
`such presets are presented, if at all, when the routine is not
`enabled.
`
`In one aspect, other locating-related routine 32 may
`[0039]
`include a display modification module 205 for continuously,
`intermittently and/or periodically modifying the wireless
`device display state. For example, a wireless device may
`modify its display by blanking out the display, changing a
`radio frequency (RF) signal strength indicator to falsely dis-
`play a reduced value, changing a battery indicator to falsely
`display a reduced value, etc. In another example, a wireless
`device may change the display screen color, intensity and/or
`cause the screen to flash so as to more readily facilitate locat-
`ing the wireless device or to give the impression that the
`display screen is not working properly in order to discourage
`unauthorized use, e. g. triggered by an attempted usage of the
`device when this routine is active. As such, in the display
`modification module 205, the device may provide a false
`sense of low or faulty performance, thereby discouraging any
`attempted unauthorized usage of the device.
`
`In another aspect, other locating-related routine 32
`[0040]
`may include a operation modification module 207 for con-
`tinuously,
`intermittently and/or periodically modifying at
`least one wireless device operational state. For example, upon
`activation of the operation modification module 207, the
`wireless device may power down, loop between power down/
`up, etc. so as to frustrate any attempted unauthorized usage of
`the wireless device. In another example, upon activation of
`the operation modification module 207, the wireless device
`may periodically disable the RF transceiver. The operation
`modification module 207 may be triggered by attempted
`unauthorized usage of the device while this routine is acti-
`vated. In another aspect, the wireless device may shield,
`encrypt, delete or otherwise protect data stored or1 the wire-
`less device. In such an aspect, the wireless device may trans-
`mit at least a portion of user generated content (e.g. contacts,
`passwords, audio, photos, videos, applications, etc.) and
`purge the wireless device thereafter.
`[0041]
`In another aspect, other locating-related routine 32
`may include a position modification module 209 for continu-
`ously, intermittently and/or periodically modifying the wire-
`less device physical positioning. For example, the position
`modification module 209 may include instructions config-
`ured to cause a camera associated with the wireless device to
`
`move, rotate, or be manipulated in some manner so as to
`providc an image, vidco, ctc. of thc surroundings. In onc
`aspect, the wireless device may vibrate, flip, move in a spe-
`cific direction, etc., in response to a variety of conditions. For
`example, a camera associated with the wireless device may be
`facing down or in a direction that does not assist in location.
`In such an example, the wireless device may attempt to adjust
`its physical positioning so as to more readily facilitate locat-
`ing the wireless device. In another example, the device may
`include an actuator connected to an arm, such as a flip portion
`of the device, and activation of the position modification
`module 209 may energize actuator to automatically move flip
`portion, for example, in an effort to change a position of the
`device, e. g. to change a side of the device including the
`camera from facing down to facing up or facing sideways. In
`another example, if an image taken is “black” (e.g. camera is
`covered or lying face down on ground), the target WCD may
`activate the position modification module 209. In such an
`example, a “black” image may be defined as where a majority
`of pixels in a digital image are black or off.
`[0042]
`In one aspect, other locating-related routine 32 may
`include an uncertainty zone module 213 for determining an
`“uncertainty zone.” As used with respect to this aspect, an
`uncertainty zone may be defined as a geographic region of
`defined dimensions within which the exact location of the
`
`wireless device may not be determined. For example, GPS
`aided tracking of the wireless device may provide specific
`latitude and longitude coordinates, however, there may be a
`degree of uncertainty with respect to such coordinates, e.g.
`based on the precision ofthe system or based on lack of some
`coord

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket